Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Senetas' delay in encryption bill submission surprising

0
0

One of the curious aspects surrounding the Federal Government's encryption bill is why it took Australian firm Senetas ― which has technology exports in excess of $3 billion ― so long to voice its objections to the draft legislation.

Senetas would be among the Australian companies that stands to lose the most if the law is implemented in its current form and yet the company has kept its views on the bill to itself until recently.

The company did not make a submission to the Department of Home Affairs when public comment was open between 14 August and 10 September. And until the last day ( 25 October ) when the list of submissions was up ― it has now disappeared ― Senetas had no presence on it.

The company has now surfaced in the list of submissions to the Parliamentary Joint Committee on Intelligence and Security and its contribution sits at No 85 on a list that has 87 submissions as of today (13 November).

Curiously, Senetas chose to voice its objections much earlier to what is officially known as Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 ― that link is dead now as well ― by sponsoring a podcast

. Not that many people from among the masses would have noticed that.

In the submission which it has made to PJCIS, Senetas quotes a great deal from the submissions of others to justify its conclusions. Once again, exactly why is unknown.

Companies that stand to lose the most due to any particular regulation should, arguably, be the first out of the gates with criticism. Cisco is a case in point; the global networking vendor, which knows what can result from backdoors in hardware , made a forceful attack against the draft in an early submission to the PJCIS and then its personnel appeared in numbers during the first hearing of the PJCIS on 19 October to continue in the same vein.

Senetas' reluctance to take on the government may be due to the fact that Australian companies generally avoid open confrontation with the government. Those who do ― like the cloud provider Secure Collaboration ― often back away after an initial foray , after finding that it does not serve their ends.

There are three more hearings organised by the PJCIS on 16, 27 and 30 November, and it remains to be seen whether Senetas will show up and argue its case. There are good reasons why it should it represents one of the better reasons why this senseless bill should be used as kindling for a bonfire.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

Sydney 29-30 November

Brisbane 3-4 December

Melbourne 6-7 December

Register now for YOW! Workshops

Sydney 27-28 November

Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

How does business security get breached?

What can it cost to get it wrong?

6 actionable tips

DOWNLOAD NOW!


Viewing all articles
Browse latest Browse all 12749