The War on Privacy

Last week the Australian Government passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, which allows certain government agencies to issue secret notices compelling Australian IT workers and software developers to insert secret malicious code into any software or computer systems, for the purpose of gaining access to the content of encrypted messages […]

Internet Surveillance News

I spy… — Barack Obama (@BarackObama) February 15, 2013 25 Apr 2015 Pirate Party Australia’s guide to protecting your online privacy under the Australian government’s new mandatory data retention scheme. 25 May 2015 Senator Scott Ludlam learned about Tor, VPNs, PGP and OTR at a cryptoparty in Sydney. 28 May 2015 Apple co-found Steve Wozniak says Australia’s data retention […]

Onion routing explained

When you visit a website on your computer or mobile device, you are potentially sharing that information with advertisers, hackers, co-workers and governments. Even though the content you are viewing is likely to be encrypted with HTTPS, your metadata (including the URL and IP address of websites you visit, your IP address, the time and […]

Encrypted Email Backup in the Cloud (Windows)

Is your Inbox full? Do you want to combine mail from multiple accounts into one convenient location? Are you concerned that your private messages are being stored insecurely (i.e. not encrypted) on a server that could be accessed by your co-workers, the government, or hackers? This tutorial will show you how to download your email […]

Preventing VPN leaks on Linux

In a previous post I showed how a firewall app on Android can prevent metadata leaks when you connect to a wireless network but have not yet connected to your VPN. This guide achieves the same goal with OpenVPN or Torguard Lite on a Linux PC, blocking all outgoing connections and then allowing connections only […]

The Australian Panopticon

The Panopticon is a theoretical prison designed by English philosopher and social theorist Jeremy Bentham in the late 18th century. The shape of the prison places every inmate within view of a watchtower. Although it is physically impossible for the watchman to observe all cells at the same time, the fact that the inmates cannot […]

Preventing VPN leaks on Android

If you connect to the internet through a public WiFi hotspot, or at school or at work, the metadata and contents of your online communications can be intercepted and viewed (or altered) by the network operator or another malicious party on the network. If you connect from an Australian residential address or personal mobile device, […]

What does Metadata look like?

The Australian government will soon be collecting and storing metadata from every mobile phone in the country, along with details about your internet-connected devices and the websites you visit. What does metadata look like? German Green party politician Malte Spitz gave ZEIT ONLINE six months of his phone metadata collected by his service provider. This […]