Home Open Sauce In midst of encryption debate, NBN Co pushes use of VPNs

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

In midst of encryption debate, NBN Co pushes use of VPNs

In what can only be termed a curious coincidence, the NBN Co, the company building the national broadband network, has published a blog post about the benefits of using a VPN - right at the time when the government is making noises about bringing in curbs on encryption.

The NBN Co's blog posts usually provide the name of the author – but the VPN post has none.

Ever since the series of terrorist attacks in London occurred this year, there has been talk, first by British politicians, and more recently from the local element itself, of curbs on encryption. This is because, supposedly, without encryption terrorism would not be possible.

The overblown fears of politicians have been given fuel aplenty by uneducated journalists writing articles that portrayed encrypted apps like WhatsApp and Telegram as being central to any act of terror.

In this milieu, the NBN Co's article does come as something of a surprise. The figleaf for writing the article now is apparently Privacy Awareness Week – which, incidentally, was marked in May.

vpn.

It is doubtful whether Prime Minister Malcolm Turnbull would be amused by this line from the post: "One of the main ways of blocking out unwanted eyes from peeking in on your activities and invading your privacy is through a VPN."

Especially since it comes at a time when he has been saying, "We need these global social media messaging companies to assist in providing access to encrypted communications… The security services need to get access to them."

The NBN Co post is actually quite a good guide for those who know nothing about a VPN. There are lines that could provide fodder for a few jokes; for instance, the line "For example, if you are streaming Netflix — a service that has a high demand on Internet bandwidth — is there much for unwanted eyes to see?" could be taken to mean a subtle reference to Five Eyes, the intelligence-sharing alliance of the five English-speaking countries.

Turnbull presumably would also not be thrilled by a public sector company offering this kind of advice: "When entering personal information, sending sensitive files or doing any number of personal tasks you might want to keep private – this is when many users might activate a VPN."

In its urge to push itself into the public gaze in a positive light, the NBN Co may well have committed what the French, those masters of language, refer to as a faux pas. Perhaps that articulate pollie, George Brandis, will have something to say about it. A man of his delicate sensibilities would definitely understand the term faux pas.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications