When the Government proposed their ‘Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014‘ we were all outraged & vowed to vote it down …
Of course those in power paid no notice & collection & storage of your metadata began.
Then the Copyright Amendment (Online Infringement) Bill 2015 was proposed & passed allowing for the ‘blocking of sites that have the primary purpose of infringing copyright or facilitating the infringement of copyright’ i.e. Bye bye Pirate Bay & all of the better known BitTorrent sites – of course this has made little difference to the ‘Nation of Pirates’ and down-loading of free-to-air content that is delayed & trickle-fed down-under has continued unabated.
Now Netflix, the bastion of those who are prepared to pay for content otherwise denied to us, have begun ‘geo-blocking’ – restricting those smart enough to have bought access to the US Netflix service so that they can sample the full array of Digital Offerings, to the mere third that has been served up to the Second-Rate citizens of Australia.
Enough Already … If the media cartels cannot see their business practices eroding their ‘copyright protection’ and refuse to treat all consumers as equals, then it’s inevitable that the revolution will steamroll their firewalls & find other ways to get the content we all want!
Now I will!
But first I wanted to join the discussion of why storage of ‘metadata’ for a mandatory 2 years is a futile exercise that invades our privacy.
Futile because it’s predicated on the assumption that the ‘bad guys’ are dumb and use open methods of communication to plot their dastardly deeds. If this was the case then the countries that currently HAVE a data retention scheme would be trumpeting their rocketing rate of crime prevention & convictions – but they aren’t. In fact Germany abandoned their scheme when a study revealed ‘no discernible improvement in solving crimes when the scheme was in place.’
The amendment sets no standards for encryption or security of your collected data – so in fact we’re creating vast repositories of personal information that will be like ‘shining beacons’ to the less savoury characters of the IT world – who target victims for identity theft, hacking, social engineering & other forms of technological foul-play.
So – how do we avoid all of our communications being ‘snooped upon’?