0

(Image: Heide Benser/Corbis)
At the core of Australia’s controversial new encryption laws sits a conundrum. How can a communications provider create a way to access specific encrypted communications without also creating a prohibited “systemic weakness” that can be used to access any of these communications more widely?
Related Topics:
Australia
Security TV
Data Management
CXO
Data Centers
0