In praise of the NZ Government
It is so easy to see faults and shortcomings in what the NZ Government has done in the Internet area. Once in a while, not too often, it is worth stepping back and look at the good things. Otherwise,...
View ArticleService providers’ view of the TICS Bill jackboot
Here we go again. The Government’s penchant for novel laws is again taking an axe to the Internet in New Zealand. This time its legislative gun is trained on lawful interception and network security....
View ArticleCrypto for the Masses is here
Everyday users of the Internet, i.e. the masses, can now easily use cryptography (“crypto”). Crypto for the masses is here. No longer do we have to send messages as the equivalent of postcards, open...
View ArticleWhy you need to make a submission on the GCSB Bill
After months of public speculation about illegal spying on New Zealanders, GCSB Director Ian Fletcher issued an extraordinary statement on 21 May 2013. He said that the Inspector-General had “formed a...
View ArticleDuty to Assist in Telco Spying Bill
Some people got in touch asking me to clarify my recent tweet, “Sadly #TICS Bill submissions I’ve seen ignore/misunderstand duty to assist as over and above interception. Complex stuff.” This is...
View ArticleShould ISPs be privacy crusaders?
I was somewhat miffed that submissions from Telecom and Vodafone (who account for the vast majority of Internet connections) on the Telco Spying Bill did not call for protecting the privacy of their...
View ArticleThe Next Crypto Battle
Initial skirmishes have provided some indication that the next cryptography (crypto) battle is heating up and is not far from a full-fledged call to arms. Insights from previous battles in this...
View ArticleSecret Ministerial orders are bad for NZ
Originally published in the National Business Review The Government is planning to issue secret orders to Service Providers when the Telecommunications (Interception Capability and Security) Bill...
View ArticleOnline Privacy: A Customer’s Perspective
Presentation to the Digital Identity & Security Conference on 21st August 2013 in Wellington. Also, the YouTube clip from slide 2.
View ArticleThe money is in the Bitcoin protocol
Mention Bitcoins and people think ‘anonymous currency’. However, that’s only one instance of how the underlying public-key cryptographic protocol can be used. For example, at a conference last week, in...
View Article
More Pages to Explore .....