Proton
australia assistance and access

Australia’s vague anti-encryption law sets a dangerous new precedent

On Thursday, the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups.

The Assistance and Access (A&A) law requires tech companies to help law enforcement agencies break into individuals’ encrypted data. Using secret warrants, the government can even compel a company to serve malware remotely to the target’s device.

The goal of the law is to give police more latitude to investigate criminals using encrypted communications software. But Assistance and Access goes far beyond that. It endangers the security of everyone who uses online services, it weakens civil rights like privacy and due process, and it places an unprecedented burden on tech companies to attack the very users they set out to serve.

There is nothing new about a government seeking to break encryption. From the British Investigatory Powers law(новое окно) to the NSA’s possible decryption programs(новое окно), law enforcement agencies around the world are working hard to gain an edge over information security technology. But Australia’s new law goes much further, deputizing tech businesses as accomplices in a surveillance scheme so loosely conceived that no one really knows its limits. “The definition of ‘acts or things’ in the Bill is so vague as to potentially permit almost limitless forms of assistance,” the Australian Human Rights Commission wrote to Parliament(новое окно).

Does the Assistance and Access (A&A) law impact Proton Mail?

Fortunately, there is virtually no way to enforce this law outside of Australia because it has no foreign equivalent. Proton Mail, a Swiss company with datacenters only in Switzerland, is not under Australian jurisdiction. Any request for assistance from Australian agencies under the A&A law would need to pass the scrutiny of Switzerland’s criminal procedure and data protection laws. Tech companies with a corporate presence in Australia however, are more likely to be impacted.

But just because this particular law does not affect Proton Mail and Proton VPN does not mean we are indifferent. A&A is one of the most significant attacks on digital security and privacy since the NSA’s PRISM program. But the Australian measure is more brazen, hastily forced through Parliament(новое окно) over the loud objections of every sector of society, from businesses to lawyers groups. We thoroughly condemn the new law, and as the world’s largest encrypted email provider(новое окно), we remain committed to protecting our users anywhere in the world, including in Australia.

What’s wrong with the Assistance and Access law?

The Australian government had been an outspoken advocate for encryption backdoors(новое окно), requiring tech companies to build systematic weaknesses in their encryption to allow law enforcement in. Privacy advocates successfully argued that there is no such thing as a backdoor that only lets the good guys in. So the government went back to the drawing board. The result is the Assistance and Access law.

From the center-left to the far-right, Australian lawmakers voted Thursday to break encryption once and for all. While the law does not technically require a backdoor, it would require companies to help police build software capable of decrypting a targeted user’s data (i.e. with targeted malware).

But the law is extremely confusing and vague, so it is difficult to know how it will be interpreted in practice. The Australian Computer Society, a trade association for IT professionals, outlined several problems in their letter to Parliament(новое окно). To paraphrase a few:

  • Not every company has the technical know-how to safely implement malware that won’t accidentally backdoor the entire product (particularly with IoT devices), putting the security of people’s homes and organizations at risk.
  • Businesses can’t easily plan or budget for possible covert surveillance work with the government.
  • A companion “explanatory document” outlines some safeguards to protect civil rights and privacy that don’t actually appear in the law itself.
  • Once police have gained access to a suspect’s device, they could easily remove evidence from the device that could prove the person’s innocence. There would be no way to know.

These are just a few of the issues, and that’s barely scratching the surface.

The Assistance and Access law makes us less safe

A&A forbids the implementation of “systemic weaknesses,” but the law does not adequately define the term. Without a better definition, police could deploy tactics that result in unintended consequences. In our view, this is one of the most dangerous aspects of the law.

To illustrate this danger, the Australian Human Rights Commission described a potential scenario(новое окно) in which police order Facebook to send a push notification to a single user asking that person to install a software update. This in itself would not constitute a systemic weakness, but if large numbers of Facebook users stop downloading software updates (including security updates) because they’re afraid of government spyware then that could create systemic weaknesses.

Even though A&A is confined to Australian jurisdiction, it sets a precedent with far-reaching dangers to cybersecurity. Online privacy and security are often predicated on trust in the service provider. Australian Parliament has single-handedly undermined global confidence in any software maker with an Australian presence, including Facebook (by extension WhatsApp and Instagram), Google, and Apple.

The law’s easy passage may also encourage other governments to create their own versions. But because Australia is a member of the Five Eyes intelligence-sharing arrangement(новое окно), some foreign intelligence agencies may not even have to wait to reap the benefits. The governments of the US, UK, Canada, and New Zealand can gain access to whatever information Australian spies collect using their new A&A powers.

Protecting encryption in the wake of Assistance and Access

We are not opposed to law enforcement, and we respect the important role(новое окно) that law enforcement has to play in ensuring security both online and offline. Similarly, many law enforcement officials also understand the importance of technologies like end-to-end encryption(новое окно), and many even use Proton Mail themselves. As we have previously noted(новое окно), the widespread use of encryption can actually further governments’ national security goals. It is critical that we strike the right balance. In our opinion, the A&A law does not do this, and in the long run, will make us all less safe.

The solution is education. The way we protect privacy rights is by helping citizens and lawmakers understand that data security and crime prevention are not opposing ideas. Simply put, encryption prevents far more crimes than it enables. But more importantly, privacy is a pillar of democracy, and encryption is how we ensure our democracy survives. The fact that it also makes our online data safer in the process is an added bonus.

For these reasons, we remain committed to our mission to expand access to privacy and security online. You can support these efforts simply by switching to a Proton Mail secure email account and educating those around you about why privacy and security matter.

You can get a free secure email account from Proton Mail here.

We also provide a free VPN service(новое окно) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan. Thank you for your support!

Статьи по теме

Smart glasses that have been modified for facial surveillance and dox you in real time, finding your personal information after seeing your face.
en
  • Новости о конфиденциальности
Students modified smart glasses to find someone’s personal data after just looking at them. This is why we must minimize data collection.
The cover image for a blog explaining what password encryption is and how Proton Pass helps users with no tech experience benefit from it
en
  • Советы о конфиденциальности
Password encryption sounds complicated, but anyone can benefit from it. We explain what it is and how it’s built into Proton Pass for everyone to use.
How Proton can help with DORA compliance
en
  • Для бизнеса
We look at how DORA will affect your organization and how Proton’s services can help you meet its compliance requirements.
en
  • Новости о конфиденциальности
We searched the dark web for Spanish and Italian politicians’ official email addresses. Compared to other politicians, they’ve had fewer breaches.
why are my emails going to spam
en
  • Советы о конфиденциальности
Why do some emails go to spam? This article explores practical solutions to improve your email deliverability and avoid the spam folder.
What is NIS2?
en
  • Для бизнеса
We look at how NIS2 will affect your organization, and at how Proton’s services can help it meet its compliance requirements.