The move came after employees working for OPTF were approached by the Victoria police and Australian federal police over several months including via help chat messages, letters and phone calls. Victoria police also visited the apartment of an employee late last year, asking questions about the app and its encrypted messaging, the company says.

Under anti-terrorism laws passed in 2018, law enforcement can issue notices requiring developers to assist with an investigation. This can include technical assistance which could require companies to build capability for law enforcement to break the encryption used in their services.

But the powers have rarely been used. And if they had, neither the AFP or the services targeted can divulge what an organisation has been ordered to do.

The office of the home affairs minister, Tony Burke, was approached for comment.

The Greens digital rights spokesperson, Senator David Shoebridge, said it was a problem if Australia had policies hostile to end-to-end encryption while privacy law was failing to protect people’s personal information.

He said the AFP approaching Session employees was “seriously troubling”.

“Are police now taking the view that just trying to protect your privacy makes you potentially guilty?

“We need a sovereign tech industry that delivers safe and secure products for local users and to make this happen the industry is telling us they urgently need an effective suite of privacy and data laws.”

Good to see this getting some coverage in mainstream outlets, and by the Greens.

Did the image need to be a spooky-scary guy, though?

  • zero_gravitas@aussie.zoneOP
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    11 days ago

    Government departments definitely, probably banks, a bunch of legal and accounting firms.

    Well, yeah, definitely all those, and that’s always been the case. All those organisations can access the records you have with them, and the cops - and various other government departments - can subpoena them for those records. Any info you provide to any business or government department should never have been considered to be private from the government.

    That’s all quite different to compelling developers of end-to-end encrypted apps to introduce secret backdoors. If implemented as advertised (i.e. without backdoors), the platform provider cannot access the information you send though an E2EE platform, and you could reasonably expect it to be inaccessible by anyone except you and the intended recipients.

            • Cypher@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              10 days ago

              You should look up the Lawyer X scandal that occurred in Australia. Police don’t respect anything.

              • zero_gravitas@aussie.zoneOP
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 days ago

                Yeah, I’m aware of the Gobbo case. But, like, lawyer-client privilege is a legal construct, so if the cops are willing to break the law, then, yeah, of course it doesn’t protect you. If they’re willing to illegally access your messages through an E2EE messaging app, then they are presumably willing to access it illegally through people you’ve communicated information to in cleartext. I could be being dense, but I just don’t understand what point No1 was making.