{"id":25236,"date":"2019-02-14T01:35:42","date_gmt":"2019-02-14T01:35:42","guid":{"rendered":"http:\/\/075a2cf1-51bb-416e-9df5-00ae3f806758"},"modified":"2019-02-14T01:35:42","modified_gmt":"2019-02-14T01:35:42","slug":"australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/","title":{"rendered":"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2018\/09\/06\/73caa3f3-b9c3-4e8d-898b-ca8aff6b1d4f\/thumbnail\/770x578\/7baa611a0cf47accf2772a8370736bb0\/screen-shot-2018-09-06-at-18-11-58.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The first of Labor&#8217;s dumped amendments when it <a href=\"https:\/\/www.zdnet.com\/article\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\">waved through Australia&#8217;s encryption laws<\/a> in December has succeeded, and will see the contentious definitions of systemic weaknesses and systemic vulnerability replaced.<\/p>\n<p>As the current one stands, the definition for systemic vulnerability is read as:<\/p>\n<blockquote readability=\"10\">\n<p>systemic vulnerability means a vulnerability that affects a whole class of technology, but does not include a vulnerability that is selectively introduced to one or more target technologies that are connected with a particular person. For this purpose, it is immaterial whether the person can be identified.<\/p>\n<\/blockquote>\n<p>The definition for systemic weakness is identical, except the word vulnerability is substituted by weakness.<\/p>\n<p>According to <a href=\"https:\/\/parlinfo.aph.gov.au\/parlInfo\/search\/display\/display.w3p;query=Id%3A%22legislation%2Famend%2Fs1178_amend_8f376ae3-8101-4f3f-a072-893da4bf98e5%22\" target=\"_blank\" rel=\"noopener noreferrer\">Labor&#8217;s amendment<\/a> agreed to by the Senate on Thursday morning, the pair of systemic terms are used in a new Section 317ZG that will prohibit:<\/p>\n<ul>\n<li>The implementation or creation of decryption capabilities;<\/li>\n<li>An action that would render authentication or encryption less effective; and<\/li>\n<li>An act or thing that could create a material risk to otherwise secure information or could be accessed, used, or compromised by a third party<\/li>\n<\/ul>\n<p>Other clauses in the amendment clarify that technical assistance requests, technical assistance notices, and technical capability notices cannot be used to access the information of people who are not the subject of, or communicating directly with those who are the subject of, an investigation to which the request or notice applies.<\/p>\n<p>The amendment was passed 37-28, with government Senators having voted against the amendments.<\/p>\n<p><strong>Must read:\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/australias-encryption-laws-will-fall-foul-from-differing-definitions\/\">Australia&#8217;s encryption laws will fall foul of differing definitions<\/a><\/strong>\u00a0<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Senator Jordan Steele-John said the Australian Greens would back the Labor amendments because they made a bad Bill &#8220;slightly better&#8221;.<\/p>\n<p>The committee process was suspended at 11:45am AEDT, with three more Labor amendments set to be voted upon.<\/p>\n<p>Any amendments made by the Senate will need to get back to the lower house to become law.<\/p>\n<p>On Tuesday night in the House of Representatives, Labor Shadow Attorney-General Mark Dreyfus said the government&#8217;s amendments that were agreed to and passed by Labor last year were inadequate.<\/p>\n<p>&#8220;It is not tenable to argue, as the government continues to argue, that its amendments largely implemented the committee&#8217;s 17 recommendations. No reasonable person accepts that,&#8221; Dreyfus said.<\/p>\n<p>&#8220;The Inspector-General of Intelligence and Security, who has made a public submission to the committee, doesn&#8217;t accept it. Industry doesn&#8217;t accept it. Lawyers and other civil society groups don&#8217;t accept it. The Commonwealth Ombudsman has even told the committee that the government&#8217;s amendments are inconsistent with the Ombudsman&#8217;s role as an independent and impartial office.<\/p>\n<p>&#8220;This fiasco of lawmaking is what a job well done looks like to this chaotic government.&#8221;<\/p>\n<p>The government Bill before the Senate allowed Australia&#8217;s anti-corruption agencies to use the encryption laws.<\/p>\n<h3>Related Coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australian-anti-corruption-bodies-should-get-encryption-busting-powers-pjcis\/\">Australian anti-corruption bodies should get encryption-busting powers: PJCIS<\/a><\/strong><\/p>\n<p>Exclusion of anti-corruption agencies was an interim measure, Andrew Hastie has said.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/canberra-ignoring-overwhelming-empirical-evidence-on-encryption-busting\/\">Canberra ignoring &#8216;overwhelming empirical evidence&#8217; on encryption busting<\/a><\/strong><\/p>\n<p>Associate professor Vanessa Teague believes Canberra is ignoring efforts from experts to explain why the encryption-busting laws are the wrong approach.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/nsw-police-corruption-body-wants-access-to-encrypted-communications\/\">NSW police corruption body wants access to encrypted communications<\/a><\/strong><\/p>\n<p>Excluding the Law Enforcement Conduct Commission from accessing encrypted communications may encourage police corruption more broadly, it has argued.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/home-affairs-reveals-australian-authorities-already-using-new-encryption-powers\/\">Home Affairs reveals Australian authorities already using new encryption powers<\/a><\/strong><\/p>\n<p>The Department of Home Affairs has been told law enforcement and national security agencies are already using the Act as the department continues to &#8216;support&#8217; its implementation.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/afp-concerned-about-approving-state-police-usage-of-australias-encryption-laws\/\">AFP concerned about approving state police usage of Australia&#8217;s encryption laws<\/a><\/strong><\/p>\n<p>Concerns over a federal body overseeing the operations of state and territory authorities.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australian-industry-groups-issue-wish-list-of-encryption-law-changes\/\">Australian industry groups issue wish list of encryption law changes<\/a><\/strong><\/p>\n<p>Some old, some new, some borrowed from the Labor party.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Labor amendment to replace the definitions of the terms systemic weaknesses and systemic vulnerability has agreed to by the Senate on Thursday.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25237,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-25236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T01:35:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws\",\"datePublished\":\"2019-02-14T01:35:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\"},\"wordCount\":637,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\",\"name\":\"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png\",\"datePublished\":\"2019-02-14T01:35:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/","og_locale":"en_US","og_type":"article","og_title":"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-14T01:35:42+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws","datePublished":"2019-02-14T01:35:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/"},"wordCount":637,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/","url":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/","name":"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png","datePublished":"2019-02-14T01:35:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/australian-senate-votes-to-replace-systemic-weakness-and-vulnerability-definitions-in-encryption-laws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Australian Senate votes to replace systemic weakness and vulnerability definitions in encryption laws"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25236"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25236\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25237"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}