{"id":9499,"date":"2018-08-14T05:02:41","date_gmt":"2018-08-14T05:02:41","guid":{"rendered":"http:\/\/c1dfa162-063e-46bb-b9e5-2cd271801b31"},"modified":"2018-08-14T05:02:41","modified_gmt":"2018-08-14T05:02:41","slug":"no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/","title":{"rendered":"No backdoors for Australian encryption, just a riddling of ratholes"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2017\/07\/14\/24f322b2-c660-4066-a4ee-fa9dd2821289\/thumbnail\/770x578\/d2a82e5236f40f358bda153f582b4de8\/malcolm-turnbull-prime-minister-austrlia-george-brandis-small.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>When Australian&#8217;s former favourite Attorney-General Senator George Brandis QC said in mid-2017 that encrypted messaging was &#8220;impeding lawful access to the content of communications&#8221;, fears of a government-mandated backdoor in encryption systems soon erupted.<\/p>\n<p>But the government listened to those concerns. As your writer <a href=\"https:\/\/www.zdnet.com\/article\/australias-encryption-thwart-thought-is-fraught\/\" target=\"_blank\">predicted last year<\/a>, the <a href=\"https:\/\/www.homeaffairs.gov.au\/consultations\/Documents\/the-assistance-access-bill-2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 [PDF]<\/a>, which was <a href=\"https:\/\/www.zdnet.com\/article\/canberra-gives-decryption-another-crack-with-draft-legislation\/\" target=\"_blank\">released on Tuesday<\/a>, contains no weakening of encryption, and certainly no &#8220;war on mathematics&#8221;.<\/p>\n<p>The Bill makes it clear that there are to be no backdoors, or at least that&#8217;s the intent. It defines &#8220;designated communications providers&#8221; to include foreign and domestic communications providers, device manufacturers, component manufacturers, application providers, and traditional telecommunications carriers and carriage service providers.<\/p>\n<p>Providers must not be required to &#8220;implement or build a systemic weakness, or a systemic vulnerability, into a form of electronic protection; or prevent a designated communications provider from rectifying a systemic weakness, or a systemic vulnerability, in a form of electronic protection&#8221;.<\/p>\n<p>What the Bill does create, amongst many other things, is a framework for providing access to endpoint devices. That&#8217;s where messages can be intercepted before they&#8217;re encrypted and sent, or after they&#8217;ve been received and decrypted.<\/p>\n<p>As the <a href=\"https:\/\/www.homeaffairs.gov.au\/consultations\/Documents\/explanatory-document.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">explanatory document [PDF]<\/a> sets out, providers can be required to install, maintain, test, or use software that a law-enforcement or intelligence agency has given them. Clearly, this would include installing government spyware on specific target devices.<\/p>\n<p>Providers can also be made to substitute a service they provide with a different service, either one of their own or another provider&#8217;s. That could well include redirecting target devices to a different update server, so they receive the spyware as a legitimate vendor update.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>They&#8217;re just examples. I&#8217;m sure you can think of more. But wouldn&#8217;t such legislative and technical processes for installing unwanted software on selected target devices be a &#8220;systemic weakness&#8221;?<\/p>\n<p>Or is it OK because it isn&#8217;t breaking &#8220;a form of electronic protection&#8221;? Nothing is being broken. Aren&#8217;t these software installation pathways, tunnels, and hidden ratholes already part of the infrastructure?<\/p>\n<p>These questions are left as an exercise for the reader.<\/p>\n<p>The Bill weighs in at 176 pages, plus 110 pages in the explanatory document. It&#8217;ll take a while to analyse the proposed policy, and check whether the wording of the Bill actually matches the intention. But a few weirdnesses have already been spotted.<\/p>\n<p>The demands made of providers are expected to be &#8220;reasonable, proportionate, practicable, and technically feasible&#8221;.<\/p>\n<p>The decision maker must consider the interests of the agency as well as the provider. That includes the availability of other means to reach their objectives, the likely benefits to an investigation, and the likely business impact on the provider. They must also consider wider public interests, such as any impact on privacy, cybersecurity, and innocent third parties.<\/p>\n<p>But the decision maker is, essentially, the agency making the request. That&#8217;s hardly a neutral party.<\/p>\n<p>Section 317S of the Bill is cute. It says the attorney-general can create &#8220;procedures and arrangements&#8221; to be followed when requesting technical capability notices. They&#8217;re the documents requiring a provider to build a new capability, so they can give assistance as required. But failing to comply with those procedures doesn&#8217;t invalidate the notice.<\/p>\n<p>Finally, there&#8217;s the government&#8217;s framing of the legislation as part of the fight against paedophiles, terrorists, and organised criminals. Of course, nearly <a href=\"https:\/\/www.zdnet.com\/article\/telco-national-security-bill-passes-parliament\/\" target=\"_blank\">every new law-enforcement power<\/a> is sold that way.<\/p>\n<p>But the new powers could actually be used for &#8220;enforcing the criminal law and laws imposing pecuniary penalties; or assisting the enforcement of the criminal laws in force in a foreign country; or protecting the public revenue; or the interests of Australia&#8217;s national security, the interests of Australia&#8217;s foreign relations, or the interests of Australia&#8217;s national economic well-being&#8221;.<\/p>\n<p>Misrepresentation, much?<\/p>\n<p>There&#8217;s still plenty to consider in this Bill, but the deadline for public comments is just four weeks away, on September 10.<\/p>\n<h3><strong>PREVIOUS AND RELATED COVERAGE<\/strong><\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/canberra-gives-decryption-another-crack-with-draft-legislation\/\" target=\"_blank\">Canberra gives &#8216;decryption&#8217; another crack with draft legislation<\/a><\/strong><\/p>\n<p>The Australian government is still committed to &#8216;no backdoors&#8217;, publishing draft legislation that will force internet companies to assist law enforcement in decrypting messages sent with end-to-end encryption.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australias-semantic-sleight-of-hand-on-encrypted-messaging-revealed\/\">Australia&#8217;s semantic sleight of hand on encrypted messaging revealed<\/a><\/strong><\/p>\n<p>Newly-released documents confirm that the Australian government&#8217;s commitment to &#8216;no backdoors&#8217; to weaken encryption algorithms doesn&#8217;t preclude backdoors elsewhere in the secure messaging pipeline.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australian-government-committed-to-no-backdoors-taylor\/\">Australian government committed to &#8216;no backdoors&#8217;: Taylor<\/a><\/strong><\/p>\n<p>&#8216;We simply don&#8217;t need to weaken encryption in order to get what we need,&#8217; says cyber security minister Angus Taylor, but trust in our civilisation is crumbling.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/thou-shalt-be-secure-rsa-says-you-cant-force-private-sector-to-break-encryption\/\"><strong>Thou shalt be secure: RSA says you can&#8217;t force private sector to break encryption<\/strong><\/a><\/p>\n<p>RSA&#8217;s VP and GM of Global Public Sector Practice Mike Brown believes there&#8217;s a better way to thwart terrorism than breaking end-to-end encryption, as recently proposed by the Australian government.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/australia-called-out-as-willing-to-undermine-human-rights-for-digital-agenda\/\"><strong>Australia called out as willing to undermine human rights for digital agenda<\/strong><\/a><\/p>\n<p>A report from AccessNow has asked Australia to change its course and lead the way in serving as a champion for human rights instead of against.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Draft legislation intended to give cops and spooks access to encrypted communications should keep encryption strong. But the powers it proposes aren&#8217;t just about fighting paedophiles, terrorists, and organised criminals.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9500,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-9499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>No backdoors for Australian encryption, just a riddling of ratholes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No backdoors for Australian encryption, just a riddling of ratholes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-14T05:02:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"No backdoors for Australian encryption, just a riddling of ratholes\",\"datePublished\":\"2018-08-14T05:02:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\"},\"wordCount\":874,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\",\"name\":\"No backdoors for Australian encryption, just a riddling of ratholes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png\",\"datePublished\":\"2018-08-14T05:02:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"No backdoors for Australian encryption, just a riddling of ratholes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No backdoors for Australian encryption, just a riddling of ratholes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/","og_locale":"en_US","og_type":"article","og_title":"No backdoors for Australian encryption, just a riddling of ratholes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-14T05:02:41+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"No backdoors for Australian encryption, just a riddling of ratholes","datePublished":"2018-08-14T05:02:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/"},"wordCount":874,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/","url":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/","name":"No backdoors for Australian encryption, just a riddling of ratholes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png","datePublished":"2018-08-14T05:02:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"No backdoors for Australian encryption, just a riddling of ratholes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=9499"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9499\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/9500"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=9499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=9499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=9499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}