{"id":32695,"date":"2017-07-26T09:41:06","date_gmt":"2017-07-26T13:41:06","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-laws-carrot-not-stick-likely-to-work-itwire.php"},"modified":"2017-07-26T09:41:06","modified_gmt":"2017-07-26T13:41:06","slug":"encryption-laws-carrot-not-stick-likely-to-work-itwire","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-laws-carrot-not-stick-likely-to-work-itwire.php","title":{"rendered":"Encryption laws: carrot, not stick, likely to work &#8211; iTWire"},"content":{"rendered":"<p><p>    When Prime Minister Malcolm Turnbull and Attorney-General    George Brandis get down to the nitty-gritty of formulating    proposed changes to encryption laws which they have talked    about, they might like to stop and consider one fact: most tech    companies will bend over backwards if they have something to    gain from it.  <\/p>\n<p>    The case of Apple is illustrative. The company earned kudos    from champions of personal privacy last year when it    put up    opposition to an FBI move to gain access to the    contents of an iPhone which had been used by one of the    terrorists involved in an incident in San Bernardino,    California.  <\/p>\n<p>    Annoyed by the FBI's move to take the matter to the courts,    without first quietly approaching the company, Apple put up    stiff resistance.  <\/p>\n<p>    But the same Apple has now announced    plans for opening a new data centre in China in    order to comply with the government's demands to store Chinese    customer data within the country. Despite the cost and    inconvenience, Apple realises that there is a lot of money to    be made in China.  <\/p>\n<p>    Take the example of Microsoft. In May, the company    released    a version of its Windows operating system known as Windows 10    China Government Edition, a version vetted by the Beijing    authorities and deemed suitable for use by the country's public    sector.  <\/p>\n<p>    There is plenty of money to be made by supplying operating    systems to China's public sector; given that Microsoft was    willing to show its crown jewels to the authorities. Money does    indeed make the mare go.  <\/p>\n<p>    One could go on. Practically every big tech company jumps    through hoops when there is a pot of gold on the other side.    Google, Facebook, Amazon, Yahoo!, they all say one thing in    public, but buckle down to government demands provided there is    something in it for them.  <\/p>\n<p>    Given this, Turnbull and Brandis might like to think of some    carrots that they can dangle in front of the tech companies    whose encrypted products they are seeking access to. Wielding a    stick, as Turnbull has done    thus far, is unlikely to help.  <\/p>\n<p>    Would your office survive without a phone, fax or email?  <\/p>\n<p>    Avoid disruption and despair for your business.  <\/p>\n<p>    Learn the NBN tricks and traps with your FREE 10-page NBN    Business Survival Guide  <\/p>\n<p>    The NBN Business Survival Guide answers your key questions:  <\/p>\n<p>     When can I get NBN?     Will my business phones work?     Will fax & EFTPOS be affected?     How much will NBN cost?     When should I start preparing?<\/p>\n<p>        DOWNLOAD NOW!  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.itwire.com\/open-sauce\/79175-encryption-laws-carrot,-not-stick,-likely-to-work.html\" title=\"Encryption laws: carrot, not stick, likely to work - iTWire\">Encryption laws: carrot, not stick, likely to work - iTWire<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When Prime Minister Malcolm Turnbull and Attorney-General George Brandis get down to the nitty-gritty of formulating proposed changes to encryption laws which they have talked about, they might like to stop and consider one fact: most tech companies will bend over backwards if they have something to gain from it. The case of Apple is illustrative<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32695","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32695"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32695"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32695\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}