Daily Bulletin


The Conversation

  • Written by David Glance, Director of UWA Centre for Software Practice, University of Western Australia
image

As of today, Australian ISPs and telecommunications companies are officially required to collect “metadata” about their customers’ communications. According to the legislation, this data includes:

  • name, address, date of birth, email addresses and other identifying information of the person that holds an account
  • details of any communication, including:
    • the mode of communication (voice, sms, email, chat, forum, social media)
    • the location of the person at the start and end of the communication
    • the address and details of the receiver of the communication
    • the network used for the communication (ADSL, Wi-Fi, VoIP, cable, etc)

What it does not include is details of web sites a person visits and nor does it include information about what they did on those sites.

There is still confusion on this point amongst the public and media about more generally about what the data retention law really means for Australians. There is still talk about the need to “hide online browsing” because of this legislation when in fact ISPs are not required to save this information.

Even in the US where privacy rules have been overturned by the House of Representatives, theoretically allowing ISPs to sell or market customer’s browsing history, in practice, ISPs have a vested interest in maintaining customer privacy.

There is still a strong argument to be made about being concerned about the metadata being stored and consequently about the steps Australians can make to protect their privacy.

The list of Australian government departments that theoretically can access the metadata collected by the ISPs and telecommunications companies is extensive and wide ranging. This means that a larger part of Australians’ lives become accessible to these agencies and the information collected could potentially be used against them.

The most effective way of protecting privacy of communications on the Internet to use a VPN which will quite simply prevent all details of communications (and yes, also browsing history) from being visible to an ISP.

Although the use of a VPN is a good idea for protecting privacy, there are still some risks involved in using this technology. Firstly, VPN users have to trust that the company providing the services is actually doing what they claim and really protecting their customers. Recently, a large number of Android VPN apps have been shown to have significant privacy and security issues with them. Even with the better known VPN providers, customers are required to simply trust that the VPN providers is doing what they claim and not keeping records or logs.

There are a set of well known and well regarded VPN providers that have “mostly” operated without controversy. VPN software has become extremely simple to operate on PCs and mobile devices. With growing numbers of customers, VPN providers have made an effort to scale servers and bandwidth to make the potential slow-downs from using a VPN less noticeable.

Theoretically, a VPN can be set up to operate continuously whenever there is a network connection. This would mean that any subsequent communications done over that network would be entirely private. Using a mobile VPN would allow even the fact that Facetime or WhatsApp was used to communicate with someone to be hidden from an ISP.

Without a VPN, the ISP would record that a Facetime conversation occurred between the customer and another person, the length of the connection and the location of the customer at the time. Of course, identifying the person that the customer talked to would still take some work in tracking down and internet address and again, this information might yield only the address of a VPN provider and not the individual.

VPNs are becoming an essential part of being on the internet. Apart from the privacy aspect, there is the added security they provide, especially when using unknown wireless networks such as in cafes, airports, or even at work. They also provide the ability to avoid geolocked content on services like Netflix which up until the advent of metadata retention, was the main reason for most people using a VPN, especially in Australia.

Given the commitments to privacy and security made by companies like Apple and Google, it would not be at all surprising if they started to provide their own VPN services to customers that were seamlessly built into their devices.

Authors: David Glance, Director of UWA Centre for Software Practice, University of Western Australia

Read more http://theconversation.com/vpns-become-even-more-important-as-isps-start-collecting-customer-metadata-76246

Writers Wanted

How To Find The Right Emergency Plumber Lismore

arrow_forward

Delivery rider deaths highlight need to make streets safer for everyone

arrow_forward

The Conversation
INTERWEBS DIGITAL AGENCY

Politics

Prime Minister Interview with Ben Fordham, 2GB

BEN FORDHAM: Scott Morrison, good morning to you.    PRIME MINISTER: Good morning, Ben. How are you?    FORDHAM: Good. How many days have you got to go?   PRIME MINISTER: I've got another we...

Scott Morrison - avatar Scott Morrison

Prime Minister Interview with Kieran Gilbert, Sky News

KIERAN GILBERT: Kieran Gilbert here with you and the Prime Minister joins me. Prime Minister, thanks so much for your time.  PRIME MINISTER: G'day Kieran.  GILBERT: An assumption a vaccine is ...

Daily Bulletin - avatar Daily Bulletin

Did BLM Really Change the US Police Work?

The Black Lives Matter (BLM) movement has proven that the power of the state rests in the hands of the people it governs. Following the death of 46-year-old black American George Floyd in a case of ...

a Guest Writer - avatar a Guest Writer

Business News

Nisbets’ Collab with The Lobby is Showing the Sexy Side of Hospitality Supply

Hospitality supply services might not immediately make you think ‘sexy’. But when a barkeep in a moodily lit bar holds up the perfectly formed juniper gin balloon or catches the light in the edg...

The Atticism - avatar The Atticism

Buy Instagram Followers And Likes Now

Do you like to buy followers on Instagram? Just give a simple Google search on the internet, and there will be an abounding of seeking outcomes full of businesses offering such services. But, th...

News Co - avatar News Co

Cybersecurity data means nothing to business leaders without context

Top business leaders are starting to realise the widespread impact a cyberattack can have on a business. Unfortunately, according to a study by Forrester Consulting commissioned by Tenable, some...

Scott McKinnel, ANZ Country Manager, Tenable - avatar Scott McKinnel, ANZ Country Manager, Tenable



News Co Media Group

Content & Technology Connecting Global Audiences

More Information - Less Opinion