Feeds

Oz watchdogs howl over 'Cyber-Safety' net filter

Can you opt-out?

Secure remote control for conventional and virtual desktops

Aussie civil liberties watchdogs are warning the country's "Cyber-Safety" internet filter plan won't actually let adults choose to opt-out from web censorship.

The Australian Labor party's $125.8m proposal is being pitched as a means to prevent children from accessing online pornography. The scheme includes a choice to opt-out, but many are now claiming the option won't in fact prevent internet censorship altogether.

Electronic Frontiers Australia (EFA) said even those who don't want their internet filtered will still be put on a second, secret blacklist designed to block "illegal" content.

"The news for Australian Internet users just keeps getting worse," said EFA spokesperson Colin Jacobs. "We have legitimate concerns with the creeping scope of this unprecedented interference in our communications infrastructure. It's starting to look like nothing less than a comprehensive program of real-time Internet censorship."

The concern appears to have its origins from a forum post by Mark Newton, a network administrator for the ISP Internode.

"The Government's plan is for there to be two blacklists, one for 'unsuitable for children,' and another one for 'unsuitable for adults,'" he wrote.

"The much-touted 'opt-out' would merely involve switching from blacklist number 1 to blacklist number 2."

"Under the proposal, there's no scope at all to switch to no blacklist at all. Regardless of your personal preference, your traffic will pass through the censorship box."

Reports of a secret secondary blacklist remain unconfirmed, due to the government's mixed messages on proposed opt-out provisions.

But the threat of such a system is enough to make pundits rather uneasy. Not only because the filter may incorrectly block websites or even controversial opinions, but because it may have an effect on Australia's internet speed and availability. ®

Intelligent flash storage arrays

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.