Reply to post:

Data retention: ASIO says Web browsing habits would need a warrant


>Hacker attacks on our national infrastructure [or] espionage attempts to obtain our secrets

Hint : Hide your secrets a little bit better to start of with rather than leaving them lying about.

>“If we can watch traffic going through that third-party computer, discarding anything we don't need

So they will discard the trail left behind your prOn perusal ( pull the other one)... And just how will they decide what is and what is not necassary. After all you might be an aspiring terrorist or a peado so they will just keep everything anyway...

>simply looking at the malicious signatures and where they come from, we have taken a great stride forward,”

Only to find that the comprised PC is being controlled by a CC in another far away country. So in other words it gets them no-where other than being able to spy on your PC....

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2022