And whatever crypto tech is enabled is irrelevant. The Australian government has already enacted laws that can force anybody in Australia to backdoor, hack or whatever to access anything they want.
Anyways, it’s just obvious that you access the data BEFORE it is encrypted. Quantum encrypt/E2EE it however you want after I already have the data.
Don’t you remember that the laws of mathematics don’t apply to Australia
The point here is the exact opposite of that nonsense though. It’s that in order for something to meet certain specific standards (HACE), it must not use quantum-unsafe cryptographic protocols by that time. It’s a push to say “hey, you should be using better encryption”.
BAHAHHAHAHAHHAHAHA!
Are you kidding me?
Don’t you remember that the laws of mathematics don’t apply to Australia
And whatever crypto tech is enabled is irrelevant. The Australian government has already enacted laws that can force anybody in Australia to backdoor, hack or whatever to access anything they want.
Anyways, it’s just obvious that you access the data BEFORE it is encrypted. Quantum encrypt/E2EE it however you want after I already have the data.
The point here is the exact opposite of that nonsense though. It’s that in order for something to meet certain specific standards (HACE), it must not use quantum-unsafe cryptographic protocols by that time. It’s a push to say “hey, you should be using better encryption”.