{"html":"\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1096,\u0026quot;title\u0026quot;:\u0026quot;What kind of rear window into encryption do the Five Eyes want? \u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Toby Murray, Associate Professor Vanessa Teague, Dr Chris Culnane and Dr Suelette Dreyfus\u0026quot;,\u0026quot;word_count\u0026quot;:1474}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/what-kind-of-rear-window-into-encryption-do-the-five-eyes-want\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--BoJZbRfh--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/947/222/082/94722208240313b55f0a7cec06228d7a8a596ccdd92d92b574f3e8f6479f.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e2 July 2017\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eWhat kind of rear window into encryption do the Five Eyes want? \u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eAs the government plans to force tech firms to decrypt messages to help \u0026quot;thwart\u0026quot; terrorism, University of Melbourne experts say it could make us more vulnerable\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1009,\u0026quot;title\u0026quot;:\u0026quot;Q\\u0026amp;A: The ransomware cyber-attack fallout\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Toby Murray, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:1884}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/q-amp-a-the-ransomware-cyber-attack-fallout\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--g4qxBRuA--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/72a/593/3b8/72a5933b88bf76aba4d358bad102ab1c1017ce2ca17b2130bc26fab7df8a.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e16 May 2017\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eQ\u0026amp;A: The ransomware cyber-attack fallout\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eComputers in 150 countries were attacked by the WannaCry ransomware – we ask University of Melbourne computer experts what we’ve learned from the hack.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:886,\u0026quot;title\u0026quot;:\u0026quot;iVote West Australia: Who voted for you?\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Vanessa Teague, Dr Aleksander Essex, Dr Chris Culnane, Dr Yuval Yarom and Mark Eldridge\u0026quot;,\u0026quot;word_count\u0026quot;:1330}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/ivote-west-australia-who-voted-for-you\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-2.cloudinary.com/the-university-of-melbourne/image/upload/s--e6Xhp553--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/946/e66/663/946e666639c12228687d848f034f11b0922e0b28448b360765221cf12788.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e5 March 2017\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eiVote West Australia: Who voted for you?\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eVoters casting online ballots must be able to trust the process. In a world where hackers have been accused of meddling in elections, iVote is not the answer.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:737,\u0026quot;title\u0026quot;:\u0026quot;Crime and privacy in open data\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Benjamin Rubinstein, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:442}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/crime-and-privacy-in-open-data\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-2.cloudinary.com/the-university-of-melbourne/image/upload/s--Yh3d6rQh--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/2b4/12c/deb/2b412cdebd608d010ee9e1e58ce3ba17ebea963ce23425edbbba0bc6ba84.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e28 October 2016\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eCrime and privacy in open data\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eTesting the strength of methods used for protecting privacy in open data is critical, and criminalising it will only endanger privacy.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:696,\u0026quot;title\u0026quot;:\u0026quot;Understanding the maths is crucial for protecting privacy\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Benjamin Rubinstein, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:939}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/understanding-the-maths-is-crucial-for-protecting-privacy\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--BIfQPiIF--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/c7c/433/a5a/c7c433a5a0973bc474859dfcf98a212b710f54bdd25ab89dfc0eb58aca5c.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e29 September 2016\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eUnderstanding the maths is crucial for protecting privacy\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eResearchers have decrypted the service provider ID numbers in a 10% sample of the Medicare Benefits Schedule, raising serious implications around privacy.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e","next":null}