What kind of rear window into encryption do the Five Eyes want?
As the government plans to force tech firms to decrypt messages to help "thwart" terrorism, University of Melbourne experts say it could make us more vulnerable
Q&A: The ransomware cyber-attack fallout
Computers in 150 countries were attacked by the WannaCry ransomware – we ask University of Melbourne computer experts what we’ve learned from the hack.
iVote West Australia: Who voted for you?
Voters casting online ballots must be able to trust the process. In a world where hackers have been accused of meddling in elections, iVote is not the answer.
Crime and privacy in open data
Testing the strength of methods used for protecting privacy in open data is critical, and criminalising it will only endanger privacy.
Understanding the maths is crucial for protecting privacy
Researchers have decrypted the service provider ID numbers in a 10% sample of the Medicare Benefits Schedule, raising serious implications around privacy.
Paper audits crucial for automated counting
Scrutineers holding paper audits are crucial for automated vote counting – it's a key lesson from the PwC report into the 2015 iVote Internet voting project.
The women rebels, geniuses and pioneers who inspired us
To celebrate Ada Lovelace day, some of our leading women academics from science and engineering discuss the female pioneers who inspired them.