Backdoor access means that tech companies would create a way for government authorities to bypass encryption, allowing them to access private communications for surveillance and investigation. Proponents argue that it helps law enforcement and intelligence agencies prevent terrorism and criminal activities by providing necessary access to information. Opponents argue that it compromises user privacy, weakens overall security, and could be exploited by malicious actors.
Statistics are shown for this demographic
Voting for candidate
Local Government Area
State Electorate
Suburb
Postcode
Response rates from 7.5k Australia voters.
50% Yes |
50% No |
50% Yes |
50% No |
Trend of support over time for each answer from 7.5k Australia voters.
Loading data...
Loading chart...
Trend of how important this issue is for 7.5k Australia voters.
Loading data...
Loading chart...
Unique answers from Australia voters whose views went beyond the provided options.
@9ZZ7YJ32wks2W
No, any backdoor that exists for national security purposes also exists for anyone else clever enough to find it. There is no such thing as a backdoor that only specific people can use.
@9ZLXJRX1mo1MO
Under strict conditions. Don’t want government investigating people for disagreeing with government policy
@9WV5Y6Z2mos2MO
Possibly, again, this appears to be for of a federal government question. Sounds suspicious or not in depth with detail etc.
@9WR5QQW2mos2MO
Tech campanies should be required only when there is sufficient reason to believe activities pertaining to the risk of national security are occuring, it should not be by default.
@9WK3YLP2mos2MO
maybe but there needs to be new regulations put in place to protect privecy such as needing a worrant for someting to do that kind of investigation
@9WBP9K52mos2MO
Like bugging and telephone wire taps in the past, it would seem reasonable for gov agencies to have access where a reasonable suspicion exists and a magistrate has granted access.
@9W7FMBV2mos2MO
I believe no for a general rule, as that can be harmful for privacy, yet there should be systems in place to flag dangerous online activity like engaging in human trafficking and weapons trafficking.
@9SYC4SQ4mos4MO
Only provide case by case basis and court orders for known terrorists.
Join in on the most popular conversations.