Evidence - Telecommunications (Security) Bill
I give this evidence in a personal capacity as an expert in cybersecurity having worked in large-scale internet infrastructure for the past few years and multiple projects to drive cybersecurity standards. Secure communication protocols I’ve developed have been adopted in popular services like Have I Been Pwned?, Google Chrome, Apple iOS and Mozilla Firefox. I have authored over a dozen scholarly computer science papers on the security of communication networks, anonymous communication protoc...