We rely on myGov, but can we trust its code?

Millions of Australians use myGov to access essential services like Medicare, the ATO, and Centrelink.  The myGov Code Generator app is one of the options for enhancing myGov login security.

But is it actually secure?  Services Australia, the agency who publishes it, claims it is.  But when I requested the app’s source code under Freedom of Information (FOI) laws, Services Australia refused, arguing that releasing the code would help “nefarious actors” and compromise security.  In other words: Security by Obscurity.

True security requires transparency. Hiding the code prevents independent experts from auditing the system for flaws.  It also denies secure access to government services for people who do not live in the Google or Apple “walled gardens”, or to people with disabilities and culturally and linguistically diverse cohorts who cannot use the app as designed, but who could use modified or translated versions.

A merits review at the Administrative Review Tribunal (ART)

After years of waiting for the OAIC’s review of Services Australia’s access refusal decision - which they punted on due to the technical nature of the matter - I applied to the Administrative Review Tribunal (ART) for review.  In this proceeding I will challenge the government’s claim that hiding public, publicly-funded software is necessary and in the public interest.

This is not just a fight about source code—it is a fight for the right to know how our government’s essential digital infrastructure works, and for the right to make it better for everyone.

The government will use taxpayers’ money (probably lots of it!) to employ top legal counsel to defend their position of secrecy and control. I need your help to level the playing field in this fight for transparency, security, and freedom.

  • CameronDev
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    3
    ·
    4 days ago

    One plausible reason for hiding the source code is that if Service Australia was forced to fully open source it, it would be trivial for bad actors to make knock-off clones that look and behave identically, while doing other bad things. We all know Google and Apple wouldnt do anything to prevent that happening…

    Maybe a middle ground of releasing the code, but not the assets (images, style sheets, etc) could be reached?

    Either way, I’ll still interested, and I might contribute after doing a bit more reading of his past case.

    • fizzle@quokk.au
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 days ago

      I disagree.

      Its just a 2fa code generator? Or have I misunderstood.

      • CameronDev
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 days ago

        “Just a 2fa code generator” is still a good phishing target. Stealing the 2fa seeds would be incredibly valuable for a bad actor. Which is exactly why it should be audited.

        It does look incredibly basic though, its basically a “my-first-android-app”. So extremely trivial to recreate, which does somewhat nullify my original point about app clones.

        I would be a bit more interested in the MyID app (Made by the ATO, but used more boardly), which has a lot more risk involved (Uploading ID documents, facial data etc).

        • fizzle@quokk.au
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 days ago

          I guess you’re right about 2fa seeds, but I do wonder why the play store isn’t awash with dodgy 2fa seed generators. I’m not naive enough to believe that everything from the play store is “secure” but do they do some kind of rudimentary screening?

      • CameronDev
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 days ago

        Sure, but having the full source makes that even easier.