Bogdan Botezatu, a senior e-threat analyst at security firm Bitdefender, said on the other hand, the losers would be innocent people who would forfeit their privacy and freedom of speech for nothing.
The encryption laws took effect on Thursday evening after the Senate approved them without any amendments. Labor leader Bill Shorten agreed to pass the laws as such after getting an assurance from the government that the amendments would be passed during Parliament's first sitting in 2019.
The amendments could not be added because the government delayed voting on another bill in the Senate – a cross-party push to amend existing legislation on moving refugees from Manus Island and Nauru to the mainland. This delay prevented it going back to the lower house for a vote as the House of Representatives had risen for the day by then.
"However, in the current form, it seems that regulators are not necessarily looking into weakening encryption or removing it, but rather into forcing service providers to offer full co-operation for covert backdooring," he said.
"Because it is not specified who these 'providers' are or how 'access' will be possible - other than what is summarised in point 2: Introducing new computer access warrants for law enforcement that will enable them to covertly obtain evidence directly from a device - scenarios such as internet service providers transparently planting government-sanctioned spyware on users' devices will become a reality.
"Additionally, application providers who service customers in Australia will be forced to install, maintain, test, or use software that a law-enforcement or intelligence agency has given them."
Botezatu said it was difficult to say what opportunities such backdoors would provide for law enforcement, but it was easy to predict the outcome for the common man.
"Weakening security in any way might help cyber criminals capitalise on technical oversights or user confusion to carry out their own agenda," he said.
"In addition, extremely sophisticated backdoor code likely included with, or installed through, applications or ISPs, will inspire cyber criminals who will include these threat vectors into their existing creations.
"Last, but not least, getting citizens used to cyber surveillance for a good cause can generate chilling effects or a relaxed attitude towards weak security by design. I don't believe that such measures will have a direct impact in curbing terrorism or cyber crime."