Greens Senator Scott Ludlam has used upper house debate on metadata laws to hand out tips on how to avoid online data being collected.
Greens Senator Scott Ludlam has helpfully provided Australians with a list of ways to hide their metadata.
His tips show how to navigate around the federal government's latest suite of national security laws which the Greens reckon are an invasion of privacy.
He says if you don't want the government to spy on you online, don't sign on to Australian providers and download software that makes you invisible.
The Senate on Tuesday began debating data retention legislation to force telecommunications companies to hold customer metadata for two years to allow access by police and security agencies.
The government believes the changes are crucial to thwart terrorism attacks and prevent serious crime.
Senator Ludlam acknowledged his party's fierce opposition to the scheme was futile due to political bipartisanship and used his speech to help Australians hide their metadata.
Using overseas email providers, encryption and software to block online behaviour were some examples.
"They leave no trace," he said of encryption phone apps, accusing Communications Minister Malcolm Turnbull of using them to orchestrate a takeover of the prime minister's office.
"They will be completely beyond the reach of this data retention scheme."
Senator Ludlam assured the Senate none of his tips were illegal under the government's draft laws.
He implored Australians to take back their power, but conceded his solution would spell bad news for domestic online providers.
He also accused federal Labor of rolling over as soon as Prime Minister Tony Abbott wrapped himself in an Australian flag and uttered the words "national security".
Labor will support the bill after the government agreed to a number of amendments, including better protection for journalists.
SENATOR LUDLAM'S TIPS TO AVOID DATA RETENTION:
* Use Facebook messenger, Twitter private messages, Gmail or another overseas email provider.
* Download programs like Tor that promise anonymity.
* Use private-key cryptography, available as phone apps.
* Sign on to a virtual private network.