In a recent move aimed at weakening robust encryption safeguards, the U.K. government has purportedly directed Apple to create a backdoor, granting British security forces access to the encrypted cloud storage data of Apple users worldwide.
This covert directive, issued under the U.K.’s Investigatory Powers Act 2016, commonly referred to as the Snoopers’ Charter, seeks to compromise Apple’s end-to-end encryption feature for iCloud backups, termed Advanced Data Protection. This feature ensures that only Apple users can access the information stored on their devices, with Apple itself having no access to it.
While the U.K. government has refrained from commenting to TechCrunch regarding the allegations, British officials have consistently claimed that end-to-end encryption hampers their ability to gather digital evidence necessary for criminal prosecutions and national security intelligence.
Once activated, Apple’s encrypted backup feature closes off a loophole that law enforcement typically exploits to gain access to cloud-stored information, which would otherwise be irretrievable on most current iPhones equipped with device encryption.
According to The Washington Post, which originally reported the news, Apple is likely to discontinue the iCloud encryption feature for users in the U.K. in response to this secretive directive, rather than compromising the encryption for users globally.
Previously, Apple indicated that its encrypted communication tools, including FaceTime and iMessage, might be jeopardized in the U.K. due to efforts aimed at expanding governmental surveillance capabilities.
Global Implications
If Apple were to remove its enhanced iCloud encryption for U.K. users, the repercussions could extend beyond British shores.
Rebecca Vincent, who leads the privacy and civil liberties advocacy group Big Brother Watch, cautioned that the U.K. government’s “draconian” order would not enhance public safety, but would rather “diminish the fundamental rights and civil liberties of the entire population.”
Although the practical workings of the U.K. order remain uncertain—removing Advanced Data Protection would primarily make the cloud data of U.K. citizens accessible to law enforcement—the announcement has raised alarms about potentially compromising the security of millions of Apple device users globally.
Experts in security and privacy have also indicated that the U.K. could establish a perilous global precedent that authoritarian regimes and cybercriminals would eagerly leverage—any backdoor designed for government use could be exploited by hackers and foreign governments alike.
Thorin Klosowski, a privacy advocate at the U.S.-based Electronic Frontier Foundation, similarly warned in a blog entry that the U.K.’s demands will have repercussions that resonate globally, making the covert order an “urgent issue for us all.” James Baker from the Open Rights Group stated last week that these initiatives are “alarming… and will diminish safety for everyone.”
A Security Lesson Unheeded
The potential global repercussions of the U.K. government’s directive have ignited criticism, with concerns that it could place the U.K. at odds with several of its key allies.
This news comes only weeks after U.S. security officials encouraged Americans to utilize encrypted messaging platforms to protect their communications from being intercepted by adversarial nations. This advisory was prompted by reports of a prolonged covert hacking campaign by Chinese government operatives aimed at infiltrating vital U.S. infrastructure, along with telecommunications and internet giants.
The Computer & Communications Industry Association, a U.S. tech industry group representing IT and telecom sectors, noted that the hacks perpetrated by the so-called “Typhoon” group of China-backed hackers demonstrate that “end-to-end encryption may be the only shield protecting Americans’ sensitive personal and business data from foreign adversaries.”
“Discussions regarding Americans’ privacy and security should take place in the United States, transparently and openly, not through clandestine mandates from abroad that demand leaving keys under doormats,” stated the CCIA.
Chris Mohr, president of the U.S.-based Software & Information Industry Association, issued a similar caution, labeling the U.K. order as “both misguided and perilous.”
“In light of the Salt Typhoon incident, we must adopt policies that enhance information security, not diminish it,” said Mohr, referring to the China-backed group that targeted telecommunications companies. “We urge the Trump Administration and U.S. Congress to firmly oppose this troubling trend.”
The Chinese hacks that affected telecommunications and internet corporations, including AT&T and Verizon, serve as a contemporary illustration of why the U.K. government’s request for backdoors from Apple is fundamentally flawed.
The Salt Typhoon group executed these breaches, which are considered one of the most significant hacks in recent history, by exploiting a legally mandated backdoor that telecom companies are required to provide to law enforcement and intelligence agencies upon request.
“The lesson will continue to be reiterated until it is learned: a backdoor cannot be designed to exclusively allow entry for the good and prevent access for the bad,” according to the Electronic Frontier Foundation. “It’s essential for all of us to acknowledge this reality and implement measures to establish genuine security and privacy for everyone.”
Compiled by Techarena.au.
Fanpage: TechArena.au
Watch more about AI – Artificial Intelligence


