• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.k. government drops apple encryption backdoor order after u.s. civil

U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

You are here: Home / General Cyber Security News / U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback
August 19, 2025

The U.K. government has apparently abandoned its plans to force Apple to weaken encryption protections and include a backdoor that would have enabled access to the protected data of U.S. citizens.

U.S. Director of National Intelligence (DNI) Tulsi Gabbard, in a statement posted on X, said the U.S. government had been working with its partners with the U.K. over the past few months to ensure that Americans’ civil liberties are protected.

“As a result, the UK has agreed to drop its mandate for Apple to provide a ‘backdoor’ that would have enabled access to the protected encrypted data of American citizens and encroached on our civil liberties,” Gabbard said.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The development comes after Apple switched off its Advanced Data Protection (ADP) feature for iCloud in the U.K. earlier this February, following government demands for backdoor access to encrypted user data.

“We are gravely disappointed that the protections provided by ADP will not be available to our customers in the U.K., given the continuing rise of data breaches and other threats to customer privacy,” the company was quoted as saying to Bloomberg at the time.

Identity Security Risk Assessment

“As we have said many times before, we have never built a backdoor or master key to any of our products or services, and we never will.”

The secret order to require Apple to implement a “backdoor” came in the form of a technical capability notice (TCN) issued by the U.K. Home Office under the Investigatory Powers Act (IPA) to enable blanket access to end-to-end encrypted cloud data, even for users outside the country. The order was issued in January 2025.

Critics have argued that enabling access to encrypted cloud data, including backups, essentially amounts to building a backdoor that could be exploited by cybercriminals and authoritarian governments.

Apple has since appealed the legality of the order, with the Investigatory Powers Tribunal (IPT) denying the Home Office’s attempts to keep the case a secret.

Late last month, Google told TechCrunch that, unlike Apple, it did not receive any request from the U.K. to weaken encryption protections and allow authorities access to customer data.

In a new letter sent to Gabbard, Senator Ron Wyden said Meta “offered an unequivocal denial […] stating that “we have not received an order to backdoor our encrypted services, like that reported about Apple.'”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «why your security culture is critical to mitigating cyber risk Why Your Security Culture is Critical to Mitigating Cyber Risk
Next Post: Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution public exploit for chained sap flaws exposes unpatched systems to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.