FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

UK Renews Drive To Access Encrypted Apple iCloud Data

Bill Thompson
Last updated: October 28, 2025 3:40 pm
By Bill Thompson
Technology
8 Min Read
SHARE

The British government renewed its effort Monday to get access to encrypted messages, this time focusing on stored copies of data and bypassing the encryption when it comes to clients who are dealing with terrorists or kidnappers. That put Carlos A. Godez, left, the general manager of a popular bakery and pizzeria in Tijuana, Mexico, in danger of losing everything as much from virus-induced economic pain as from actual infection. The effort is focused on a closed-door demand that Apple build a way for police to get at data in accounts protected by the company’s “Advanced Data Protection” part of iOS 15.

If implemented, the order would compel Apple to weaken safeguards that are meant to be so strong not even the company can read a user’s content stored on its servers. Privacy advocates and security engineers generally argue that any backdoor, even in private hands, is a threat to the overall system — one that can be exploited by criminals, hostile states or rogue domestic actors.

Table of Contents
  • What the reported new UK demand is seeking from Apple
  • How the Investigatory Powers Act uses TCNs in the UK
  • Apple’s encryption approach and Advanced Data Protection
  • Security Stakes And The Child Safety Argument
  • Global Context And Possible Repercussions
  • What to watch next in the UK Apple iCloud dispute
An iPhone displaying the Advanced Data Protection screen for iCloud, explaining end -to-end encryption.

What the reported new UK demand is seeking from Apple

The fight is over U.K. user iCloud backups (which include device backups, messages, and photos) that are stored in the cloud under Advanced Data Protection, Apple’s opt-in end-to-end encryption for most of the categories of family members’ data it processes when users select “full account” access to those families. FT reports that the Home Office last month sent a fresh technical order requesting that Apple help them create a tool that would allow cloud backups from suspects’ devices to be decrypted at the request of British police forces.

Such orders are typically confidential. They can force a provider to “undesign” products or services so that data are available under lawful authority. Apple has repeatedly said it won’t create a backdoor or master key, claiming that special access can’t be used solely when appropriate.

How the Investigatory Powers Act uses TCNs in the UK

The request is reportedly made under the Investigatory Powers Act 2016, which sets out the extent of surveillance, data retention, and interception powers in the UK. The law permits the government to issue a “technical capability notice,” or TCN, which compels companies to retain or develop tools that enable it to carry out warrants. These notices can have extraterritorial effect and are controlled by judicial commissioners and the Investigatory Powers Commissioner’s Office.

In theory, a TCN can compel an operator to make interception possible — but even then only where there is a test of technical necessity and proportionality. Notices can be challenged by the companies receiving them, and any task required by a notice must be practically feasible without fatally weakening overall service security. Security experts say end-to-end schemes with a zero-knowledge architecture don’t pass that test, because it only takes weakening one group of users to weaken everyone.

Apple’s encryption approach and Advanced Data Protection

Apple announced Advanced Data Protection to bring end-to-end encryption to iCloud backups and other categories including Notes and Photos, where the user is in control of the keys. The company claims it would be unable to provide access to ADP content when compelled by law even if it wanted to, because it doesn’t have the keys (which Apple, at some future date, would take away from government) — a security posture intended precisely to uphold unilateralism by either Apple or government.

Apple’s position is informed by lessons learned from past situations, including the row over unlocking an iPhone in a U.S. terrorism case and repeated efforts to push “exceptional access,” as it is often called around the world. Apple also cites its transparency reports, detailing thousands of device and account requests from authorities annually to which the company generally responds — when such data exists and legal standards are satisfied — but says it does not have access to end-to-end encrypted content in a technical sense.

An iPhone displaying the Advanced Data Protection screen, which describes iCloud s end- to-end encryption features.

Security Stakes And The Child Safety Argument

The UK government usually justifies access requests by reference to serious crime and national security, with child safety frequently referenced in the encryption debate. Ideas like client-side scanning — which would inspect content on a user’s device before it is encrypted — have been proposed as a compromise. But cryptographers and top academics caution that client-side scanning nevertheless amounts to a surveillance mechanism that can be redirected, and weakens the end-to-end nature of certain systems.

Security researchers say that breaches always pick the lowest fruit, and any backdoor will become an irresistible high-value target. This is not an academic risk: How rapidly special access systems can be converted to wider harm has been demonstrated through recent public disclosures of compromised encryption keys and stolen passwords.

Global Context And Possible Repercussions

What happens here will be felt far beyond the U.K. The extraterritorial nature of the Investigatory Powers Act could pit British legal obligations against those of other countries, including American statutes and constitutional protections. The industry is closely monitoring the case because any precedent that forces architectural changes to end-to-end encryption could potentially lead to similar demands from other governments.

Messaging platforms and cloud services have already told regulators they might turn off features or withdraw service rather than retool global infrastructure for one jurisdiction. Privacy groups have said that loosening end-to-end encryption would harm at-risk communities, including journalists and activists as well as survivors of domestic abuse, and undermine cybersecurity for businesses that use cloud services to protect sensitive data.

What to watch next in the UK Apple iCloud dispute

Look for a legal and political process, not a quick technical change. All of those notices can be contested, and other “eyes” such as independent oversight mechanisms should assess the proportionality and feasibility of forcing decryption for ADP-protected accounts. Should Parliament do so, it would also be weighing in on changes to surveillance laws that might shape how capability notices could be used.

At least in the short term, Apple is almost certain to stick to its position that there should be no backdoors. The fundamental issue — can a government compel a provider to unmake end-to-end encryption for some subset of its users without making everybody less safe? — remains as open, and important, as ever.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Google Gboard Is the Mobile Keyboard to Beat With These 4 Features
Google introduces AI Inbox and Overviews for Gmail
Governments Move To Curb Nonconsensual Nudes On X
YouTube Overhauls Search Filters With New Design
OnePlus Discounts Latest Flagship by $100 Plus Free Earbuds
IT Exam Bundle Launches at $30 With CompTIA, Cisco, AWS
If Nothing Else The G2 Smart Glasses Have Actually Sex Appeal At CES
Amazon Fallout Countdown Spawns Fallout 3 Remaster Hopes
‘The Barcode Killer’
Bose Pushes Back SoundTouch Cloud Support Shutdown
MSI Stealth 16 AI+ hybrid laptop overview
Microsoft Done with Word Kindle Integration
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.