Key Takeaways
- The UK government demands backdoor access to all iCloud data (not just UK users’ data) under the Investigatory Powers Act 2016.
- Apple hasn’t officially responded, and under the Snooper’s Charter terms, it won’t be allowed to notify users if encryption is compromised.
- Experts warn this could set a dangerous precedent, making user data vulnerable to hackers and government overreach.
![UK Orders Apple To Grant Access To Its Encrypted User Data](https://techreport.com/wp-content/uploads/2025/02/Untitled-design-67-1200x800.jpg?_t=1739112337)
“Privacy. That’s iPhone.” Well, it looks like that’ll no longer be the case.
The UK government just demanded that Apple give it backdoor access to all the data stored on the cloud. Even more bizarre is the fact that they’re not just seeking access to the data of UK users, but of every single Apple user worldwide.
Apple won’t even be permitted to alert its users about this, so you’ll probably have zero clue that your phone’s encryption has been compromised should you not follow the news closely.
The secret order was posted last month, as confirmed by a former White House security adviser, and is backed by the UK’s Investigatory Power Act of 2016, otherwise called the Snooper’s Charter, which works to address and take action on the threats posed by new technologies.
The current Apple policy encrypts the data end-to-end, meaning even Apple doesn’t have access to that data. UK officials demanding blanket access to files in this scenario looks like an impossible request.
While Apple hasn’t yet issued an official statement in response to the UK’s request, it’s expected that Apple will simply stop offering cloud services in the UK because user privacy is considered a fundamental human right by the company, as stated on its website.
Read More: Ex-employee accuses Apple of illegal surveillance in a lawsuit
Apple’s Future in the UK Looks a Little Bleak
Things could’ve been slightly more hopeful for the UK’s future with Apple if it had just demanded data for its country’s users, but doing that won’t fulfill the conditions of the Investigatory Powers Act.
While Apple can still appeal to a secret technical panel regarding the proportionality of the country’s security requirement and the demand made, it still won’t delay the implementation of the original order.
The UK has been against the end-to-end encryption policy since the day of its announcement in 2022. The government’s argument is that end-to-end encryption services make it easier for terrorists and criminals to hide and protect their conversations from the government.
Several tech companies have pushed back this argument of the UK by stressing the need for privacy in personal communication, leading to an increasing use of end-to-end encryption in tech developments.
Meta’s Whatsapp is an example of another tech platform that uses end-to-end encryption. A spokesperson denied any requests to comment on government requests but highlighted that there’s a transparency statement on Meta’s website that mentions no weakened architecture would be implemented against user’s privacy. They assured that this statement holds true.
Cybersecurity experts are also against the UK’s request because putting an entry point into user data will make it easier for hackers and other unauthorized users to trace the gate and exploit it.
This overreach sets a hugely damaging precedent and will embolden abusive regimes the world over. – Charity’s legal director Caroline Wilson Palow
Since Apple is barred from revealing its decision, we can only hope that Apple wouldn’t compromise its reputation for having the most trustworthy privacy by giving in to the UK’s demand. Only time will tell, though.
Add Techreport to Your Google News Feed
Get the latest updates, trends, and insights delivered straight to your fingertips. Subscribe now!
The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.