SecureWorld News

U.K. Backs Down on Apple Encryption Backdoor

Written by Drew Todd | Thu | Aug 21, 2025 | 11:26 AM Z

The U.K. has backed away from its demand that Apple build a backdoor into its encrypted iCloud services, according to comments from U.S. Director of National Intelligence Tulsi Gabbard. The move, which followed months of negotiations involving U.S. officials, including President Donald Trump and Vice President JD Vance, represents a significant shift in how far allied governments are willing to press for access to encrypted data.

Earlier this year, Apple had disabled its Advanced Data Protection (ADP) feature for U.K. customers after receiving a Technical Capability Notice under the country's Investigatory Powers Act. That order would have effectively forced the company to weaken end-to-end encryption, providing authorities with a pathway into data stored by both British and non-British users.

Cybersecurity experts say backdoors weaken privacy and security

For privacy advocates and the cybersecurity community, the decision is a landmark. Mandated backdoors have long been criticized as undermining the very protections they are meant to bypass. By their nature, they do not discriminate between lawful use and malicious exploitation.

"Dropping a universal 'backdoor' demand is a win for everyone's security and civil liberties," said Adam McKissock, Principal Security Consultant at Black Duck. "Mandating a 'technical capability' to read end-to-end encrypted iCloud data would have created a permanent weakness that criminals and hostile states could also exploit. It was especially troubling that the order asserted reach into the data of people outside the U.K. If this reversal holds, the next step is clear: allow Apple to restore Advanced Data Protection for U.K. customers and commit—explicitly—that powers under the Investigatory Powers Act will not be used to require systemic weakening of encryption. Lawful access should remain targeted, case-by-case, and under due process. We don't make the internet safer by making it less secure."

Global encryption debate and surveillance risks

Beyond the technical risks, the decision carries significant geopolitical weight. Encryption debates don't happen in isolation; global precedents can ripple quickly across borders.

Casey Ellis, Founder at Bugcrowd, framed it this way: "Deliberately weakening the security posture of everyone to enable the surveillance of a few is a universally bad solution, prone to unintended exploitation by cybercriminals and hostile states, overreach, and creeping abuse. Encryption is essential for civil liberty, and backdoors undermine security for everybody. It's also good to see aspects of global collaboration happening here. Once a global precedent around this type of thing is established, there's a real risk of that triggering a race to the bottom."

In other words, the U.K.'s retreat may help prevent a domino effect in which other governments would attempt to force similar requirements.

What the Apple encryption case means going forward

While Apple and privacy advocates are celebrating the development, experts warn the fight isn't over. The Investigatory Powers Act—and its provision for Technical Capability Notices—remains intact. That means the legal infrastructure for future demands still exists, even if political pressure has scaled back this particular order.

For now, the focus shifts to whether Apple will be allowed to re-enable ADP for U.K. customers. That decision will be seen as a litmus test of whether the government's reversal is substantive or merely temporary.

Either way, this outcome underscores an important lesson: strong, uncompromised encryption is not just a technical issue—it is a global standard tied directly to civil liberties, trust in technology, and the future of cybersecurity itself.

The ongoing battle for digital privacy

Rebecca Herold, The Privacy Professor and CEO of Privacy & Security Brainiacs, offered her astute perspective on this development.  

"Yes, there have been many privacy related developments related to the actions of the U.S. government, and really most other governments throughout the world," Herold said. "The specific efforts of governments, along with investigators, law enforcement, the military, and others, to compel back doors into encryption has been going on for at least 32 years since the Clipper Chip was being promoted. What I wrote about this many times throughout the past four decades is still true: putting backdoors in encryption was and still is a very bad idea for strong, verifiable, and compelling reasons.

"Here are five important and compelling facts that governments and other types of organizational leaders need to know. Strong, verified reasons that I've been writing about for the past four decades for why putting backdoors in encryption is a very, very, very, very bad idea.

  1. Backdoors can often be, and have been, exploited accidentally, resulting in great harm. Backdoors in technologies are nothing new. 
  2. Backdoors will not remain a secret. Backdoors will be discovered and used by the adversaries and crooks that the associated encryptions were established to protect data from in the first place.
  3. Backdoors created to fight crime will be used to commit crime. Proficient enemies who are looking for vulnerabilities in security technologies know how to exploit the weaknesses when they find them.
  4. Backdoors and other types of weakened security create opportunities for malicious insiders and the authorized unaware. Humans are the weakest link in information security, and trusted insiders present the greatest threat to systems and information. 
  5. Backdoors in technology hurt business success and thwart technology advances. If weakened security in commercial products and services is the result of a national policy—as opposed to other causes, such as human error or corporate interests—this weakened security harms the nation economically.

"In short, backdoors in encryption will not only weaken, but generally destroy, the security of data, and significantly infringe upon privacy, violate compliance requirements, and result in breaches.

"The current reasons being given by lawmakers and law enforcement to weaken encryption to be able to access data often sound noble in the way the statements are presented. However, when digging into the resulting security and privacy risks doing so would create, and the cornucopia of harms that would resulting to unlimited numbers of individuals and groups, those who value facts and logic have, to date, typically seen that such backdoors are not good idea. Those who persist in making such encryption backdoor demands either do not have a good understanding of how encryption works, based upon their many statements, or they simply do not care about privacy as they are focused only on their own goals. 

"While this decision by the U.K. is the latest encryption backdoor battle win for privacy, it is really only the next win in a long string of wins throughout the past four decades of continuing to have battles against backdoors in encryption being pursued by not only other countries, but many attempts made here in the U.S. I fully expect there will continue to be many more attempts. There always have been, and as long as governments, law enforcement, and others believe they have a right to surveil the general public through such backdoors, these attempts to compel tech companies to build in backdoors for such entities will continue. 

"The scary reality is that today more tech companies are demonstrating willingness to work with government agencies in what appear to be quid pro quo actions following tax breaks, and possibly other benefits they are receiving that have not been publicly reported. 

"What I know for certain, though, is that this short-term privacy victory is only one battle won within a long privacy and encryption war that will continue for the the foreseeable future."