Member-only story
The UK’s Secret Demand for an Apple Backdoor: What It Means for Your Privacy

The British government has reportedly issued a secretive Technical Capability Notice (TCN) to Apple, compelling the company to create a backdoor into its encrypted iCloud storage. This demand, enabled by the Investigatory Powers Act of 2016, could have global repercussions for Apple users and those relying on end-to-end encrypted services like Telegram, Signal, and WhatsApp.
The UK’s Push for Mass Surveillance
Under the Investigatory Powers Act, UK intelligence agencies such as MI5 and MI6 have sweeping powers to surveil digital communications. The law mandates Internet Service Providers (ISPs) to store a record of websites visited by users and enables the government to force companies like Apple to provide access to encrypted data. However, Apple is legally prohibited from disclosing whether it has received such a demand.
A whistleblower appears to have leaked this information, revealing the UK’s push to weaken encryption globally. The move is a direct challenge to the growing use of Advanced Data Protection, Apple’s end-to-end encryption feature for iCloud data, which prevents even Apple from accessing user data.
Understanding End-to-End Encryption
Most cloud services encrypt data in transit and at rest, but the encryption keys remain in the hands of the provider. This means governments can demand access to user data stored on cloud servers. Apple’s Advanced Data Protection, introduced in 2022, changes that by ensuring only users hold the encryption keys.
This model of encryption is not new. Technologies like PGP (Pretty Good Privacy) have existed since 1991 for securing emails. More recently, Signal and WhatsApp have implemented the double ratchet algorithm, which generates new encryption keys for each message and ensures that past and future messages remain secure even if a key is compromised.
However, governments that favor surveillance see this as a major roadblock to law enforcement and intelligence operations.