UK Orders Apple to Grant Access to Its Encrypted User Data
techreport.com
Key TakeawaysThe UK government demands backdoor access to all iCloud data (not just UK users data) under the Investigatory Powers Act 2016.Apple hasnt officially responded, and under the Snoopers Charter terms, it wont be allowed to notify users if encryption is compromised.Experts warn this could set a dangerous precedent, making user data vulnerable to hackers and government overreach.Privacy. Thats iPhone. Well, it looks like thatll no longer be the case.The UK government just demanded that Apple give it backdoor access to all the data stored on the cloud. Even more bizarre is the fact that theyre not just seeking access to the data of UK users, but of every single Apple user worldwide.Apple wont even be permitted to alert its users about this, so youll probably have zero clue that your phones encryption has been compromised should you not follow the news closely.The secret order was posted last month, as confirmed by a former White House security adviser, and is backed by the UKs Investigatory Power Act of 2016, otherwise called the Snoopers Charter, which works to address and take action on the threats posed by new technologies.The current Apple policy encrypts the data end-to-end, meaning even Apple doesnt have access to that data. UK officials demanding blanket access to files in this scenario looks like an impossible request.While Apple hasnt yet issued an official statement in response to the UKs request, its expected that Apple will simply stop offering cloud services in the UK because user privacy is considered a fundamental human right by the company, as stated on its website.Read More: Ex-employee accuses Apple of illegal surveillance in a lawsuitApples Future in the UK Looks a Little BleakThings couldve been slightly more hopeful for the UKs future with Apple if it had just demanded data for its countrys users, but doing that wont fulfill the conditions of the Investigatory Powers Act.While Apple can still appeal to a secret technical panel regarding the proportionality of the countrys security requirement and the demand made, it still wont delay the implementation of the original order.The UK has been against the end-to-end encryption policy since the day of its announcement in 2022. The governments argument is that end-to-end encryption services make it easier for terrorists and criminals to hide and protect their conversations from the government.Several tech companies have pushed back this argument of the UK by stressing the need for privacy in personal communication, leading to an increasing use of end-to-end encryption in tech developments.Metas Whatsapp is an example of another tech platform that uses end-to-end encryption. A spokesperson denied any requests to comment on government requests but highlighted that theres a transparency statement on Metas website that mentions no weakened architecture would be implemented against users privacy. They assured that this statement holds true.Cybersecurity experts are also against the UKs request because putting an entry point into user data will make it easier for hackers and other unauthorized users to trace the gate and exploit it.This overreach sets a hugely damaging precedent and will embolden abusive regimes the world over. Charitys legal director Caroline Wilson PalowSince Apple is barred from revealing its decision, we can only hope that Apple wouldnt compromise its reputation for having the most trustworthy privacy by giving in to the UKs demand. Only time will tell, though.Add Techreport to Your Google News Feed Get the latest updates, trends, and insights delivered straight to your fingertips. Subscribe now! Subscribe now Vlad is Tech Report's Executive Editor. With over a decade of experience in tech content, he's passionate about computer hardware, an advocate of online privacy, and strongly believes in the open-source, scarce-money nature of cryptocurrency.When hes not working, hes traveling with his partner and their cat, learning Python, or reading good books. He never owned a PC he did not build. View all articles by Vlad Melnic Our editorial processThe Tech Reporteditorial policyis centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written byreal authors.
0 Reacties
·0 aandelen
·176 Views