Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananEncryption / Cloud Safety
The U.Okay. authorities has apparently deserted its plans to power Apple to weaken encryption protections and embody a backdoor that will have enabled entry to the protected knowledge of U.S. residents.
U.S. Director of Nationwide Intelligence (DNI) Tulsi Gabbard, in a press release posted on X, stated the U.S. authorities had been working with its companions with the U.Okay. over the previous few months to make sure that Individuals’ civil liberties are protected.
“Because of this, the UK has agreed to drop its mandate for Apple to supply a ‘backdoor’ that will have enabled entry to the protected encrypted knowledge of Americans and encroached on our civil liberties,” Gabbard stated.
The event comes after Apple switched off its Superior Information Safety (ADP) function for iCloud within the U.Okay. earlier this February, following authorities calls for for backdoor entry to encrypted person knowledge.
“We’re gravely disillusioned that the protections offered by ADP is not going to be out there to our clients within the U.Okay., given the persevering with rise of knowledge breaches and different threats to buyer privateness,” the corporate was quoted as saying to Bloomberg on the time.

“As we’ve stated many occasions earlier than, we’ve by no means constructed a backdoor or grasp key to any of our services or products, and we by no means will.”
The key order to require Apple to implement a “backdoor” got here within the type of a technical functionality discover (TCN) issued by the U.Okay. Residence Workplace underneath the Investigatory Powers Act (IPA) to allow blanket entry to end-to-end encrypted cloud knowledge, even for customers exterior the nation. The order was issued in January 2025.
Critics have argued that enabling entry to encrypted cloud knowledge, together with backups, primarily quantities to constructing a backdoor that may very well be exploited by cybercriminals and authoritarian governments.
Apple has since appealed the legality of the order, with the Investigatory Powers Tribunal (IPT) denying the Residence Workplace’s makes an attempt to maintain the case a secret.
Late final month, Google advised TechCrunch that, not like Apple, it didn’t obtain any request from the U.Okay. to weaken encryption protections and permit authorities entry to buyer knowledge.
In a brand new letter despatched to Gabbard, Senator Ron Wyden stated Meta “provided an unequivocal denial […] stating that “we’ve not obtained an order to backdoor our encrypted companies, like that reported about Apple.'”

The Hacker News Tags:Apple, Backdoor, Civil, Drops, Encryption, Government, Liberties, Order, Pushback, U.K, U.S

Post navigation

Previous Post: Why Your Security Culture is Critical to Mitigating Cyber Risk
Next Post: Hacktivist Sentenced to 20 Months of Prison in UK

Related Posts

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks The Hacker News
How to Deploy AI More Securely at Scale How to Deploy AI More Securely at Scale The Hacker News
Coinbase Agents Bribed, Data of ~1% Users Leaked; M Extortion Attempt Fails Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails The Hacker News
Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark