Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananEncryption / Cloud Safety
The U.Okay. authorities has apparently deserted its plans to power Apple to weaken encryption protections and embody a backdoor that will have enabled entry to the protected knowledge of U.S. residents.
U.S. Director of Nationwide Intelligence (DNI) Tulsi Gabbard, in a press release posted on X, stated the U.S. authorities had been working with its companions with the U.Okay. over the previous few months to make sure that Individuals’ civil liberties are protected.
“Because of this, the UK has agreed to drop its mandate for Apple to supply a ‘backdoor’ that will have enabled entry to the protected encrypted knowledge of Americans and encroached on our civil liberties,” Gabbard stated.
The event comes after Apple switched off its Superior Information Safety (ADP) function for iCloud within the U.Okay. earlier this February, following authorities calls for for backdoor entry to encrypted person knowledge.
“We’re gravely disillusioned that the protections offered by ADP is not going to be out there to our clients within the U.Okay., given the persevering with rise of knowledge breaches and different threats to buyer privateness,” the corporate was quoted as saying to Bloomberg on the time.

“As we’ve stated many occasions earlier than, we’ve by no means constructed a backdoor or grasp key to any of our services or products, and we by no means will.”
The key order to require Apple to implement a “backdoor” got here within the type of a technical functionality discover (TCN) issued by the U.Okay. Residence Workplace underneath the Investigatory Powers Act (IPA) to allow blanket entry to end-to-end encrypted cloud knowledge, even for customers exterior the nation. The order was issued in January 2025.
Critics have argued that enabling entry to encrypted cloud knowledge, together with backups, primarily quantities to constructing a backdoor that may very well be exploited by cybercriminals and authoritarian governments.
Apple has since appealed the legality of the order, with the Investigatory Powers Tribunal (IPT) denying the Residence Workplace’s makes an attempt to maintain the case a secret.
Late final month, Google advised TechCrunch that, not like Apple, it didn’t obtain any request from the U.Okay. to weaken encryption protections and permit authorities entry to buyer knowledge.
In a brand new letter despatched to Gabbard, Senator Ron Wyden stated Meta “provided an unequivocal denial […] stating that “we’ve not obtained an order to backdoor our encrypted companies, like that reported about Apple.'”

The Hacker News Tags:Apple, Backdoor, Civil, Drops, Encryption, Government, Liberties, Order, Pushback, U.K, U.S

Post navigation

Previous Post: Why Your Security Culture is Critical to Mitigating Cyber Risk
Next Post: Hacktivist Sentenced to 20 Months of Prison in UK

Related Posts

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws The Hacker News
NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors The Hacker News
Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News