- The British government guidelines no longer include E2ee’s mentions
- This decision follows a dispute between the British government and Apple
- Apple recently withdrawn its encryption service in the United Kingdom after a stolen door request
The dispute between the British government and Apple continues, the first quietly deciding to delete its recommendation in the use of end -to -end encryption of the Technology Company (E2EE), also known as the advanced data protection (ADP).
This decision, spotted by blogger Alec Muffett, comes from weeks after Apple fired ADP from the country following the government’s alleged request to build a stolen door in the encryption of the police – which would have enabled agencies to access photos, messages and other protected data.
Previously, in the advice of the NCSC and the GCHQ, the agencies recommended that lawyers, lawyers and legal professionals have recommended encryption, including ADP for iOS – but encryption advice is no longer available.
The importance of encryption
Apple has doubled its encryption, promising to “never build a stolen door”, and privacy activists argue that this “endangers the security and confidentiality of millions”.
Encryption is a tool that blurs the information, and from start to finish means that this is done both when the information is sent and received. Apple’s ADP means that even Apple cannot access the data.
The technological company maintains that once a stolen, or “main key” door, leaves the risk that the key will be stolen by threat actors, or that the information could fall into bad hands.
“With Apple deleting advanced data protection (ADP) for British users, consumers must focus on other ways to secure their data,” said Matt Aldridge, principal consultant for main solutions at OpenText Cybersecurity.
“While the Imessages, FaceTime, data on health and the iCloud trousseau remain secure, users should review what they store in iCloud, in particular with backups that are no longer encrypted. Sensitive files and data may need to be stored safely elsewhere, such as external encrypted discs or alternative cloud services that always offer end -to -end encryption. »»




