Argument

An expert’s point of view on a current event.

What the U.K. Wants from Apple Will Make Our Phones Less Safe

Once a back door to user data exists, everyone will want in.

By , a security technologist and lecturer at the Harvard Kennedy School.
A boy in Bath, England looks at a smartphone screen on March 16, 2023.
A boy in Bath, England looks at a smartphone screen on March 16, 2023.
A boy in Bath, England looks at a smartphone screen on March 16, 2023. Matt Cardy/Getty Images

Last month, the U.K. government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United Kingdom. But the British law is written in a way that requires Apple to give its government access to anyone, anywhere in the world. If the government demands Apple weaken its security worldwide, it would increase everyone’s cyber-risk in an already dangerous world.

If you’re an iCloud user, you have the option of turning on something called “advanced data protection,” or ADP. In that mode, a majority of your data is end-to-end encrypted. This means that no one, not even anyone at Apple, can read that data. It’s a restriction enforced by mathematics—cryptography—and not policy. Even if someone successfully hacks iCloud, they can’t read ADP-protected data.

Last month, the U.K. government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United Kingdom. But the British law is written in a way that requires Apple to give its government access to anyone, anywhere in the world. If the government demands Apple weaken its security worldwide, it would increase everyone’s cyber-risk in an already dangerous world.

If you’re an iCloud user, you have the option of turning on something called “advanced data protection,” or ADP. In that mode, a majority of your data is end-to-end encrypted. This means that no one, not even anyone at Apple, can read that data. It’s a restriction enforced by mathematics—cryptography—and not policy. Even if someone successfully hacks iCloud, they can’t read ADP-protected data.

Using a controversial power in its 2016 Investigatory Powers Act, the U.K. government wants Apple to re-engineer iCloud to add a “back door” to ADP. This is so that if, sometime in the future, U.K. police wanted Apple to eavesdrop on a user, it could. Rather than add such a back door, Apple disabled ADP in the U.K. market.

Should the U.K. government persist in its demands, the ramifications will be profound in two ways. First, Apple can’t limit this capability to the U.K. government, or even only to governments whose politics it agrees with. If Apple is able to turn over users’ data in response to government demand, every other country will expect the same compliance. China, for example, will likely demand that Apple out dissidents. Apple, already dependent on China for both sales and manufacturing, won’t be able to refuse.

Second: Once the back door exists, others will attempt to surreptitiously use it. A technical means of access can’t be limited to only people with proper legal authority. Its very existence invites others to try. In 2004, hackers—we don’t know who—breached a back-door access capability in a major Greek cellphone network to spy on users, including the prime minister of Greece and other elected officials. Just last year, China hacked U.S. telecoms and gained access to their systems that provide eavesdropping on cellphone users, possibly including the presidential campaigns of both Donald Trump and Kamala Harris. That operation resulted in the FBI and the Cybersecurity and Infrastructure Security Agency recommending that everyone use end-to-end encrypted messaging for their own security.

Apple isn’t the only company that offers end-to-end encryption. Google offers the feature as well. WhatsApp, iMessage, Signal, and Facebook Messenger offer the same level of security. There are other end-to-end encrypted cloud storage providers. Similar levels of security are available for phones and laptops. Once the U.K. forces Apple to break its security, actions against these other systems are sure to follow.

Read More

A security guard stands at the entrance to the U.S. Agency for International Development (USAID) headquarters on Feb. 3.

A security guard stands at the entrance to the U.S. Agency for International Development (USAID) headquarters on Feb. 3.
A security guard stands at the entrance to the U.S. Agency for International Development (USAID) headquarters on Feb. 3.

DOGE Is Hacking America

The U.S. government has experienced what may be the most consequential security breach in its history.