- The United Kingdom government guidelines no longer include E2EE mentions
- The measure follows a dispute between the British government and the apple
- Apple recently withdrew its encryption service in the United Kingdom after a rear door application
The dispute between the United Kingdom and Apple government continues, and the first one silently decides to eliminate its recommendation when using end -to -end encryption (E2EE) of the technological company, also known as advanced data protection (ADP).
The measure, seen by the blogger Alec Muffett, occurs weeks after Apple took the ADP from the country after the alleged request of the government to build a rear door in the encryption for the police, which would have allowed agencies to access photos, messages and other protected data.
Previously, in the Council of the NCSC and GCHQ, the agencies recommended lawyers, lawyers and legal professionals light the encryption, including ADP for iOS, but encryption advice is no longer available.
The importance of encryption
Apple doubled its encryption, promising “never building a back door”, and privacy activists argue that this “endangers the security and privacy of millions.”
Encryption is a tool that stir the information, and extreme to extreme means that this is done so much as the information is sent and received. Apple ADP means that even Apple cannot access the data.
The technological firm argues that once a rear door is built, or ‘master key’, that leaves the risk that threat actors steal the key, or that the information could fall into the wrong hands.
“With Apple eliminated the protection of advanced data (ADP) for users of the United Kingdom, consumers must focus on alternative ways to ensure their data,” said Matt Aldridge, senior consultant of main solutions of OpenText Cybersecury.
“While the Imessages, Facetime, Health Data and Icloud Keychain are still safe, users must check what they store in Icloud, especially with backup copies that are no longer encrypted. It is possible that confidential files and data must be stored safely elsewhere, as in external encryption units or alternative cloud services that still offer end -to -end encryption. “