Apple has announced that it will no longer support Advanced Data Protection (ADP)—its most secure encryption feature—for iCloud backups in the United Kingdom.
The decision follows increased government pressure for access to encrypted user data, marking a significant shift in Apple’s security stance.
Apple User Data Is No Longer Encrypted?
The removal of end-to-end encryption for iCloud backups means that Apple will now be able to access stored user data, including iMessages and photos, if legally compelled by UK authorities.
While Apple has maintained its stance against building encryption backdoors, this move effectively weakens data privacy protections for UK users.
No More Apple End-to-End Encryption: Impact on UK Users &
Cybersecurity experts warn that disabling ADP exposes UK users to potential data breaches and hacking threats, as encrypted backups provided an extra layer of security.
Professor Oli Buckley, a cybersecurity expert at Loughborough University, emphasized that “once a security door exists, it’s only a matter of time before it is exploited.”
Although Apple insists that other encryption features—such as iMessage and FaceTime encryption—remain intact, users who attempt to enable ADP in the UK will receive an error message.
Those already using the feature will eventually be required to disable it.
Try Eyre for free
Did you know that your meetings are leaking private information online? Use Eyre to host, record, and summarize meetings on a European sovereign platform that puts security first.
UK Government and Global Surveillance Concerns
Apple’s decision comes amid an ongoing tug-of-war between tech companies and governments over access to encrypted data. The UK’s Investigatory Powers Act of 2016 grants authorities the power to issue Technical Capability Notices (TCNs), which can require tech firms to provide access to encrypted communications.
While the UK government has declined to confirm whether it issued such an order to Apple, reports suggest that the move is linked to increased government scrutiny over “warrant-proof encryption”—a long-standing concern for intelligence agencies worldwide.
Experts predict that other nations, including Australia, could follow suit and impose similar demands on encrypted services, given their parallel legal frameworks. Joseph Lorenzo Hall, a technology expert from the Internet Society, noted that Commonwealth countries tend to mirror each other’s policies, making this a potentially precedent-setting case.
The Broader Fight Over End-to-End Encryption
Apple has historically resisted government efforts to compromise encryption, famously refusing to unlock an iPhone for the FBI in 2016. This battle dates back to the 1990s when the US government first proposed encryption backdoors for law enforcement, an initiative that failed but set the stage for ongoing debates.
With encryption becoming an essential cybersecurity foundation, privacy advocates argue that weakening protections could harm both individuals and businesses.
Meredith Whittaker, president of Signal, criticized the UK’s move as “technically illiterate,” warning that it could damage the country’s reputation as a hub for technology and innovation.
Tired of Big Tech Control?
Eyre European meeting platform is built from the ground up for security-conscious users in Europe — with autonomous hosting, encryption, and AI summaries all in one. With Eyre, your meetings run with control, compliance, and clarity — not layered on top of Zoom or Meet.
What’s Next for Apple Users in the UK?
For now, local device storage remains unaffected, meaning UK users can still protect their data by opting out of iCloud backups. However, as governments continue pushing for increased surveillance powers, the future of encryption remains uncertain—especially as global tech policies evolve in response to legal and regulatory challenges.
Why End-to-End Encryption is Important
End-to-end encryption (E2EE) is one of the strongest safeguards for digital privacy and data security**. It ensures that only the sender and intended recipient can access the information being transmitted, preventing third parties—including hackers, service providers, and even governments—from intercepting or tampering with sensitive data.
Key Reasons Why E2EE Matters
Protects User Privacy from Surveillance and Cyber Threats
Without E2EE, messages, files, and calls can be intercepted by hackers, ISPs, or governments. Many entities—both legal and malicious—seek access to private conversations for tracking, monitoring, or exploitation. End-to-end encryption ensures that even service providers like Apple, Google, or WhatsApp cannot read your messages.
Essential for Financial and Business Security
Financial transactions, sensitive business communications, and confidential client data must remain secure. Industries like banking, healthcare, and legal services rely on E2EE to comply with regulations (e.g., GDPR, HIPAA). Prevents industrial espionage and unauthorized access to business-critical data.
READ MORE: AI and the GDPR
Prevents Government Overreach and Mass Surveillance
Governments around the world have repeatedly pushed for “lawful access” backdoors, weakening encryption. If a backdoor exists, it’s not just governments that can use it—hackers and hostile actors can too. End-to-end protects freedom of speech by preventing oppressive regimes from spying on activists, journalists, and dissidents.
Protects Against AI-Powered Cyber Threats
With AI-driven hacking and deepfake technology on the rise, encrypted data ensures that sensitive conversations cannot be compromised. AI tools are increasingly used to break weak encryption, making E2EE a necessity rather than a luxury.
End-to-end Encryption Prevents Data Breaches and Identity Theft
Data stored on cloud services without end-to-end encryption can be stolen in security breaches (e.g., corporate hacks, government leaks). E2EE eliminates this risk by ensuring that even if data is stolen, it remains unreadable without the encryption key.
Users Control Their Own Data
Unlike regular encryption (where companies hold decryption keys), end-to-end encryption gives users full control over their own data. No centralized authority can decide to hand over private messages or files to third parties.
Looking for a meeting platform that actually protects your data?
Eyre replaces Zoom and Meet with end-to-end encryption, European data residency, and built-in AI documentation — all in one secure space. Eyre is built from the ground up for security-conscious teams in Europe.
How Eyre Meeting Platform Protects Meetings and Content with End-to-End Encryption
Eyre Meeting Platform is designed with security and privacy at its core, ensuring that meetings, transcripts, and shared content remain fully protected through end-to-end encryption (E2EE). Unlike many meeting platforms that only encrypt data in transit, Eyre ensures that only participants have access to meeting content—no one else, not even Eyre.
How Eyre’s End-to-End Encryption Works
✅ Encryption Before Transmission: All audio, video, chat messages, and shared documents are encrypted on the sender’s device before they are transmitted.
✅ Secure Decryption on the Recipient’s Side: Only authorized participants with decryption keys can access meeting data. No one in between—neither Eyre nor third parties—can decrypt or intercept communications.
✅ Zero-Knowledge Architecture: Eyre never stores encryption keys on its servers, meaning even in the event of a security breach, your data remains inaccessible to unauthorized parties.
Choice of Data Residency for Users
Although Eyre is based in the UK, we understand the importance of data sovereignty for businesses operating under strict data protection regulations such as GDPR, CCPA, and industry-specific compliance standards. That’s why:
Enterprise customers can already choose their preferred data residency, storing their meeting data in regions such as the EU, US, or other secure locations. Soon, all users will have the ability to select where their data is hosted, offering an additional layer of control and compliance.
Why Eyre’s Encryption Model Matters
✔ No Government Backdoors: Unlike 90% providers, Eyre does not and will not weaken encryption to comply with government surveillance requests.
✔ Protection Against Cyber Threats: AI-powered hacking, man-in-the-middle attacks, and corporate espionage are mitigated through robust cryptographic security.
✔ Compliance-Ready Security: Meets the strictest financial, legal, and healthcare industry standards for secure communications.
Your meetings, your content, your security—Eyre ensures that your data stays yours. Let us know if you’d like a security deep dive or a personalized enterprise demo.

Julie Gabriel wears many hats—founder of Eyre.ai, product marketing veteran, and, most importantly, mom of two. At Eyre.ai, she’s on a mission to make communication smarter and more seamless with AI-powered tools that actually work for people (and not the other way around). With over 20 years in product marketing, Julie knows how to build solutions that not only solve problems but also resonate with users. Balancing the chaos of entrepreneurship and family life is her superpower—and she wouldn’t have it any other way.
- Julie Gabrielhttps://eyre.ai/author/eyre_admin/
- Julie Gabrielhttps://eyre.ai/author/eyre_admin/March 25, 2025
- Julie Gabrielhttps://eyre.ai/author/eyre_admin/