Apple Pulls Privacy Protections For UK Citizens After The UK Is the First Country to Demand a Backdoor Into Your Private Data

Apple has effectively told the UK government to get lost when it comes to inserting a worldwide surveillance backdoor into its iCloud encryption. Instead of playing along with Britain’s ever-expanding digital police state, the tech giant has chosen to pull its most secure data protection feature — Advanced Data Protection (ADP) — for users in the UK. Because nothing says “we respect your privacy” like stripping away the very feature designed to protect it.

The whole mess started when the British government, wielding the notoriously invasive Investigatory Powers Act (a law that might as well be named the “We Own Your Data Act”), demanded that Apple sabotage its own encryption. The UK’s authorities wanted a golden key to every citizen’s iCloud storage, under the guise of “public safety.” But here’s the wider issue: the directive wouldn’t only affect Brits — it would have compromised Apple’s encryption system worldwide.

This was an attempt to strong-arm one of the world’s most powerful tech companies into submission, setting a precedent that could crack open user privacy like an egg.

Rather than comply, Apple responded with a very diplomatic version of hell no. Instead of weakening encryption for everyone, the company opted to remove ADP from the UK entirely. In a statement that practically oozed frustration, Apple declared:

“We are gravely disappointed that the protections provided by Advanced Data Protection will not be available to our customers in the United Kingdom, given the continuing rise of data breaches and other threats to customer privacy.”

They continued, insisting that they remain committed to offering users “the highest level of security” and expressing “hope” that they’ll be able to restore ADP in the UK at some point in the future. That’s corporate-speak for, maybe when your current government stops acting like the digital arm of Big Brother.

Keep reading

Undercover Video: Department of Education Operating Rogue ‘Sanctuary Program’ For Illegal Aliens, Hiding Secrets from DOGE on Encrypted App

Project Veritas released undercover video of Travis Combs, Branch Chief for Applied Innovation and Improvement at the US Department of Education, describing how the agency is hiding secrets from Congress and DOGE by communicating on encrypted app, Signal.

“It’s insanity. ‘Democracy Falling’ should be the title of the movie,” Travis Combs, a 5-year veteran at the department said.

Travis Combs told the undercover PV reporter that federal employees in the DOE are evading Congress and oversight.

“The one nice thing about the program that I work in is that we don’t ask [citizenship] status, and we’ve been able to keep that out of our federal statute. So, we don’t ask them when they enroll what their status is,” Combs told the PV reporter.

“If Congress actually knew that we don’t have [citizenship requirements] … there would be a lot of uproar…” Travis Combs told the undercover PV journalist.

Combs told the undercover journalist that Department of Education employees are purposely chatting on encrypted app Signal to hide their conversations from any oversight.

“If you want to have a conversation with somebody, you do have to take it offline, but you’re not supposed to. So, everybody uses… an app called Signal now,” he said.

Keep reading

FBI Nominee Kash Patel Vows to End Censorship Collusion, Slams Wiretaps, and Pledges Section 230 Work

FBI Director nominee Kash Patel’s Senate confirmation hearing on Thursday was a chance to learn about the direction the agency would take after a number of years filled with controversies linked to online censorship.

Patel addressed several of these issues, including the suppression of the Hunter Biden laptop stories and the FBI’s role in the scandal – which he said would not repeat going forward.

Patel also spoke against the FBI attempting to pressure Big Tech to get these companies to censor content, as well as against wiretapping political candidates and their staff – but also pledged to work with Senator Richard Blumenthal in order to bring potentially controversial changes to Section 230 that could jeopardize end-to-end encryption.

Senator Lindsey Graham, a Republican, was on the confirmation hearing panel and recalled that in October 2020 – a month before the election – the FBI was among those who worked to falsely present Hunter Biden laptop story as “Russian disinformation.”

Keep reading

Five Eyes Urges Broader Censorship Under “Protect the Children” Campaign

A network facilitating spy agencies’ intelligence-sharing between the US, UK, Canada, Australia, and New Zealand, known as Five Eyes, has its sights set on encryption, and proceeding from that, also online anonymity.

Even more online censorship would also not be a bad idea – these are some of the highlights from the first public-facing paper the organizations behind this group have published.

We obtained a copy of the paper for you here.

And Five Eyes is not above promoting its ultimate and much more far-reaching goals by using the good old “think of the children” – the paper’s title is, Young People and Violent Extremism: A Call for Collective Action.

Both it and an accompanying press release choose to consider online encryption as merely a tool used by criminals. At the same time, the paper is ignoring the fact that the entire internet ecosystem, from communications to banking and everything in between, requires strong encryption both for privacy, and security.

But, Five Eyes focuses only on communications, which they vaguely refer to as online environments, and ones that can allow sex offenders access to children, they also mention extremists, and equally vaguely, “other” malign actors.

Keep reading

Trump shooter Thomas Crooks had encrypted messaging accounts in Belgium, Germany, New Zealand

Trump rally gunman Thomas Matthew Crooks used encrypted messaging accounts on various platforms located in Belgium, New Zealand and Germany, according to a member of a congressional task force investigating his assassination attempt against former President Donald Trump.

Rep. Michael Waltz (R-Fla.), one of 13 lawmakers tapped to serve on the House bipartisan task force, told reporters at a Wednesday press conference at the Trump Hotel Chicago that the “overseas accounts” piqued his suspicion immediately regarding the shooter’s motives.”

“Why does a 19-year-old kid who is a health care aid need encrypted platforms not even based in the United States, but based abroad – where most terrorist organizations know it is harder for our law enforcement to get into?” asked Waltz.

“That’s a question I’ve had since day one,” the Republican panel member said, before pivoting to bash the US Secret Service and FBI for declining to release the full findings of their investigation into the July 13 shooting at a Trump rally.

“They need to be releasing information as they come across it, because this wasn’t an isolated incident. The threats are continual,” Waltz claimed, citing the alleged “sophisticated plot” by an Pakistani national who paid off purported hitmen to assassinate Trump and other US officials.

Keep reading

FBI Director Wray Uses Trump Assassination Attempt To Criticize Private Messaging

FBI Director Christopher Wray has used a congressional hearing organized after the assassination attempt on Donald Trump to launch another attack against encryption and use that as justification for the state of the investigation.

Appearing before the House Judiciary Committee this week, Wray was supposed to speak about the FBI’s investigation into this extremely serious incident, as well as about what the committee said is “the ongoing politicization” of the agency under his and Attorney-General Merrick Garland’s direction.

But Wray turned it into blaming encrypted apps and services for the pace of the investigation. Quite extraordinarily for a person who is supposed to be highly knowledgeable about security, the FBI chief came across as oblivious to how essential encryption is for people’s online security – from their bank transactions to their communications.

Instead, he complained that it is difficult to break into accounts on encrypted platforms, that is, to break encryption – a situation that the FBI head said has “unfortunately become very commonplace.”

He went on to claim that law enforcement at all levels, federal, state, and local finds it “a real challenge.”

Reports say that the FBI had “early success” in breaking into the phone of the shooter, Thomas Matthew Crooks, using tools provided by Cellebrite. This is an Israeli company that oddly advertises its wares as “accelerating justice.”

Wray did not reveal which platforms host the accounts belonging to Crooks that the FBI says it has trouble accessing but noted that “legal process returns” are awaited to accomplish that goal.

Keep reading

EU Agencies Propose Encryption Backdoors and Cryptocurrency Surveillance

The EU is attacking encryption again, this time in a report put together by several agencies, including EU law enforcement Europol, and the European Council’s Counter-Terrorism Coordinator.

This EU’s site says that this “first report on encryption” – by what the bloc calls its Innovation Hub for Internal Security, is looking for ways to “uphold citizens’ privacy while enabling criminal investigation and prosecution.”

“The main challenge is to design solutions that would allow at the same time a lawful and targeted access to communications and that guarantees that a high level of cybersecurity, data protection and privacy,” says the report.

The objective answer to the supposed conundrum of how to achieve both goals is always the same: you can’t.

Yet the EU, various governments, and international organizations continue to push to undermine online encryption and keep framing their initiatives the same way – as both their supposed care for privacy (and importantly, security), and making law enforcement’s job much easier (saying that the goal is to “enable” that, suggests there’s no other way to investigate, which is not true.)

And, how on Earth the EU intends to “safeguard fundamental rights” (of citizens) while at the same time proposing what it does in this document, is anybody’s guess. But EU bureaucrats are “safe” from being asked these questions – at least not by legacy, corporate media.

The report’s proposals include a number of ways to break encryption, mention encryption backdoors (the sneaky euphemism is, “lawful access” to communications and data), as well as password cracking and cryptocurrency and other forms of surveillance.

The not-so-subtle abuse of language and tone continues while discrediting encryption, as services like Meta’s Messenger, Apple Private Relay, and Rich Communication Systems (RCS) protocol are dubbed, “warrant-proof encryption technologies.”

Keep reading

JUST IN: Trump Would-Be Assassin Thomas Matthew Crooks Had Two Cell Phones and 3 Encrypted Accounts Overseas

Trump’s would-be assassin Thomas Matthew Crooks had two cell phones and used three encrypted accounts overseas to communicate.

The FBI found Crooks’ second cell phone at his home with only 27 contacts, The Daily Mail reported.

Congressman Mike Waltz told Fox News host Jesse Watters that according to an FBI briefing, Crooks had multiple encrypted accounts and said more will come out Monday.

Rep. Waltz said the Trump shooter had the overseas accounts at the same time we heard about the Iranian assassination plot against Trump.

Jesse Watters asked if the two are connected (they aren’t).

The Intel agencies leaked an Iranian assassination plot story to CNN to throw chaos in the camp and distract from Saturday’s Secret Service failures.

Keep reading

Europol Seeks to Break Mobile Roaming Encryption

EU’s law enforcement agency Europol is another major entity that is setting its sights on breaking encryption.

This time, it’s about home routing and mobile encryption, and the justification is a well-known one: encryption supposedly stands in the way of the ability of law enforcement to investigate.

The overall rationale is that police and other agencies face serious challenges in doing their job (an argument repeatedly proven as false) and that destroying the internet’s currently best available security feature for all users – encryption – is the way to solve the problem.

Europol’s recent paper treats home routing not as a useful security feature, but, as “a serious challenge for lawful interception.” Home routing works by encrypting data from a phone through the home network while roaming.

We obtained a copy of the paper for you here.

Keep reading

Ottawa’s Hidden Agenda: Bill C-26 Aims for Secret Surveillance Backdoors

Canada’s Bill C-26, currently making its way through the country’s parliament, includes “secretive” provisions that can be used to break encryption, researchers are warning.

As far as its sponsors are concerned, Bill C-26 is cyber security legislation intended to amend the Telecommunications Act and other related acts.

But the way the Telecommunications Act will be amended is by allowing the government to force companies operating in that industry to include backdoors in networks protected by encryption, a pair of University of Toronto’s Citizen Lab researchers suggest.

In case the government decides its surveillance needs require altering “the 5G encryption standards that protect mobile communications” – then this can also be done, should C-26 become law.

This raises several important questions, such as whether the bill’s purpose might be precisely to undermine encryption, considering that the government decided not to include amendments in the text that would prevent this.

Another worrying aspect is that given the already lacking level of security in the telecommunications space, the government would be expected to try to fix the existing problems, rather than create new ones, the researchers note.

The amendment that could have rectified this situation was proposed last year by the Citizen Lab, while civil society and industry leaders and experts also participated in parliamentary hearings concerning C-26 to recommend restricting what are said to be the draft’s broad powers to prevent “technical changes from being used to compromise the ‘confidentiality, integrity, or availability’ of telecommunication services.”

However, these warnings fell on deaf ears, with the bill now progressing through parliament without the recommended changes, and despite MPs stating that facilitating and broadening mass surveillance in Canada was not the motive behind C-26.

Keep reading