Apple has Discontinued its Advanced Data Protection (ADP) Feature for UK Users

Apple has taken the unprecedented step of disabling its Advanced Data Protection (ADP) feature for UK users after the British government invoked surveillance laws to demand access to encrypted iCloud data. This technical rollout avoids sudden data accessibility changes but leaves approximately 23% of UK iCloud users – based on Ofcom’s 2024 digital habits report – without future encryption upgrades. While neither Apple nor the government confirmed the specific notice, internal Home Office documents leaked to the Washington Post revealed demands for “persistent access to E2EE iCloud payloads”. The move, effective on 21 February 2025, marks the first time Apple has withdrawn a security tool from a specific market in response to regulatory pressure. As users grapple with reduced privacy, the episode underscores the complex tradeoffs between national security and technological sovereignty in an interconnected digital world. Nevertheless, this standoff sets a critical precedent in the global encryption debate, balancing state security mandates against digital civil liberties. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Without ADP, iCloud data remains protected by standard AES-256 encryption but becomes accessible to Apple under legal warrants. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. According to Apple’s Xcode console logs reviewed by BBC News, existing ADP subscribers will lose access through phased certificate revocation in Q2 2025. ADP, which enables end-to-end encryption (E2EE) for iCloud backups, photos, and notes, has been available to UK customers since December 2022 as an opt-in service. ADP employs elliptic-curve cryptography (ECC) with Curve25519 algorithms to secure data transmission and storage, ensuring only device owners hold decryption keys. The change manifests through error code “ADP-UK403” when UK users attempt to enable the feature post-15:00 GMT on 21 February.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 24 Feb 2025 14:20:16 +0000


Cyber News related to Apple has Discontinued its Advanced Data Protection (ADP) Feature for UK Users

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Apple has Discontinued its Advanced Data Protection (ADP) Feature for UK Users - Apple has taken the unprecedented step of disabling its Advanced Data Protection (ADP) feature for UK users after the British government invoked surveillance laws to demand access to encrypted iCloud data. This technical rollout avoids sudden data ...
10 months ago Cybersecuritynews.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
Apple pulls iCloud end-to-end encryption feature in the UK - Apple will no longer offer iCloud end-to-end encryption in the United Kingdom after the government requested a backdoor to access Apple customers' encrypted cloud data. Apple says that ADP continues to be available for customers worldwide, who ...
10 months ago Bleepingcomputer.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
9 months ago Cybersecuritynews.com
10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
10 months ago Cybersecuritynews.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 year ago Securityboulevard.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
2 years ago Securityzap.com
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
1 year ago Eff.org Inception
Without Interoperability, Apple Customers Will Never Be Secure - Every internet user should have the ability to privately communicate with the people that matter to them, in a secure fashion, using the tools and protocols of their choosing. Apple's iMessage offers end-to-end encrypted messaging for its customers, ...
2 years ago Eff.org
Best Network Security Companies for CISOs - 2025 - This guide has spotlighted the top 10 network security companies—each excelling in specific domains such as zero trust, endpoint protection, AI-driven analytics, and cloud-native security. Zscaler offers a cloud-native security platform that ...
6 months ago Cybersecuritynews.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
10 months ago Cybersecuritynews.com
Apple To Drop Sensor From Some Watch Models - Redesign plan to remove blood-oxygen sensor on certain Apple Watch models is dependent on an appeal court decision. Apple is reportedly prepared to remove the blood-oxygen sensor from certain Apple Watch models, depending on a court decision. The ...
1 year ago Silicon.co.uk
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
9 months ago Cybersecuritynews.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
2 years ago Silicon.co.uk
CVE-2021-22283 - Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion protection relays - 615 series IEC 4.0 FP1, ABB Relion protection relays - 615 series CN 4.0 FP1, ABB Relion protection relays - 615 series IEC 5.0, ABB ...
2 years ago
Apple iOS 17.3: How to Turn on iPhone's New Stolen Device Protection - Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change ...
1 year ago Wired.com Snatch
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
2 years ago Securityboulevard.com
Securing the Digital Frontier - As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just a necessity but a responsibility. This intricate dance among technology, societal norms, and regulatory frameworks shapes our ...
1 year ago Feeds.dzone.com
API Leak Protection: Wallarm's New Scanning Feature - Wallarm, a provider of API and application security solutions, has announced the launch of their new API leak protection feature. The new feature is designed to help secure APIs against cyber attacks and data breaches by identifying and preventing ...
2 years ago Csoonline.com
Google Chrome's new "IP Protection" will hide users' IP addresses - Google is getting ready to test a new "IP Protection" feature for the Chrome browser that enhances users' privacy by masking their IP addresses using proxy servers. Recognizing the potential misuse of IP addresses for covert tracking, Google seeks to ...
2 years ago Bleepingcomputer.com
Google reveals details on Android’s Advanced Protection for Chrome - The tech giant recently extended its Advanced Protection Program to the device level with the release of Android 16, aimed at offering a robust, holistic security posture for high-risk individuals likely to be targeted by sophisticated spyware ...
6 months ago Bleepingcomputer.com