{"id":58252,"date":"2025-03-05T18:47:03","date_gmt":"2025-03-05T18:47:03","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/"},"modified":"2025-03-05T18:47:03","modified_gmt":"2025-03-05T18:47:03","slug":"apple-drags-uk-government-to-court-over-backdoor-order","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/","title":{"rendered":"Apple drags UK government to court over &#8216;backdoor&#8217; order"},"content":{"rendered":"<p><span class=\"label\">Updated<\/span> Apple has reportedly filed a legal complaint with the UK&#8217;s Investigatory Powers Tribunal (IPT) contesting the British government&#8217;s order that it must forcibly break the encryption of iCloud data.<\/p>\n<p>The appeal will be the first of its kind lodged with the IPT, an independent judicial body that <a target=\"_blank\" href=\"https:\/\/investigatorypowerstribunal.org.uk\/\" rel=\"noopener\">oversees<\/a> legal complaints against potential unlawful actions by a public authority or UK intelligence services, according to the Financial Times, which broke the <a href=\"https:\/\/www.ft.com\/content\/3d8fe709-f17a-44a6-97ae-f1bbe6d0dccd\" rel=\"nofollow\">news<\/a>.<\/p>\n<p>The revelation follows a battle between the iGadgetmaker and the UK&#8217;s Home Office, which has long set its sights on Apple&#8217;s encrypted cloud-hosted data, arguing it needs a backdoor in order for law enforcement to investigate persons of interest.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2021\/03\/29\/shutterstock_eavesdrop_agent.jpg?x=174&amp;amp;y=115&amp;amp;crop=1\" width=\"174\" height=\"115\" alt=\"secret agent eavesdrops using headphones plugged into an audio centre mounted with tape reels (illustration)\"><\/p>\n<h2 title=\"Only minor changes from original proposals that kicked up privacy storm\">UK&#8217;s Investigatory Powers Bill to become law despite tech world opposition<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2024\/04\/26\/investigatory_powers_bill\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Things came to a head in January when the Home Office issued Apple with a technical capability notice (TCN) under the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/04\/26\/investigatory_powers_bill\/\" rel=\"noopener\">Investigatory Powers Act<\/a>, aka the Snooper&#8217;s Charter, nearly a year after talk of such an order began.<\/p>\n<p>Despite being &#8220;technical&#8221; by name, it&#8217;s understood that the notice didn&#8217;t include any technical instructions for Apple, just an order to allow a so-called backdoor into its iCloud network which could be used to gather data that&#8217;s otherwise typically out of reach of criminal investigators.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The Home Office refused to either confirm or deny the existence of the notice when <a href=\"https:\/\/www.theregister.com\/2025\/02\/07\/home_office_apple_backdoor_order\/\">we asked about it<\/a>, and under the Investigatory Powers Act 2016 Apple is prevented from revealing details about the notice.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>Apple responded by <a href=\"https:\/\/www.theregister.com\/2025\/02\/07\/home_office_apple_backdoor_order\/\">disabling its Advanced Data Protection<\/a> (ADP) feature for UK users in early February, effectively removing end-to-end encryption (E2EE) for data backed up to iCloud to appease the government without fully complying with the TCN.<\/p>\n<blockquote class=\"pullquote\" readability=\"5\">\n<p>We have never built a backdoor or master key to any of our products or services and we never will<\/p>\n<\/blockquote>\n<p>Still, it means British officials can feasibly sniff around iCloud accounts, provided they get a court-approved warrant to do so. With ADP disabled, various types of user account data \u2013 such as iCloud backups, photos, and notes, but not iMessages and health data \u2013 stored in Apple&#8217;s cloud will not be end-to-end encrypted (E2EE), meaning the contents can be accessed and provided by Apple to investigators upon legal demand. It will also be done without alerting users, assuming someone involved in the process doesn&#8217;t leak it at any stage.<\/p>\n<p>&#8220;We are gravely disappointed that the protections provided by ADP will not be available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy,&#8221; Apple told <em>The Register<\/em> at the time.<\/p>\n<p>&#8220;As we have said many times before, we have never built a backdoor or master key to any of our products or services and we never will,&#8221; it added.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The Home Office has also previously voiced its ambition to break E2EE for all popular communications platforms in the UK, such as messaging app WhatsApp, although the case with Apple is believed to be its first foray into handing out TCNs to this end.<\/p>\n<p>The UK&#8217;s entire approach to pressing ahead with the Investigatory Powers Act and its so-called war on encryption has come under intense scrutiny in recent years.<\/p>\n<p>Its main arguments in favor of breaking encryption are largely based on the prevention of terror attacks and child sexual exploitation.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z8ix5R4EIjyoyGWiGZfz2QAAAog&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Security minister Dan Jarvis further justified the powers in Parliament <a target=\"_blank\" href=\"https:\/\/www.theyworkforyou.com\/pbc\/2023-24\/Investigatory+Powers+(Amendment)+Bill\/\" rel=\"noopener\">last week<\/a>, <a target=\"_blank\" href=\"https:\/\/hansard.parliament.uk\/commons\/2025-02-24\/debates\/9E7881D8-1693-48BA-9407-A180094039B6\/HostileStateThreats\" rel=\"noopener\">saying<\/a> requests to access user data under the Act could only be made on an &#8220;exceptional basis, and only when it is necessary and proportionate to do so.&#8221;<\/p>\n<p>Jarvis&#8217;s comments came after being questioned by other MPs about the TCN, and seemingly aim to dissuade the public from thinking the government can simply access user data on a whim.<\/p>\n<p>The security minister didn&#8217;t offer much in the way of additional insights, whipping out the good old national security defense as a way to avoid further questioning.<\/p>\n<p>Many who argue against the government&#8217;s ambitions, such as Big Brother Watch, <a href=\"https:\/\/www.theregister.com\/2025\/02\/24\/apple_adp_replacements_e2ee\/\">say<\/a> the action taken against Apple is &#8220;outrageous&#8221; and &#8220;draconian&#8221; and may eventually force encrypted messaging technology underground, meaning only criminals would have access to it.<\/p>\n<p>US President Donald Trump also recently compared the UK&#8217;s treatment of Apple to the extensive state surveillance methods deployed by China \u2013 the two countries&#8217; foremost intelligence adversary.<\/p>\n<p>US director of national intelligence Tulsi Gabbard has ordered a legal review of the TCN issued to Apple out of concern it could be used to gather data on US citizens. Doing so would violate the terms of the US-UK <a href=\"https:\/\/www.theregister.com\/2022\/10\/03\/us_uk_data_access_agreement\/\">Cloud Act Agreement<\/a>, she argued.<\/p>\n<p><em>The Register<\/em> has asked Apple for further comment. \u00ae<\/p>\n<h3 class=\"crosshead\">Updated to add at 1833 UTC<\/h3>\n<p>Interestingly enough, the UK government <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/alecmuffett.com\/article\/112522\">appears to have scrubbed<\/a> from the web its previous and now politically inconvenient advice to barristers, solicitors, and others in sensitive professions to use Apple&#8217;s ADP at-rest end-to-end encryption. Fancy that!<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2025\/03\/05\/apple_reportedly_ipt_complaint\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A first-of-its-kind legal challenge set to be heard this month, per reports Updated\u00a0 Apple has reportedly filed a legal complaint with the UK&#8217;s Investigatory Powers Tribunal (IPT) contesting the British government&#8217;s order that it must forcibly break the encryption of iCloud data.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":58253,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-58252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple drags UK government to court over &#039;backdoor&#039; order 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple drags UK government to court over &#039;backdoor&#039; order 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T18:47:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2021\/03\/29\/shutterstock_eavesdrop_agent.jpg?x=174&amp;amp;y=115&amp;amp;crop=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple drags UK government to court over &#8216;backdoor&#8217; order\",\"datePublished\":\"2025-03-05T18:47:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/\"},\"wordCount\":834,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/apple-drags-uk-government-to-court-over-backdoor-order.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/\",\"name\":\"Apple drags UK government to court over 'backdoor' order 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/apple-drags-uk-government-to-court-over-backdoor-order.jpg\",\"datePublished\":\"2025-03-05T18:47:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/apple-drags-uk-government-to-court-over-backdoor-order.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/apple-drags-uk-government-to-court-over-backdoor-order.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-drags-uk-government-to-court-over-backdoor-order\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple drags UK government to court over &#8216;backdoor&#8217; order\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple drags UK government to court over 'backdoor' order 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/","og_locale":"en_US","og_type":"article","og_title":"Apple drags UK government to court over 'backdoor' order 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-03-05T18:47:03+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2021\/03\/29\/shutterstock_eavesdrop_agent.jpg?x=174&amp;amp;y=115&amp;amp;crop=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple drags UK government to court over &#8216;backdoor&#8217; order","datePublished":"2025-03-05T18:47:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/"},"wordCount":834,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/apple-drags-uk-government-to-court-over-backdoor-order.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/","url":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/","name":"Apple drags UK government to court over 'backdoor' order 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/apple-drags-uk-government-to-court-over-backdoor-order.jpg","datePublished":"2025-03-05T18:47:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/apple-drags-uk-government-to-court-over-backdoor-order.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/apple-drags-uk-government-to-court-over-backdoor-order.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-drags-uk-government-to-court-over-backdoor-order\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple drags UK government to court over &#8216;backdoor&#8217; order"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58252"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/58253"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}