Why Your Data May Not Be So Private Anymore

What Apple’s encryption rollback means for personal and corporate security

Welcome to this week’s On the Circuit.

This week, we’re diving into Apple’s decision to weaken encryption for UK users—a move that sets a dangerous precedent for digital security. If one government can demand a backdoor, what’s stopping others from following suit?

In this issue, we break down what happened, why it matters, and the risks it poses for security professionals, high-net-worth individuals, and anyone handling sensitive data. Plus, we explore practical steps to mitigate these new threats and ask: is there any upside to this shift?

If you value privacy and security, you won’t want to miss this.

TOP STORY

Apple's Encryption Rollback: The Key Details

Apple has bowed to pressure from the UK government and removed its Advanced Data Protection (ADP) feature for British users.

The feature, which offered end-to-end encryption for iCloud backups, is now unavailable for new users in the UK. Existing users will lose access in the coming months.

Why? Because the UK government wants a backdoor.

Under the Investigatory Powers Act 2016 (IPA)—often dubbed the "Snooper’s Charter"—the government has the legal authority to compel companies to provide access to encrypted data - not only by Brits but by users worldwide. Reports suggest the Home Office issued a "technical capability notice" forcing Apple’s hand.

This move has reignited the global debate over encryption, privacy, and government surveillance.

But the big question is: what happens next?

Does This Really Change Everything?

This isn’t just about Apple. It’s about precedent.

Apple has historically resisted backdoors, even defying the FBI in 2016 when asked to unlock an iPhone tied to the San Bernardino shooting case. But now? They’ve given in.

So what’s stopping the U.S., EU, or Australia from making the same demands?

If the UK can do it, why can’t every other government?

Security professionals, privacy advocates, and executives dealing with sensitive data now face a new reality:

  • Cloud storage may no longer be a secure option.

  • Client and corporate data could be compromised.

  • Encrypted communications may not be as "private" as they seem.

According to The Verge, “Once a government establishes a legal precedent for backdoor access, others will inevitably follow”.

So where does this leave security professionals?

“The net effect is reduced security for everyone. If other governments follow the UK’s lead, we risk a future where strong encryption is functionally outlawed, which puts all of us at risk not just to government surveillance but also to eavesdropping by other bad actors.”

Mike Chapple - Former computer scientist at the National Security Agency

The Ripple Effect on Security & Privacy

This decision presents major risks for anyone in executive protection, cybersecurity, or corporate security.

  1. Executives and HNWIs are more vulnerable.

  • High-profile individuals store sensitive data on their devices—travel plans, financials, private communications.

  • If governments have backdoor access, who else might gain entry?

  1. Insider threats become more dangerous.

  • If intelligence agencies can access encrypted data, it’s only a matter of time before leaks, breaches, or abuses occur.

  • Remember Edward Snowden? He exposed how governments misuse surveillance tools.

  1. Criminal groups could exploit this shift.

  • If encryption is weakened, hackers, corporate spies, and even hostile nation-states will attempt to exploit it.

  • A compromised Apple ecosystem is a goldmine for cybercriminals.

So what can security professionals do to protect themselves and their clients?

Mitigation Strategies: Safeguarding Your Digital Privacy Moving Forward

This move makes one thing clear: security teams must adapt. Quickly.

Here are a few suggestions to help mitigate the risks:

1. Move Away from Cloud Reliance

  • iCloud backups are no longer secure in the UK.

  • Encourage clients to use local encrypted storage (e.g., external SSDs with AES-256 encryption).

  • Consider air-gapped solutions for highly sensitive data. Don’t know what an air-gap is? Here’s a quick heads up >

2. Switch to Truly Private Messaging Services

  • While iMessage remains encrypted, Apple has now shown it can be pressured.

  • Recommend apps with independently audited encryption, like Signal or ProtonMail.

  • For mission-critical conversations, consider encrypted email services hosted outside the UK.

3. Use Decentralized or Open-Source Encryption

  • Open-source encryption tools (like VeraCrypt for secure storage) ensure no single company holds the keys.

  • Tools like Tails OS can provide anonymity while handling sensitive communications.

4. Implement Compartmentalization

  • Encourage high-risk clients to separate personal and professional data.

  • Use different devices for different functions (e.g., one phone for business, one for personal use).

  • Leverage physical security measures—faraday bags, burner phones, and segmented networks.

By applying these steps, security teams can reduce exposure to mass surveillance and third-party breaches.

Is There an Upside to Apple's Move?

Are there valid arguments for why this might be a positive step?

First off, let’s be clear: Apple has not explicitly ‘opened a backdoor’. Instead, they have removed the feature which provided their top-level encryption. While this get’s a big thumbs down from most security analysts, there are a few who focus on the positives.

Some law enforcement officials believe this could help prevent crime.

The UK Home Office has long argued that encryption enables criminals to operate unchecked.

“Law enforcement agencies are facing increasing difficulty in accessing digital evidence,” the Home Office stated in defense of the IPA’s surveillance measures.

There’s some truth to that. Encrypted communication is often cited in child exploitation, terrorism, and drug trafficking cases.

But the bigger concern is who watches the watchers?

Surveillance powers are rarely used only for serious crimes. History has shown that government access can be misused, and so we must anticipate the unintended consequences.

One More Thing.

This isn’t just an Apple story. It’s a real concern for us as individuals and security professionals charged with keeping others safe and protected. regardless of where you operate, now is not a time to bury your head in the sand.

1. Expect more governments to follow.

  • The UK has set a precedent.

  • The US, EU, and others will likely push for similar backdoors.

2. Educate clients on new risks.

  • Encryption isn’t guaranteed anymore.

  • Teach executives, HNWIs, and corporate teams how to protect their data proactively.

3. Diversify security strategies.

  • Relying solely on Big Tech solutions is risky.

  • Use local storage, third-party encryption tools, and compartmentalization.

4. Keep an eye on where the next breach in your protective net will open up.

  • The fight over encryption is far from over.

  • What happens next could reshape how we operate in different geographical jurisdictions across the globe.

The UK may have been first, but it won’t be the last.

Adapt now, before the next backdoor opens. Subscribe to the Circuit Magazine to stay ahead of the curve.

Reader Poll

We’d love to hear your thoughts—select an option and share why it resonates with you!

What do you think about Apple’s decision to remove end-to-end encryption for UK users?

Login or Subscribe to participate in polls.

READER SPECIAL OFFER

Protect Yourself With a VPN, Antivirus and Security Alerts

Transitioning from Physical to Cyber Protection | Shaun Southall

People often talk about upskilling from a physical security role to becoming a cyber or converged security specialist. But what does that really mean?

On this episode of the podcast, we speak with Shaun Southall, an operator who has expertly and effectively converged the two worlds of physical and cyber together as a working security specialist.

Join us this week as we talk about:

  • Shaun’s asymmetric career journey into cyber security.

  • How the ‘uninitiated,’ physical security specialist can augment their skills.

  • What steps to take and what to avoid when breaking into the field.

  • The single biggest mindset shift that will determine your success.

As we say here, knowledge is power and, in our industry, “what you don’t know can hurt you.” So, tune in and get skilled up with our latest expert sharing his tricks of the trade and gems of experience!

WHAT YOU DON’T KNOW WILL HURT YOU!

Two decades of expert insights you can trust.

SNAPSHOTS

🇻🇳 Vietnam released a new baseline map delineating its maritime claims in the Gulf of Tonkin, asserting alignment with the 2000 agreement with China, which Beijing allegedly violated with its 2024 map update.

🇨🇳 China conducted live-fire naval drills in the Tasman Sea. The unexpected exercises between Australia and New Zealand led to diplomatic tensions and increased regional security concerns.

🇮🇱 Three empty buses exploded near Tel Aviv; no casualties reported. Prime Minister Netanyahu ordered intensified West Bank military operations, deploying tanks to Jenin for the first time since 2002.

🇺🇸 The US designated eight Latin American criminal groups as Foreign Terrorist Organizations. Move aims to combat drug trafficking but raises concerns about potential U.S. military action in Mexico.

PREVIOUS POLL RESULTS

Which factor contributed most to the David Balland kidnapping?

🟨🟨🟨🟨⬜️ A. Online exposure and poor digital hygiene (27%)

🟩🟩🟩🟩🟩 B. No professional security team. (51%)

🟨🟨🟨⬜️⬜️ C. Ineffective home security and access control 15%)

🟨⬜️⬜️⬜️⬜️ D. Other. Let us know your thoughts. (7%)

Your thoughts:

LA: "By demonstrating poor Digital habits, he conducted the reconnaissance for the kidnap team. From that post alone you can understand the basic positioning, layout of the premises as well as a profile of who will be in the premises. I'm sure there were more posts of a similar value that proved useful to the kidnappers."

Stay Ahead with the Circuit

Here at the Circuit, we're committed to keeping you informed about the latest trends and best practices in executive protection.

Subscribe to our magazine for more insights, expert interviews, and updates on training opportunities that can help you stay at the forefront of our evolving industry.

***

Thank you for sticking with us to the end; we appreciate your support.

Stay safe, and keep looking out for one another.

P.S. If you like this newsletter and want to support it, this week there are 3 ways! PICK ONE right now before you forget:

  1. Get a Subscription to Circuit Magazine. 

  2. Promote yourself to over 10,000 industry professionals by sponsoring this newsletter.

  3. Forward this newsletter to a friend. Here's a handy message you can use to share with your friends:

Hey! Have you read On the Circuit? It’s a newsletter for Protectors -- Each week you'll receive an email giving you the low-down on what's happening across the industry. Sign up here. It’s free: https://archives.circuit-magazine.com/

Other Publications Your Might Enjoy

Get the Latest Issue

Reply

or to participate.