{"id":1399,"date":"2025-04-14T20:15:56","date_gmt":"2025-04-14T20:15:56","guid":{"rendered":"https:\/\/ykhong.com\/writes\/?p=1399"},"modified":"2025-04-14T20:15:56","modified_gmt":"2025-04-14T20:15:56","slug":"end-to-end-encryption-should-be-the-bare-minimum","status":"publish","type":"post","link":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/","title":{"rendered":"End-to-End Encryption Should be the Bare Minimum"},"content":{"rendered":"\n<p>Apple recently eliminated its Advanced Data Protection (ADP) feature for users in the UK. ADP enables end-to-end encryption.<\/p>\n\n\n\n<p>Here are several features that are NOT end-to-end encrypted without Advanced Data Protection turned on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>iCloud Backup (including device and Messages backup)<\/li>\n\n\n\n<li>iCloud Drive<\/li>\n\n\n\n<li>Photos<\/li>\n\n\n\n<li>Notes<\/li>\n\n\n\n<li>Reminders<\/li>\n\n\n\n<li>Freeform<\/li>\n\n\n\n<li>Safari Bookmarks<\/li>\n\n\n\n<li>Siri Shortcuts<\/li>\n\n\n\n<li>Voice Memos<\/li>\n\n\n\n<li>Wallet passes<\/li>\n<\/ul>\n\n\n\n<p>If you&#8217;ve been following me for any amount of time, you know how often I talk about end-to-end encryption being great for you as the user.<\/p>\n\n\n\n<p>Typically, when companies like Google or Apple say that something is \u201cencrypted,\u201d it means that it is encrypted from <em>others,<\/em> but not from them. This means that they have the key to access user data when they need or want. So, though it may be encrypted, it is not end-to-end encrypted. End-to-end encryption encrypts data from Apple and Google as well.<\/p>\n\n\n\n<p>Advanced Data Protection is a feature that is not enabled by default and many users do not know about it, and thus do not use it. And now in the UK, it&#8217;s not available at all.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>To enable this on an iPhone outside of the UK, go to Settings &gt; Profile Image &gt; iCloud &gt; Advanced Data Protection ON. This is for iPhones only.<\/code><\/pre>\n\n\n\n<p>In January of this year, the UK government issued a secret order to Apple to share Apple user data globally in case of a \u201cnational security threat.\u201d We know historically, for Empire, this can mean anything they want it to mean.<\/p>\n\n\n\n<p>Adhering to this request would have required Apple to create a backdoor into their ADP, which essentially breaks end-to-end encryption. Backdoors are a way for an entity to get access into something that otherwise they shouldn&#8217;t have access to. In other words, backdoors are really front doors for those who are able to gain access.<\/p>\n\n\n\n<p>So instead of building that backdoor into Advanced Data Protection, Apple decided to eliminate ADP altogether in the UK.<\/p>\n\n\n\n<p>Now, some people may think, \u201cOh, that&#8217;s great. Apple didn&#8217;t build the backdoor, so good on them.\u201d No, Apple does not get points for doing the bare minimum. They were given the option to appeal, but they chose not to. They chose to eliminate the feature altogether not to protect and fight for their users, but to protect themselves and their existence in the UK.<\/p>\n\n\n\n<p>Advanced Data Protection, end to end-to-end encryption, could have been built into the entire device and platform themselves so that there would be no way to remove it. However, that is not what Apple chose to do, in addition to the fact that it is not turned on by default.<\/p>\n\n\n\n<p>Thus, even though they decided to get rid of the function and not build a backdoor, all of this should give everyone pause, regardless of whether you are an Apple user.<\/p>\n\n\n\n<p>Requests to bypass security and privacy of data are made all the time from governments and regimes to companies that make hardware and software, from the devices themselves, to email, notes, storage, messaging apps, and more.<\/p>\n\n\n\n<p>So what does this mean practically for us? We need to continue pressuring companies, some more than others. As I&#8217;ve covered many times in the past, Big Tech\u2019s primary purpose is not to protect your data, but to harvest and profit from it.<\/p>\n\n\n\n<p>This is a constant reminder that Empire and the corporations that thrive under them in no way have your best interests in mind, so do not use their platforms as if they do.<\/p>\n\n\n\n<p>Under Empire, <strong>always think about the intention of a company<\/strong> and why they have made the product or service to function in the specific way it does. This can help you navigate and make decisions about your relationship with these hardware and software products.<\/p>\n\n\n\n<p>Take what you need, protect what you can. Stay private and secure out there.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple recently eliminated its Advanced Data Protection (ADP) feature for users in the UK. ADP enables end-to-end encryption. Here are several features that are NOT&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/\">Continue reading<span class=\"screen-reader-text\">End-to-End Encryption Should be the Bare Minimum<\/span><\/a><\/div>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":2,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":null,"activitypub_content_visibility":"quiet_public","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[59,319,132],"tags":[342,344,343],"class_list":["post-1399","post","type-post","status-publish","format-standard","hentry","category-digital-security","category-surveillance","category-tech-justice","tag-big-tech","tag-encryption","tag-end-to-end-encryption","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>End-to-End Encryption Should be the Bare Minimum - YK Hong<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"End-to-End Encryption Should be the Bare Minimum - YK Hong\" \/>\n<meta property=\"og:description\" content=\"Apple recently eliminated its Advanced Data Protection (ADP) feature for users in the UK. ADP enables end-to-end encryption. Here are several features that are NOT&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/\" \/>\n<meta property=\"og:site_name\" content=\"YK Hong\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-14T20:15:56+00:00\" \/>\n<meta name=\"author\" content=\"YK Hong\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"YK Hong\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/\"},\"author\":{\"name\":\"YK Hong\",\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/#\\\/schema\\\/person\\\/63b3947dbd600c6852806eb0df10ff59\"},\"headline\":\"End-to-End Encryption Should be the Bare Minimum\",\"datePublished\":\"2025-04-14T20:15:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/\"},\"wordCount\":616,\"keywords\":[\"big tech\",\"encryption\",\"end to end encryption\"],\"articleSection\":[\"Digital Security\",\"Surveillance\",\"Tech Justice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/\",\"url\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/\",\"name\":\"End-to-End Encryption Should be the Bare Minimum - YK Hong\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/#website\"},\"datePublished\":\"2025-04-14T20:15:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/#\\\/schema\\\/person\\\/63b3947dbd600c6852806eb0df10ff59\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/end-to-end-encryption-should-be-the-bare-minimum\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"End-to-End Encryption Should be the Bare Minimum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/#website\",\"url\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/\",\"name\":\"YK Hong\",\"description\":\"Anti-Oppression + Tech Justice\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/#\\\/schema\\\/person\\\/63b3947dbd600c6852806eb0df10ff59\",\"name\":\"YK Hong\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a15b441b4016831a8613d616f5f3001a5f85740f89911c468ca141046ce847c6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a15b441b4016831a8613d616f5f3001a5f85740f89911c468ca141046ce847c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a15b441b4016831a8613d616f5f3001a5f85740f89911c468ca141046ce847c6?s=96&d=mm&r=g\",\"caption\":\"YK Hong\"},\"url\":\"https:\\\/\\\/ykhong.com\\\/writes\\\/author\\\/blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"End-to-End Encryption Should be the Bare Minimum - YK Hong","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"End-to-End Encryption Should be the Bare Minimum - YK Hong","og_description":"Apple recently eliminated its Advanced Data Protection (ADP) feature for users in the UK. ADP enables end-to-end encryption. Here are several features that are NOT&#8230;","og_url":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/","og_site_name":"YK Hong","article_published_time":"2025-04-14T20:15:56+00:00","author":"YK Hong","twitter_card":"summary_large_image","twitter_misc":{"Written by":"YK Hong","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/#article","isPartOf":{"@id":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/"},"author":{"name":"YK Hong","@id":"https:\/\/ykhong.com\/writes\/#\/schema\/person\/63b3947dbd600c6852806eb0df10ff59"},"headline":"End-to-End Encryption Should be the Bare Minimum","datePublished":"2025-04-14T20:15:56+00:00","mainEntityOfPage":{"@id":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/"},"wordCount":616,"keywords":["big tech","encryption","end to end encryption"],"articleSection":["Digital Security","Surveillance","Tech Justice"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/","url":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/","name":"End-to-End Encryption Should be the Bare Minimum - YK Hong","isPartOf":{"@id":"https:\/\/ykhong.com\/writes\/#website"},"datePublished":"2025-04-14T20:15:56+00:00","author":{"@id":"https:\/\/ykhong.com\/writes\/#\/schema\/person\/63b3947dbd600c6852806eb0df10ff59"},"breadcrumb":{"@id":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ykhong.com\/writes\/end-to-end-encryption-should-be-the-bare-minimum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ykhong.com\/writes\/"},{"@type":"ListItem","position":2,"name":"End-to-End Encryption Should be the Bare Minimum"}]},{"@type":"WebSite","@id":"https:\/\/ykhong.com\/writes\/#website","url":"https:\/\/ykhong.com\/writes\/","name":"YK Hong","description":"Anti-Oppression + Tech Justice","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ykhong.com\/writes\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ykhong.com\/writes\/#\/schema\/person\/63b3947dbd600c6852806eb0df10ff59","name":"YK Hong","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a15b441b4016831a8613d616f5f3001a5f85740f89911c468ca141046ce847c6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a15b441b4016831a8613d616f5f3001a5f85740f89911c468ca141046ce847c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a15b441b4016831a8613d616f5f3001a5f85740f89911c468ca141046ce847c6?s=96&d=mm&r=g","caption":"YK Hong"},"url":"https:\/\/ykhong.com\/writes\/author\/blog\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/posts\/1399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/comments?post=1399"}],"version-history":[{"count":1,"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/posts\/1399\/revisions"}],"predecessor-version":[{"id":1400,"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/posts\/1399\/revisions\/1400"}],"wp:attachment":[{"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/media?parent=1399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/categories?post=1399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ykhong.com\/writes\/wp-json\/wp\/v2\/tags?post=1399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}