Apple has announced a significant expansion of Advanced Data Protection (ADP), its end-to-end encryption (E2EE) feature for iCloud, extending availability to additional countries and adding new protected data categories. The company simultaneously reaffirmed its refusal to comply with UK government demands for backdoor access—a standoff that has left British users unable to access the feature.

Expansion overview

AttributeDetails
Total countries available170+
New countries added14
Protected data categories23
UK availabilityNot available

More data categories protected

Advanced Data Protection now covers 23 iCloud data categories with end-to-end encryption.

Newly added categories

CategoryProtection
iCloud MailMessage content and attachments
ContactsFull contact information
CalendarsEvents and scheduling data
SafariBrowsing history and tab groups
WalletPasses and transaction metadata
FreeformCollaborative boards

Previously protected categories

CategorySince
iCloud BackupDecember 2022
NotesDecember 2022
PhotosDecember 2022
iCloud DriveDecember 2022
Messages in iCloudDecember 2022
Safari BookmarksDecember 2022
Siri ShortcutsDecember 2022
Voice MemosDecember 2022
Health dataDecember 2022

How protection works

When ADP is enabled:

  • Encrypted data can only be decrypted on the user’s trusted devices
  • Apple cannot access the data
  • Law enforcement requests and government subpoenas cannot be fulfilled by Apple
  • Only the user (or their designated recovery contacts) can access the information

Geographic expansion

Apple expanded ADP availability to 14 additional countries, bringing the total to over 170 nations.

Notable additions

RegionCountries
Southeast AsiaIndonesia, Vietnam
Middle EastTurkey, Egypt
AfricaNigeria

The expansion followed Apple’s engagement with local regulators to clarify that:

  • ADP is an opt-in user feature, not a default setting
  • Standard iCloud data remains accessible to Apple under existing legal frameworks when ADP is not enabled
  • The feature addresses growing data breach and surveillance threats

UK standoff continues

The expansion comes amid an ongoing and intensifying dispute with the United Kingdom government.

Timeline

DateEvent
January 2025UK Home Office issues Technical Capability Notice (TCN)
February 2025Apple withdraws ADP from UK market
August 2025UK reportedly withdraws worldwide demand after US protest
Late 2025UK issues new order targeting British users only
January 2026Tribunal hearing scheduled (status uncertain)

The Investigatory Powers Act demand

The UK Home Office issued a Technical Capability Notice (TCN) under the Investigatory Powers Act 2016, demanding that Apple create a mechanism to access end-to-end encrypted iCloud data for law enforcement purposes.

Initial demand: The original order reportedly required Apple to provide backdoor access to data of all Apple users worldwide—not just UK citizens.

US government response: The United States government protested the extraterritorial scope of the demand.

Revised demand: Following US objections, the UK reportedly withdrew the worldwide requirement and issued a new order applying only to British users.

Apple’s position

Apple has maintained an unwavering stance:

“We have never built a backdoor or master key to any of our products or services, and we never will. End-to-end encryption is a critical technology that protects the security of our users, journalists, human rights workers, and everyday citizens.”

Rather than comply with the TCN, Apple chose to withdraw ADP entirely from the UK market in February 2025.

Current UK user impact

FeatureStatus for UK users
Advanced Data ProtectionNot available
Standard Data ProtectionAvailable
iMessage E2EEAvailable (default)
FaceTime E2EEAvailable (default)
iCloud KeychainAvailable (default E2EE)
Health dataAvailable (default E2EE)

Some existing UK users who enabled ADP before the withdrawal reportedly still have access to the encrypted service.

Privacy organization response

Organizations including the Electronic Frontier Foundation (EFF), Access Now, and Privacy International have supported Apple’s position:

“Any backdoor created for one government would inevitably be exploited by adversaries and authoritarian regimes.”

The privacy community argues that weakening encryption for UK law enforcement creates vulnerabilities that attackers—including hostile nation-states—would eventually exploit.

Technical architecture

ADP uses Apple’s established security architecture:

Key management

ComponentFunction
Device-generated keysEncryption keys created on user’s devices
Secure EnclaveHardware protection for key material
iCloud KeychainTransparent key synchronization
Hardware Security ModulesData center access control enforcement

Recovery options

MethodDescription
Recovery keyUser-generated backup key
Recovery contactsDesignated trusted individuals
Apple employeesCannot assist (no key access)

iCloud Mail encryption

Apple noted that adding iCloud Mail encryption required significant engineering work to maintain compatibility with standard email protocols:

  • E2EE applies to mail stored in iCloud
  • Encrypted mail is fully interoperable when sending to external recipients
  • Transit encryption (TLS) still applies to all email delivery

Industry context

Apple’s expansion reinforces a broader trend toward default and optional E2EE:

CompanyPlatformStatus
GoogleGoogle Messages (RCS)Default E2EE (2024)
MetaMessengerDefault E2EE (late 2023)
MetaWhatsAppDefault E2EE (since 2016)
ProtonProton Mail/DriveE2EE-native
TutaTuta MailE2EE-native

The encryption policy debate

The tension between encryption and lawful access remains one of the most significant policy debates in cybersecurity:

Pro-encryption positionPro-access position
Protects against data breachesImpedes criminal investigations
Enables journalism and activismShelters child exploitation
Preserves human rightsEnables terrorism planning
Prevents mass surveillanceFrustrates legitimate warrants

No resolution is expected in 2026.

Enabling Advanced Data Protection

Requirements

DeviceMinimum version
iPhone/iPadiOS/iPadOS 16.2
MacmacOS 13.1 (Ventura)
All account devicesMust be updated

Setup path

Settings → Apple ID → iCloud → Advanced Data Protection

Before enabling

Apple recommends:

  1. Set up at least one recovery method (recovery key or recovery contact)
  2. Update all devices on the account to supported software versions
  3. Understand that Apple cannot assist with data recovery once E2EE is active

Recommendations

For users in available regions

ActionBenefit
Enable ADPMaximum iCloud protection
Set recovery methodsEnsure account recovery capability
Update all devicesEnable full feature set

For UK users

OptionConsideration
Use default E2EE featuresiMessage, FaceTime, Keychain, Health still protected
Alternative servicesProton, Tuta for E2EE email/storage
Monitor legal developmentsADP may return if tribunal rules against TCN

For organizations

ConsiderationAssessment
Data sovereigntyUnderstand where employee data is stored
ComplianceE2EE may conflict with retention requirements
Employee protectionJournalists, activists, executives may need E2EE

Context

Apple’s ADP expansion demonstrates commitment to user privacy while highlighting the global fragmentation of encryption policy. The same feature that protects 170+ countries’ users is unavailable to British citizens due to government demands that Apple has refused to accommodate.

The UK situation illustrates the practical consequences of encryption backdoor demands:

  • Users lose access to security features
  • No backdoor is actually created
  • The government achieves neither surveillance capability nor user protection

For users outside the UK, the expansion of ADP to additional data categories—particularly iCloud Mail—represents a significant enhancement to iCloud security. The addition of email encryption addresses a long-standing gap, though the complexity of email protocols means the protection applies primarily to stored mail rather than messages in transit to external recipients.

The encryption policy debate will continue, but Apple’s position appears firm: the company will withdraw features rather than compromise the cryptographic guarantees it provides to users.