Apple’s recent decision to cancel its end-to-end encryption plans means that the company will still have the ability to decrypt iPhone and iPad backups for law enforcement purposes.
Prior to the FBI complaints, Apple was planning to implement end-to-end encryption on iCloud.
Although this would make it harder for the hackers, it does represent a conflict of interest when it comes to law enforcement investigations.
If the original plans had come to fruition, not even a court order would be sufficient to unlock the encrypted data.
According to some Apple employees, the FBI complaints weren’t the only reason why the company decided to drop its end-to-end encryption plans.
Another way to look at it is through the eyes of the end customers and the possibility of them not being able to access their own files.
Either way, the encryption project, which is going by the names of Plesio and KeyDrop, was put on halt, meaning that ten of the experts who used to work on it are no longer doing so.
Apple’s decision attests to the fact that the company is more than willing to lend a helping hand to the US law enforcement and intelligence agencies.
How does end-to-end encryption differ from the regular one?
In essence, the regular encryption makes sure that the user needs to have a special key to access the data that’s stored on the hard drive.
End-to-end encryption, however, goes a step beyond that by incorporating a device passcode that only the user knows.
In addition to that, the device’s unique fingerprint is used.
In other words, only the user will be able to access the data that has undergone this type of encryption, and neither Apple nor law enforcement agencies have the power to override it.