The Redcoats Have Gone Completely Insane: A Call to Action for Your Digital Autonomy
UK Government Parasites Insist on Backdoor Access to Apple Users' Encrypted Data
"Everything bad originated from 'Great' Britain.” There, I said it. I refer to the government of course, not the people. But their ruling class invented concentration camps, central banking, all the good stuff. Now they want your data, but not just the British people's data, no, no, EVERYONE'S data. At least those of Apple users because they already have that of Windows and Android people.
If you appreciate my articles, please consider giving them a like. It's a simple gesture that doesn't cost you anything, but it goes a long way in promoting this post, combating censorship, and fighting the issues that you are apparently not a big fan of.
Jokes aside, the British Empire has just slapped Apple with a super-secret technical capability notice, demanding the creation of a backdoor into users' encrypted iCloud data WORLDWIDE.
The UK, armed with the Investigatory Powers Act of 2016, believes it's entitled to universal access to everyone's private data around the globe. This law gives MI5 and MI6 “agents” 'God-mode' hacking powers, and compels internet service providers to keep tabs on every website you visit, alongside a host of other mass-surveillance capabilities.
What's truly insane, though, is that it's illegal for Apple to even whisper about this demand, cloaked in the shadows of secrecy. This silence must have been broken by some courageous whistleblower, leaking the story to the media.
Nobody but Apple has a clue how much data is stored in iCloud, but we're talking exabytes - a scale so vast it's almost incomprehensible. Most of this data lives under regular encryption, secured during transit when you upload it and at rest on servers, with the decryption keys held tight in an Apple data center. The British government is content with this setup because, in theory, they could storm in, musket in hand, and force Apple to hand over those keys to your personal treasure trove.
But in 2022, Apple introduced something the government despises: Advanced Data Protection. This feature employs end-to-end encryption, where the crucial difference is your control over the keys. This means that even if the British Empire came knocking with muskets, Apple couldn't access your data because they don't hold the keys. It's a win for privacy enthusiasts, but there's a catch - lose your key, and you might lose your data forever.
Now, end-to-end encryption isn't a newfangled concept. PGP, or Pretty Good Privacy, was crafted back in 1991, providing a shield for email privacy. Fast forward to today, and apps like Signal and WhatsApp have taken encryption to new heights with the double ratchet algorithm.
This method features a root key ratchet that spawns new key pairs for each message, alongside a sending-receiving chain ratchet that creates unique message keys. This not only ensures end-to-end encryption but also guarantees that if a key is compromised, it can't unlock past or future messages, rendering any intrusion by the British crown-sucking retards or any other entity largely ineffective.
The audacity of the British to claim global data rights under the cloak of the 2016 Investigatory Powers Act is nothing short of imperial overreach. They've given themselves 'God-mode' hacking privileges, forcing ISPs to log every click and scroll, all while claiming to protect the very privacy they seek to invade. This saga isn't just about technology or privacy; it's about the enduring legacy of arrogant British interference, now playing out in the digital realm.
Until quantum computers render current encryption methods obsolete, there's little the government can do to seize your data without your mistakes or outright banning such technology. And the UK seems to be leaning towards the latter.
But the burning question remains: Will Apple succumb to this pressure?
There's no shortage of reasons to criticize Apple, but when it comes to data protection, they've generally outshone their peers like Microsoft and Google. Remember 2016, post-San Bernardino shooting? Apple stood firm, refusing the Department of Justice's demand to unlock an iPhone. The FBI wanted Apple to engineer an iOS backdoor, but Apple's refusal led the FBI to spend over a million dollars to a third party just to crack the phone.
Given this history, it's improbable that Apple will simply roll over for this 'technical capability notice.'
What's more likely is some form of compromise, perhaps where Apple restricts its Advanced Data Protection to users outside the so-called 'People's Republic of the UK.'—but hey, at least you got Apple Intelligence.
Now, if you genuinely value privacy as a fundamental human right (and are not engaged in nefarious activities), here's what you should consider:
Use VPNs: Secure your internet connection and mask your IP address. This can help prevent your ISP from logging your web activity under UK surveillance laws.
Switch to Privacy-Focused Services: Opt for services that prioritize end-to-end encryption by default, like ProtonMail for email or Tutanota. For messaging, Signal remains a top choice for its robust encryption and forward secrecy.
Enable Multi-Factor Authentication (MFA): Add layers of security to your accounts. Even if someone gets your password, they won't get far without the second factor.
Educate Yourself on Data Management: Learn how to manage your encryption keys properly. Use hardware security keys if possible, to store your encryption keys physically.
Stay Informed: Keep up with changes in laws that affect privacy and encryption. The landscape is always shifting, especially with nations like the UK pushing boundaries.
Support Advocacy Groups: Organizations like the Electronic Frontier Foundation (EFF) or Privacy International fight for digital rights. Supporting them can help in the broader fight for privacy.
Consider Decentralized Options: Look into decentralized platforms for data storage and communication, where control is distributed among users rather than centralized in one company.
Build Your Own Home Server for a Private Cloud: Take control of your data by setting up a home server. This allows you to host your own cloud storage, where you manage the encryption, access, and security. It also empowers you to manage the convenience of a smart home or local CCTV cameras on your premises, independently from manufacturer cloud solutions or dependence on online connections. (Explore Homebridge, Home Assistant, and Scrypted.) It's a more involved process but offers unparalleled control over your digital life, free from corporate or governmental oversight.
Ensure all your communications are secured with end-to-end encryption, using apps like Signal.
Implement full disk encryption (Apple/Windows/Linux) on your hard drive. This means even if someone physically accesses your device, they won't be able to read your data without the password.
You'll want to use a trusted VPN with a strict no-logs policy to hide your IP address and encrypt your internet traffic. But don't stop there; you may also want to do your “problematic” browsing using only the Tor browser over the Onion network. This will further anonymize your traffic, although your ISP will know you're using Tor, potentially flagging you on an MI5 watchlist in the UK, where ISPs are legally bound to monitor website visits.
For added security, whenever needed, operate on an amnesic operating system like Tails OS. This runs directly from a USB drive and erases all traces from memory upon shutdown, thwarting any attempts at a cold boot attack should authorities raid your premises.
Privacy is indeed a beautiful thing, made possible through the intricate magic of math and computer science. These tools and practices create a formidable barrier against surveillance, maintaining your digital sovereignty in an era where privacy is under constant threat.
You don't need to go full Edward Snowden, ditching your laptop or iPhone and swearing off cloud services forever, but every small action counts as a step in the right direction. Be mindful of what information you share and with whom.
Remember, in this game of cat and mouse with surveillance states, every little bit of security you add to your digital life is a step towards reclaiming your privacy. The UK's approach to data access under laws like the Investigatory Powers Act is a reminder of how far some will go to infringe upon individual rights. By utilizing these methods, you're not just protecting your data; you're also standing against a legacy of control and overreach.
If you're keen on diving deeper into digital autonomy, learning how to construct your own server, or exploring further resources on these subjects, check out the links below, or add your own in the comments. And remember, giving the British government the middle finger has always been a time-honored tradition of resistance.
Resources:
“Libre Solutions Network” - Dives into all things around digital autonomy; also on Substack.
"Techlore" - Offers in-depth reviews and guides on VPNs, privacy, and security.
"Cyberinsider" - Provides detailed comparisons and reviews of VPN services, focusing on privacy policies.
“The Hated One" - Focuses on privacy-centric tech, including alternative services for communication and storage.
"ProtonMail Blog" - Discusses the importance of encrypted email and other privacy-focused services.
"All Things Secured" - Covers security basics, including MFA, in an accessible way.
“Null Byte" - Part of WonderHowTo, it has tutorials on data encryption and security.
"CryptoParty Handbook" - A collection of guides for various privacy-enhancing tools and practices.
"Electronic Frontier Foundation" (EFF) - They share updates on digital rights and privacy advocacy.
"Jeff Geerling" - Known for his approachable tutorials on setting up home servers and NAS.
“SpaceRex” - Known for his approachable tutorials on setting up Synology home servers (prebuilt, affordable solutions that get you started quickly and with little knowledge necessary.)
“DigDeeper” - Helps you find your next privacy-friendly mail service or browser.
How you can support my writing:
Restack, like and share this post via email, text, and social media
Thank you; your support keeps me writing and helps me pay the bills. 🧡
The British are coming, The British are coming…..sorry I had to do that 🤭
Great info, thanks. Lily. It feels incredibly creepy actually living in that very country...