On 13 February 2025, 109 civil society organizations, companies, and cybersecurity experts, including Global Encryption Coalition members, published a joint letter to the British Home Secretary Yvette Cooper calling on the UK Home Office to rescind its demand that Apple create a backdoor into its end-to-end encrypted services.
The letter, published and sent to the Home Secretary initially on 13 February, remains open to sign-ons until 20 February. After 20 February, a final version of the letter with a complete list of signatures will be sent to the Home Secretary. Until 20 February, the list of signatories will be updated daily.
If you are a cybersecurity expert or work at an organization or company that would like to sign on to this open letter in support, please fill out this sign-on form.
The current number of signatures is 212. (last updated at 14.45UTC, 17 February)
To The Rt Hon Yvette Cooper MP,
The undersigned civil society organizations, companies, and cybersecurity experts, including members of the Global Encryption Coalition1, call on the UK Home Office to rescind its demand that Apple create a backdoor into its end-to-end encrypted services. This demand jeopardizes the security and privacy of millions, undermines the UK tech sector, and sets a dangerous precedent for global cybersecurity.
Reports indicate that the UK Government has issued a technical capability notice (or TCN) to Apple under the Investigatory Powers Act 2016 s.253 (IP Act). If all had gone according to plan, the UK government would have forced Apple to build a backdoor into its end-to-end encrypted cloud services. The world’s second-largest provider of mobile devices would be built on top of a systemic security flaw, putting all of its users’ security and privacy at risk, not just in the UK but globally.
The consensus among cybersecurity experts could not be clearer: there is no way to provide government access to end-to-end encrypted data without breaking end-to-end encryption, thus putting every user’s security and privacy at risk.
Strong encryption keeps information and communication confidential. In a digital society, encryption is critical to safeguarding citizens both online and off, to protecting the digital economy, and to ensuring national security. In late January, the UK’s National Audit Office released a report that the “cyber threat to the UK government is severe.”2 As Ciaran Martin, former Director and founder of the UK Government’s National Cybersecurity Center notes “E2EE [end-to-end encryption] must expand, legally unfettered, for the betterment of our digital homeland.”3 With cyberattacks becoming ever-more frequent and sophisticated4, the reliance of the UK government, citizens, and businesses on end-to-end encryption to keep themselves safe and secure has never been greater.
The UK Government has stressed the importance of digital technologies to the UK’s economic growth, but by forcing a company to secretly undermine the security of their product, the UK government risks foreign companies leaving the market and casting doubt on the security of products from UK tech companies. For some global companies, they may choose to leave the UK market rather than face the global reputational risks that breaking the security of their products would entail. UK companies will also suffer reputational damage, as foreign investors and consumers will consider whether their products are riddled with secret UK government-mandated security vulnerabilities.
International human rights bodies have recognised the importance of end-to-end encryption to protect the right to privacy and to promote the exercise of other rights. This is because being able to communicate safely and securely can be a precondition to being able to communicate and express one’s views. The case law of the European Court of Human Rights (ECtHR) recognises the importance of anonymity in “promoting the free flow of ideas and information in an important manner” including by protecting people from reprisals for their exercise of freedom of expression5. In February 2024, the ECtHR found that Russia’s order issued to Telegram requiring it to disclose “technical information” including encryption keys breached human rights law, as it was not proportionate6.
Undermining the confidentiality of cloud services would have the most harmful impact on those already at greatest risk: families, domestic violence survivors7, LGBTQ+ individuals8, and many more who rely on the safety and privacy provided by end-to-end encrypted services. For these and other at-risk groups, the confidentiality guaranteed by end-to-end encryption can be critical in preventing harassment and physical violence.
Similarly, encrypted communications protect the UK’s national security. Government services benefit from encryption and providing backdoors in one instance can lead to encryption being weakened across the ecosystem of the public sector, as well. For national security professionals and government employees, access to end-to-end encrypted services allows them to safeguard their personal life. Ensuring the security and privacy of government officials is vital for helping prevent extortion or coercion attempts, which could lead to greater national security damage.
To ensure the national and economic security of the United Kingdom, the Home Office must end its technical capability notice forcing Apple to break its end-to-end encryption.
- https://www.globalencryption.org/about/members/ ↩︎
- https://www.nao.org.uk/press-releases/cyber-threat-to-uk-government-is-severe-and-advancing-quickly-spending-watchdog-finds/ ↩︎
- https://www.bsg.ox.ac.uk/sites/default/files/2021-11/End-to-end%20Encryption%20Ciaran%20Martin%20Blavatnik%20School.pdf ↩︎
- https://cyberscoop.com/salt-typhoon-us-government-jen-easterly-cisa/ ↩︎
- Delfi AS v Estonia [2015] EMLR 26, [147] and [149]: https://hudoc.echr.coe.int/eng#{“itemid”:[“001-155105”]} ↩︎
- Podchasov v Russia [2024] ECHR 134 [79]: https://hudoc.echr.coe.int/eng/#{%22itemid%22:[%22001-230854%22]} ↩︎
- https://www.internetsociety.org/wp-content/uploads/2021/05/NNEDV_Survivor_FactSheet-EN.pdf ↩︎
- https://www.lgbttech.org/encryption-privacy-security ↩︎
Signatories*
Organizations
3 Steps Data
Access Now
Ambient Information Systems
ARTICLE 19
AT Worthy Technology
BETAPERSEI SC
Big Brother Watch
Bits of Freedom
Brass Horn Communications
British Columbia Civil Liberties Association
Canadian Civil Liberties Association (CCLA)
Center for Democracy & Technology
Centro de Estudios Legales y Sociales (CELS)
Chaos Computer Club
Chayn
Comunitatea Internet Association
Community Focus Foundation Ghana
Cryptography Consulting LLC
CyberPeace Institute
Cybersecurity Advisors Network (CyAN)
cyberstorm.mu
Defend Digital Me
Digital Rights Ireland
Digital Rights Nepal
eco – Association of the Internet Industry
Ecoband Ltd.
École Supérieure Polytechnique, Cheikh Anta Diop University of Dakar
Egyptian Initiative for Personal Rights (EIPR)
Electric Coin Co.
Electronic Frontiers Australia Inc
Electronic Frontier Foundation
Electronic Frontier Norway
Electronic Privacy Information Center (EPIC)
Element
European Champions Alliance
FiCom ry
Fight for the Future
Filecoin Foundation
Foundation for Information Policy Research
Freedom of the Press Foundation
Fundación Karisma
Gate 15
Girlhype Women Who Code
Global Partners Digital
GreenNet
Homo Digitalis
Icebreaker Labs
Index on Censorship
International Civil Liberties Monitoring Group
Institute for Research on Internet and Society
Instituto NUPEF
Internet Architecture Board
Internet Governance Project
Internet Society
Internet Society Benin Chapter
Internet Society Cameroon Chapter
Internet Society Ecuador Chapter
Internet Society Ethiopia Chapter
Internet Society Democratic Republic of Congo Chapter
Internet Society Dominican Republic Chapter
Internet Society Guinea Chapter
Internet Society Honduras Chapter
Internet Society India Hyderabad Chapter
Internet Society Kenya Chapter
Internet Society Lesotho Chapter
Internet Society Mali Chapter
Internet Society Manitoba Chapter
Internet Society Mexico Chapter
Internet Society Niger Chapter
Internet Society Panama Chapter
Internet Society Peru Chapter
Internet Society Portugal Chapter
Internet Society Rwanda Chapter
Internet Society Senegal Chapter
Internet Society South Sudan Chapter
Internet Society Switzerland Chapter
Internet Society Tanzania Chapter
Internet Society Togo Chapter
Internet Society UK England Chapter
Internet Society Venezuela Chapter
Internet Society Zambia Chapter
Irish Council for Civil Liberties
ISOC Brazil – Brazilian Chapter of the Internet Society
ISOC-CAT Catalan Chapter
IT-Pol Denmark
JCA-NET
Kenya Human Rights Commission
Labor Tech Research Network
Law and Technology Research Institute of Recife
Legal Resources Centre
LGBT Tech
Marks Software Limited
Mozilla
Myntex
NetTek Ltd
Nym
OpenMedia
Open Culture Foundation
Open Rights Group
OPTF
Osservatorio Balcani Caucaso Transeuropa (OBCT)
Palmer Computer Services Inc.
Peergos LTD
Phoenix R&D
PointWire
Politon – Strengthening democracy
Prague Centre for Media Skills
PrivacyMatters
Privacy & Access Council of Canada
Privacy International
Psst
Quilibrium Inc
Red de Desarrollo Sostenible – Honduras
Science & Design, Inc.
SECURECOM
SECURECRYPT
SkypLabs
Software Freedom Law Center India (SFLC.IN)
Surfshark
Taconic Systems
Tech for Good Asia
TEDIC
The Tor Project
The Zcash Foundation
Tuta Mail
Unhack Democracy
Universal Privacy Alliance
Vircos Tecnologia
Individual Experts
Andrea Basso, University of Bristol
Professor Subhajit Basu, School of Law, University of Leeds
Steven M. Bellovin, Columbia University
Professor Eerke Boiten, De Montfort University
Ian Brown, Visiting Professor, Fundaçao Getulio Vargas Direito
Randy Bush, Internet Initiative Japan & Arrcus Inc
Jon Callas, Indiana University
Duncan Campbell, University of Sussex
Sofía Celi, Brave
Michael J. Chapple, University of Notre Dame
Richard Clayton, University of Cambridge
Andrew Clement, Faculty of Information, University of Toronto
Ben Collier, University of Edinburgh
Rachel Coldicutt OBE
Deirdre Connolly
Alissa Cooper, Georgetown University
Alan Cox, Hon. Fellow Swansea University, Hon. Fellow University of Wales Trinity St David
Charles King Derr, Bard College at Simon’s Rock
Javier Ruiz Diaz, Associate, University of Sussex Centre for Law and Technology
Sven Dietrich, City University of New York
Orr Dunkelamn, University of Haifa
François Dupressoir, University of Bristol
Zakir Durumeric, Stanford University
Roya Ensafi, University of Michigan
Nicola Fabiano, Studio Legale Fabiano
Stephen Farrell, Trinity College Dublin
Dr. Richard F. Forno, UMBC Cybersecurity Institute
Simson L. Garfinkel, Association for Computing Machinery Technology Policy Committee
Harley Lorenz Geiger
John Gilmore, Cypherpunks
Ian Goldberg, University of Waterloo
Professor Oscar González, University of Managua
Geoffrey Goodell, University College London
Bill Goodwin, Journalist
Ian Grant, Telecommunications industry analyst
Wendy M. Grossman, Author, net.wars
Edina Harbinja, Aston University
Masayuki Hatta, Surugadai University
Guy Herbert, NO2ID
Dr Monica Horten, Iptegrity.com
Dr Julian Huppert, University of Cambridge
Dr. Dennis Jackson, Mozilla
David R. Jefferson
Sidney Karin
Mallory Knodel, NYU
Susan Landau, Tufts University
Carl Landwehr, University of Michigan
B LeClair, 5Rights
Gordon Lennox, TDRS
Jean Linis-Dinco
Dr. Kaspar Rosager Ludvigsen, Durham University
Anna Lysyanskaya, Brown University
Dr Angus M Marshall, n-gate Ltd. (digital evidence specialists)
Michelle L. Mazurek, University of Maryland
Derek McAuley, University of Nottingham
Eran Messeri
Eric Mill
Kevin Milner, Quantinuum
Kathleen Moriarty, SecurityBias
Saša Mrdović, University of Sarajevo
Alec Muffett, Security Researcher & Writer
Steven Murdoch, University College London
Peter Gabriel Neumann, SRI Computer Science Lab
Colin Perkins, University of Glasgow and Internet Research Task Force
Riana Pfefferkorn, Stanford University
Jean-Jacques Quisquater, UCLouvain, Belgium
Ronald L. Rivest, Insitute Professor, MIT
Jan Schaumann, Security Architect
Bruce Schneier, Harvard Kennedy School
Wendy Seltzer
Jonathan S. Shapiro, formerly: Co-Founder, Johns Hopkins University Information Security Institute
Adam Shostack, author of Threat Modeling: Designing for Security
Kris Shrishak, ICCL – Enforce
Jessica Shurson, University of Sussex
Professor Peter Sommer, Birmingham City University
Eugene H. Spafford, Professor, Purdue University
Michael A. Specter, Georgia Institute of Technology
Prof. J.W. Verret, George Mason University Antonin Scalia Law School
David Wagner, University of California, Berkeley
Tarah Wheeler, US/UK Fulbright Scholar in Cybersecurity
Kenneth White, Cryptography Engineer
Paul Wouters, Security Area Director, Internet Engineering Task Force (IETF)
Daniel Zappala, Brigham Young University
Philip Zimmermann
Maximilian Zinkus, PhD, Cryptography Engineer, Johns Hopkins University
*Affiliations listed for identification purposes only