How the UK Is Weakening Safety Worldwide
UK Law, Apple, and Encryption Backdoors
- Discussion centers on new UK powers that effectively require decryption “on demand,” undermining Apple’s Advanced Data Protection and similar end‑to‑end schemes.
- Several commenters stress that once a decryption capability exists, it is a backdoor, regardless of who holds the keys.
- Concern that this dramatically raises the value of compromising Apple or UK infrastructure, turning every citizen’s cloud data into a high‑value target.
- Some ask how this will work for visitors’ devices; practical enforcement details are unclear.
Government Motives and “Protect the Children”
- Strong skepticism that child abuse is the genuine driver; it’s seen as an emotional “trojan horse” that makes opposition politically toxic.
- Cited history of UK institutions covering up abuse, plus lack of serious prioritization of CSAM and organized crime, undermines claims that these powers are truly needed.
- Others ask what government should do about abuse, arguing “do nothing” isn’t acceptable, but no clear, alternative framework emerges.
Attitudes to Privacy, Regulation, and Responsibility
- One camp argues “very few people care about privacy,” or only as an abstract “good word.” Polls showing concern are dismissed as shallow.
- Another camp says this is defeatist: privacy isn’t binary and stronger law could have constrained data capitalism, but current regulations (e.g. GDPR) were poorly designed and implemented.
- Broader social critique: cultural shift away from personal responsibility toward demanding state regulation of “harms,” without tackling root causes like inequality or poor education.
Surveillance States: UK, China, and Selective Enforcement
- Several note the UK already has extensive CCTV, facial recognition, border device searches and speech policing; lack of respect for privacy is seen as longstanding.
- Debate over China: some describe Chinese surveillance as a “Damocles sword” mostly used selectively, arguing they fear Western surveillance more because laws tend to be enforced more consistently and punitively. Others counter that selective enforcement itself breeds corruption and obedience.
Global Surveillance, Apple Trust, and Crypto Wars
- References to historical “crypto wars,” NSA backdoors, PRISM, and gag orders (NSLs, FISA, Cloud Act) fuel distrust of any big vendor’s privacy promises.
- Some argue Apple cannot safely refuse secret US/UK orders; others say leaks would be likely but acknowledge legal gag mechanisms.
- General sense that five‑eyes cooperation will route around national limits.
Erosion of Civil Liberties and Everyday Privacy
- Thread broadens into distrust of all governments, fear of powers that outlast any one party, and examples of anti‑protest and speech restrictions being used against different factions.
- Everyday UK examples—like rental agents demanding exhaustive personal data up front—are cited as evidence that both institutions and the public are desensitized to privacy loss.