Apple and Meta oppose Canadian bill over potential access to encrypted data

Apple and Meta Platforms say proposed legislation in Canada could force technology companies to create technical access mechanisms that weaken encrypted services.

Apple and Meta oppose Canadian bill over potential access to encrypted data

Apple and Meta Platforms have publicly criticised Canada’s proposed Bill C-22, warning that parts of the legislation could affect end-to-end encryption in digital services.

The bill is currently under debate in the Canadian Parliament. Authorities argue it would improve the ability of law enforcement and security agencies to investigate threats and obtain data more quickly.

The concern centres on lawful access powers. According to Apple and Meta, the bill could require companies to maintain technical capabilities that allow access to encrypted data or communications. The companies argue that such requirements would undermine security protections built into their systems.

End-to-end encryption is designed so that only users can access the content of messages or stored data. Service providers themselves cannot decrypt the information. The technology is widely used in products such as WhatsApp and iMessage.

Apple stated that the bill could enable authorities to require “backdoors” in products. Meta raised concerns about provisions that could compel providers to bypass encryption or install surveillance capabilities directly into systems.

The debate resembles earlier disputes in the UK. Last year, Apple removed an encrypted cloud storage feature after receiving a UK government order linked to data access requirements. US intelligence officials later raised concerns that the request could conflict with international data agreements.

Canadian officials reject the criticism. Public Safety Canada said the bill would not require companies to introduce systemic vulnerabilities into their services.

The disagreement reflects a longstanding conflict in digital policy. Governments seek greater access to data for investigations, while technology companies argue that any exceptional access mechanism creates security risks that cannot be limited only to lawful use.

Go to Top