With iOS 16.3 and macOS 13.2, Apple will enable end-to-end encryption of virtually all data stored in the cloud, globally. The United States is entitled to it from iOS 16.2 delivered late last year. The release candidate of iOS 16.3 contains the feature and allows you to use it now.

This function of advanced data protection will encrypt 23 categories of data (compared to 14 for the default basic function), including photos, notes and most importantly the iCloud backup which Apple will then no longer be able to unlock – this was useful when law enforcement agencies inquiring about a suspected. Without a decryption key, the manufacturer will therefore not be able to share the data contained in the backup.
Your iCloud email, contacts, and calendar will be the last major categories of data that aren’t end-to-end encrypted on Apple’s servers. This is data that works in conjunction with standard protocols and systems.


This advanced protection is not without responsibility for the user. iOS spells it out in black and white, explaining that you need to set up a secondary recovery method, such as a contact or backup key. A key that must not be lost: if so, Apple will not be able to help you recover the data.

Need this advanced protection? For Apple, strengthening user data security in the cloud becomes more urgent than ever “, highlighting the number of intrusions tripled between 2013 and 2021, exposing 1.1 billion personal data last year. However, the manufacturer targets it more to users who need a higher level of security, political personnel, journalists, human rights activists, etc.
Good to know: You can switch back to standard protection at any time. The device will then retrieve the required encryption keys.
Craig Federighi: End-to-end encryption of all iCloud will be your responsibility
This security feature adds to the one that allows it use 2FA security keys to securely sign in to your Apple account, is available in iOS 16.3.
The verification of the ignition keys in iMessage is also expected soon. Display alerts in case an exceptionally sophisticated threat (a state-sponsored attack, for example) manages to reach cloud servers and implant eavesdropping devices to access these encrypted communications. Users can also compare contact verification codes on FaceTime.