🚨 BREAKING: The UK Just Ordered Apple to Kill Encryption for 2 Billion People—And They Can’t Even Talk About It 🚨
A global privacy nightmare is unfolding.
The UK government secretly ordered Apple to backdoor encrypted iCloud storage worldwide—but Apple is legally forbidden from revealing this order, or they face criminal charges.
This affects 2 BILLION USERS.
Here’s the full story & why it’s part of a much bigger power grab. 🧵👇
@threadreaderapp unroll please
My X account was hacked right after Elon shared this article. Here is the full thread they did not want you to read: threadreaderapp.com/thread/1888287…
My account was hacked after Elon shared this article. Fortunately Threadreader preserved the entire thread: threadreaderapp.com/thread/1888287…
Below are the missing tweets:
1) 1/ Under the UK’s Investigatory Powers Act (IPA) 2016, Apple was served a Technical Capability Notice (TCN)—forcing them to create a backdoor for encrypted iCloud data.
This is not limited to UK users. It applies worldwide, meaning your private files are at risk, no matter where you live.
🔗@macworld report: macworld.com/article/260251…
2) 2/ Apple is legally forbidden from revealing this order.
If Apple even acknowledges that the UK issued this demand, they could face criminal charges.
This is a secret government order with global consequences.
3/ This isn’t just about the UK (although they are leading the charge in threatening citizens in OTHER countries for violating BRITISH censorship laws!)
If Apple complies, every government in the world will demand the same access—from the US to China to authoritarian regimes.
End-to-end encryption would be effectively dead.
4/ Apple’s Choice:
🔓 Comply & weaken encryption globally
🚪 Refuse & withdraw services from the UK
WhatsApp & Signal faced similar threats last year and vowed to leave the UK rather than compromise security.
Will Apple do the same?
🚨Watch the heated discussion between Damian Collins, director of CCDH (architect of the UK Online Safety Bill), and Signal’s CEO: youtube.com/watch?v=E--bVV…
5/ Why This Matters:
☑️Encryption protects financial data, health records, personal security (e.g. where you live or work), and private conversations.
☑️Governments always say they need backdoors for national security—but history shows they’re used for mass surveillance.
☑️Once a backdoor exists, hackers, rogue employees, and other governments WILL find it.
6/ The UK is trying to dominate the global surveillance & censorship landscape.
The UK is part of Five Eyes (UK, US, Canada, Australia, NZ), but notably, the US, Canada, Australia, and New Zealand have supported strong encryption to mitigate cyber threats.
Yet, the UK stands alone in its war on encryption.
7/ The Free Speech Crackdown 🛑
This isn’t just about encryption—it’s about control.
Governments worldwide are criminalizing dissent and censoring free speech, using tech companies as their enforcement arms.
8/ This ties into the UK’s broader, GLOBALLY ORCHESTATED censorship agenda:
⚠️ The Online Safety Bill criminalizes encrypted messaging & forces platforms to scan private messages.
⚠️ The Digital Services Act (EU) gives governments the power to shut down online content they don’t like.
⚠️ Leaked US-UK documents show direct coordination between UK intelligence & the Biden administration to censor online speech:
🚨Learn more about the global plot to adjudicate and criminalize free speech involving bilateral engagement with 20+ countries, and coordination with NATO and the G7: greenmedinfo.com/content/americ… (@America1stLegal's CDC lawsuit revealed this plot)
9/ Meet the architects of speech policing: CCDH 🕵️♂️
The Center for Countering Digital Hate (CCDH)—a UK intelligence-backed group—has been a driving force behind global censorship.
They were caught:
🔥 Running “black ops” to suppress RFK Jr.’s presidential campaign.
🔥 Leading the "Kill Musk’s Twitter" directive, trying to shut down free speech on X.
🔥 Labeling 12 private US citizens as the “Disinformation Dozen” to justify mass censorship.
🔗 Reclaim the Net Investigation: reclaimthenet.org/black-ops-how-…
The same UK group behind mass censorship also helped design the UK’s anti-encryption policies via the UK Online Safety Bill passed in 2024.
10/ The Pattern is Clear:
1️⃣ Governments create "safety" laws to justify surveillance.
2️⃣ They pressure tech companies to enforce censorship.
3️⃣ Once encrypted services are gone, nothing is private anymore.
This is the biggest attack on digital freedom in history.
And most recently @elonmusk and @lindayaX appear to have taken the bait by backing the Kids Online Safety Bill (KOSA) - a 'child safety' bill trojan horse for draconian censorship: sayerji.substack.com/p/alert-elon-m…
11/ What Can We Do?
🔹 Support companies that refuse to build backdoors (Signal, ProtonMail, etc.).
🔹 Push for legislation that protects encryption & free speech.
🔹 Stay informed & spread awareness—governments count on secrecy to push these policies through.
🔹 Follow and support privacy and internet freedom organizations such as: @G_W_Forum @FFO_Freedom @ReclaimTheNetHQ @standforhealth1 @ChildrensHD @brownstoneinst @anhcampaign @FreeWCH @TheNHF
12/ This is the ultimate power grab: controlling all digital communication.
If Apple caves, every other platform will be forced to follow.
📌 The UK’s Global Playbook:
🔹 A backdoor to encryption (Investigatory Powers Act).
🔹 A government-linked censorship network (CCDH).
🔹 A speech-policing framework that extends worldwide (Online Safety Bill).
This is a global effort to control what people can say, share, and store privately.
13/ The Final Stand: Will You Comply or Resist? ⚔️🚨
They want total control—your speech, your privacy, your elections. This is the defining battle of our time. 🛑🔒
🇬🇧 UK’s war on encryption = Global censorship blueprint.
My account was hacked immediately after Elon shared the tweet. Thankfully, I recovered it before the post was fully deleted. Full thread is preserved here: threadreaderapp.com/thread/1888287…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1/ 🚨Ubermensch: Eight Years of Jeffrey Epstein's
Human Cloning Program
Jeffrey Epstein's cells were in liquid nitrogen storage at Harvard Medical School — being converted into stem cells suitable for cloning — FIVE YEARS before he funded a company whose stated goal was the first live birth of a human clone.
The New York Times called his cloning ambitions "dinner party conversation with no evidence of fruition."
The DOJ disagrees.
EFTA02131791 — August 1, 2013: a Harvard physician reports to Epstein's assistant, George Church cc'd, that Epstein's skin cells are in liquid nitrogen at MGH and scheduled for stem cell conversion. This fact was never disclosed during the 2019 Harvard scandal.
🔬 In June 2013, George Church — Harvard Professor of Genetics — personally arranged Epstein's skin biopsy at Massachusetts General Hospital.
Church coordinated the MD, the biopsy technicians, the cell culture timing, and the consent form.
He was later cc'd on the iPS cell line status update.
"Jeffrey's skin biopsy resulted in several successful, viable fibroblast cultures. Those cell lines are now stored in liquid nitrogen and slated for iPS cell line creation." — Aug 1, 2013
None of this was disclosed during the 2019 Harvard scandal.
3/7 THE INVESTMENT
💼By July 2014, Church formally pitched Epstein a $10 MILLION genome engineering portfolio — eGenesis, aging reversal, CRISPR gene drives, human genome engineering for space.
Epstein's attorney Darren Indyke — who later signed Epstein's will — was engaged to legally form the investment entity.
"Co formed. Now we have to invest." — Epstein, August 2014
Not a metaphor. A genuine scientific question — and the answer overturns almost everything we think we know about matter, life, and the nature of reality.
🧵👇
2/ A mature oak may weigh 10,000 kg.
That mass doesn't come from the seed.
It comes from air — directed, organized, called forth by instructions compressed into a few grams.
The seed doesn't contain the forest. It contains the information that tells the world how to become one.
3/ At the center of every seed is a meristematic cell.
Perpetually embryonic. Functionally immortal.
It doesn't age. It doesn't waver between identities. It holds the complete pattern of the whole organism — and iterates it, with perfect fidelity, indefinitely.
Biology has a word for this. The mystics had one too.
1/🚨Two days ago, Congress summoned Bill Gates to testify under oath on May 19, 2026.
Chairman Comer's letter to Gates identifies five areas of inquiry — including how Epstein and Maxwell "sought to curry favor and exercise influence to protect their illegal activities."
The federal court record already answers that question.
Here is what Gates will need to answer for when he does. 🧵👇
2/📄The Document That Changes Everything
Gates didn't just meet Epstein.
He signed a formal legal agreement releasing Epstein's offshore entities from all past and future liability.
Then thanked him — emphatically — for advice to minimize documents.
Then confirmed a multimillion-dollar financial deal to him in writing.
A six-page agreement was addressed to William H. Gates at his bgc3 offices in Kirkland, WA.
The document states that Gates had specifically requested that Epstein — a registered sex offender — serve as Boris Nikolic's representative in all negotiations.
This was Gates' initiative.
What he authorized Epstein to access: any and all confidential information of the Gates Foundation and Melinda F. Gates personally — at Epstein's own discretion.
The agreement included a survival clause. These provisions were designed to bind Gates' estate and heirs after his death.
Gates gave a convicted sex offender authorized access to his wife's personal information — structured to outlast his own life.
1/🚨Jeffrey Epstein built a leverage file on Bill Gates.
It contained allegations about an STD. A request to secretly medicate Melinda without her consent. Gates' personal plea to destroy the emails.
Four days after delivering that intelligence, Epstein received a multimillion-dollar financial agreement from Gates. Three weeks later, Gates signed documents giving Epstein unlimited authorized access to all confidential information on Melinda Gates personally.
Then thanked him for advice to "minimize documents."
You can draw your own conclusions.
It's all in the federal court record. Gates testifies under oath May 19. 🧵👇
2/ The intelligence acquisition To understand the leverage, you need to understand how Epstein built it.
He didn't hack Gates. He didn't surveil him.
He recruited Gates' most trusted insider — chief science adviser Boris Nikolic — who handed Epstein everything.
Including material Gates thought was protected by attorney-client privilege.
It wasn't. Epstein wasn't a lawyer. He wrote that privilege claim himself.
Aug 25, 2013. Epstein to Boris: "What entity gave you the 500k."
Boris replied from his phone with:
▪️A $500K payment from Gates' personal bank account
▪️A concealed investment partnership called Eclipse funding a woman Melinda knew nothing about
▪️Wire transfer documentation Boris had at home
▪️His assessment: "She would be much more furious than on anything before if she finds out."