this post was submitted on 05 Dec 2023
39 points (82.0% liked)

Technology

34894 readers
833 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
 

All messages are end to end encrypted. Also you don't need an Apple account and it connects directly to Apple servers.

you are viewing a single comment's thread
view the rest of the comments
[–] biscuitswalrus@aussie.zone 5 points 11 months ago* (last edited 11 months ago) (2 children)

The mini version doesn't need hosting, it doesn't have a proxy middle man. A 16yo kid reverse engineered the protocol and then got contracted by beeper to implement it as beeper mini. It's a client directly connecting to apple like imessage native.

Will it break? I'd argue if the cost of breaking it in engineer time is worth doing to Apple, yes. All they'd have to do is roll their own crypto and reverse engineering that might be impossible. Probably easier ways to break it but then maybe it turns into a cat and mouse game.

Legally it's hard to say if it's OK too, the end user is likely fine, but the developer especially being contacted may not be since to reverse engineer it could be breaking terms of service or licensing clauses though I'm not really sure what kind of damages could be claimed. To reverse engineer they had to use the original on jailbroken iphones to go through the engineering discovery.

Anyway the point is, it's not going through beeper or anywhere other than Apple. So there's no component to host. It's different to beeper.

[–] LinuxSBC@lemm.ee 3 points 11 months ago (1 children)

The problem is that breaking it will also break a lot of Apple devices.

[–] biscuitswalrus@aussie.zone 2 points 11 months ago

Hmm you could be right. Keeping old protocols running for legacy compatibility reasons could in this case keep the solution working for some time.

[–] Bene7rddso@feddit.de 1 points 11 months ago

what kind of damages could be claimed.

According to Apple users, the color of their bubble has a lot of value