isn't Facetime already can be use on android? like users can't place a facetime call but they can receive the call to answer?You're probably thinking of his promise to make FaceTime an open standard.
isn't Facetime already can be use on android? like users can't place a facetime call but they can receive the call to answer?You're probably thinking of his promise to make FaceTime an open standard.
You do have a valid point mate. Or why not consumers can buy both Devices.I mean if you want iMessage get an iPhone... Back in the day, people couldn't have Blackberry Messenger on whatever device they wanted... Same way I can't buy Target branded products at Walmart.
This is categorically untrue. BBM eventually was made available as an app for both iOS and Android.
The average user is not going to pay $99 to sideload.iOS does allow side loading. I pay the $99 yearly developer fee to do it. I have two side loaded apps on my iPhone, one being a modified YouTube app that allows me to hide Shorts. I also pay for YT Premium, which doesn’t allow that, so I use the mod.
Not all of us are pirates and cheapskates.
I am a software engineer and I implement and integrate security-related functionality (authentication, authorization and encryption) on daily basis. My understanding is you're also a security engineer, so I guess we're on the same page.And what I’m saying is that’s not a security flaw, it’s literally an expected part of such a protocol.
I guess this is where someone who’s used to dealing with the difference when implementing and especially when documenting for compliance at work (me) runs headlong into user expectations.
Have fun samsung is terribleIm jumping to Samsung next month, i dont pay for Apple services and barely use imessage.
Eventually is doing a lot of work here. RIM was fiercely protective of BBM until they were confronted with a collapsing market share and millions of unsold devices year after year. Blackberry in 2009 held a 20% market share but by 2013 (the year the BBM app was released), it had fallen to 1-2%. A truly spectacular fall.
“Opening” BBM was a last ditch attempt to turn their former crown jewel into a services pivot that ultimately failed as it was done far too late. The BBM Messenger shut down in 2019 but was already utterly forgotten by most.
BBM vs iMessage is an interesting thought experiment, but the realities of the two companies could not be more different.
iMessage largely runs directly atop Apple's push notification service (APNS), which has absolutely massive capacity, sending tens if not hundreds of billions of push notifications daily. It's used to send all push notifications from all apps to all devices. Given that push notifications are table stakes for a smartphone, it's not like Apple has any choice but to continue offering APNS.“A few” = 3.6 billion Android users.
You think those apps don’t make money? Telegram and WhatsApp both have ads. Telegram also sells subscriptions. Do you want ads in iMessage? Or an iMessage subscription? Signal relies on donors; who knows how long that will be sustainable for.
Apple makes money from you buying their hardware. That’s why iMessage is free on Apple devices. If you’re using an Android device and have no Apple hardware, what incentive would Apple have to provide a free service? That makes absolutely no sense. Paying Apple customers would be subsidizing that.
Fair enough, and tbh I dont know on how the reg works, I’m curious though and I’ll dig into the PoC later, when I’m actually at a computer, to see. My bet is either option is ok to register a device on the directory/relay/etc servers and then after key generation and exchange with the servers it’s authed to some form of generated and encrypted deviceid and then linked to an internal userid. To add multiple devices maybe in absense of appleids it reverts to already added device auth (which would make sense given how if you route that through the next layer in appleids that would explain the prompts we get on already added things after a device is added or hasnt been used in a while (key rotation there I assume)). That’s how I’d do it anywayI am a software engineer and I implement and integrate security-related functionality (authentication, authorization and encryption) on daily basis. My understanding is you're also a security engineer, so I guess we're on the same page.
I am asking a question, not making a statement. The question is: was it possible to authenticate with either Apple ID or phone number and not both? Because if that is the case, then one can use a spoofed phone number of an existing iMessage user and thus be successfully authenticated (hence trusted). If that was/is the case, that's a serious security breach.
And the above has nothing to do with the encryption of the communication. As we are all aware, each device with the same Apple ID will receive iMessages that are sent to that Apple ID. So, if the server would trust a new device and link it to an Apple ID based on phone number match, the E2EE doesn't matter, the spoofing device would already receive data that is not destined to it, hence that can as well be called "interception".
No, authentication requires an Apple ID. There’s no way to authenticate solely with a phone number.I am a software engineer and I implement and integrate security-related functionality (authentication, authorization and encryption) on daily basis. My understanding is you're also a security engineer, so I guess we're on the same page.
I am asking a question, not making a statement. The question is: was it possible to authenticate with either Apple ID or phone number and not both? Because if that is the case, then one can use a spoofed phone number of an existing iMessage user and thus be successfully authenticated (hence trusted). If that was/is the case, that's a serious security breach.
And the above has nothing to do with the encryption of the communication. As we are all aware, each device with the same Apple ID will receive iMessages that are sent to that Apple ID. So, if the server would trust a new device and link it to an Apple ID based on phone number match, the E2EE doesn't matter, the spoofing device would already receive data that is not destined to it, hence that can as well be called "interception".
I have a feeling given sales numbers if anything they’d be more worried about the opposite, or about people just plain ditching their iphones. This isnt early iphone days, there are a *lot* more people with iphones and either no computer or a windows machine than there are folks who only bought an iphone because they had a mac. Phones are more and more folk’s primary computing devicesIt’s very simple. They know people like me would keep their Macs but ditch their iPhones if it was easier to use iCloud ecosystem cross platform.
For the most part jinxNo, authentication requires an Apple ID. There’s no way to authenticate solely with a phone number.
Beeper advertised that you “don’t need” an Apple ID to start using it, but that’s not true, just like it’s not true that you don’t need an Apple device.
Authentication with the server requires both. They referred to pypush to explain how they’re doing it without an Apple device (i.e., using a spoofed serial number to pretend it’s an Apple device), but they’re very tight-lipped on how they’re doing it “without” an Apple ID.
I think the reason why they’re tight-lipped about it is because of legal reasons since all signs point to them creating an Apple ID in the background, which would be a violation of the terms of service.
The fact that phone number alone isn't sufficient to authenticate is consistent with what Beeper says. If you want to access your iMessages on Beeper, the ones sent to your phone number, you need to log in with your Apple ID.
As for E2EE, you seem to misunderstand how it works when multiple devices receive iMessages. It's not the server trusting another device, it's your authenticated devices trusting another device. The server just facilitates the process.
When you sign up with your first device it creates an E2EE public-private key pair, the public key is registered in a directory of sorts.
Everytime someone sends you a message their device looks up the public key to encrypt the message, and your device then uses its private key to decrypt the message.
When you then want to add another device you need to authorize this on your first device and the new device repeats this process, from then on, when someone sends you a message two copies are made, encrypted with the respective public keys for the two devices and sent to the two devices.
When you add more devices, this process is repeated for each device.
So let's say I've got 12 devices, then when someone sends me an iMessage, their device will look up the 12 public keys, encrypt the message 12 times with those public keys and send it off to my 12 devices.
I do care because I need to know if the I have I message so I can send other stuff like locations, games and thinks like that.why does anyone care about a blue bubble??? I miss why this is an issue...
Thanks for your question!Why? They will roll out RCS support and then will not have to waste any time or devs to work on an app for their competitor.
Sir we are talking about a chat app. You are making it way more complicated than it needs to be.If you buy a civic type R and modify it to the hilt and now you want to swap to a focus st, should you just be able to take those mods and move them over to the focus ST?
I do the same thing. No one has ever given me a hard time about it.I only use Google Voice on my iPhone. All of my bubbles are green and nobody knows my real phone number.
Man, it hurt to read this exchange between you two. I just don't understand how anyone can be so oblivious. You express your dislike for Android—fair enough—and he expresses his like for it—also fair enough—and that was it. I don't know if you were reading between the lines for something that just wasn't there or what, but there really wasn't any subtext to his comment.I don't have contempt for Android users. You can choose to use whatever your money buys. The smugness is a bit hypocritical but expected.What's so cute about personal preference? You prefer iOS. I prefer Android. Do you really feel such contempt for Android users?That's cute.For me, yes. It's not that difficult to understand that there are people who truly prefer Android (Samsung) over iPhone.I have a galaxy and everytime i switch to Galaxy i dont go "oh my god, i miss iMessage. I gotta switch back."
I switch back because Android is terrible lol.
We are not locked in. We simply dont want android… We are getting RCS. Android does not need iMessage other than to feel special lol see the above
I feel iOS is subpar for my use case except for iMessage. Android is even better once Apple implements RCS.
From my past on Android and in the present from conversing with you (And other android fanatics)
Everytime someone sends you a message their device looks up the public key to encrypt the message, and your device then uses its private key to decrypt the message.
So let's say I've got 12 devices, then when someone sends me an iMessage, their device will look up the 12 public keys, encrypt the message 12 times with those public keys and send it off to my 12 devices.
I don't understand this part. We've been able to use iMessage on an iPhone without an Apple ID since the day iMessage launched, and still can.No, authentication requires an Apple ID. There’s no way to authenticate solely with a phone number.
Beeper advertised that you “don’t need” an Apple ID to start using it, but that’s not true, just like it’s not true that you don’t need an Apple device.
Authentication with the server requires both. They referred to pypush to explain how they’re doing it without an Apple device (i.e., using a spoofed serial number to pretend it’s an Apple device), but they’re very tight-lipped on how they’re doing it “without” an Apple ID.
I think the reason why they’re tight-lipped about it is because of legal reasons since all signs point to them creating an Apple ID in the background, which would be a violation of the terms of service.