Again, it's not simplification. It's completely different. Symmetric encryption (which you described) is different than asymmetric encryption used in e2ee encryption. With symmetric encryption, both users have the same decryption key. With asymmetric encryption a public key is used to encrypt a message, but can't decrypt it. And a private key is used to decrypt it.
Did you forget what we are talking about? You claimed that you can't decrypt a message with only the private key. That's dangerous misinformation.
Sure in a normal instance when it comes to encryption, but not in the context of iMessage and hot its security is implemented.
Now is apple’s iMessage security compromised? Many MacBook(s) pro/ air or iMac, Mac mini and Mac Pro doesn’t have any Secure Enclave’s such as the T1 or T2 chips on them at al. And majority of android phones today have a Secure Enclave and aren’t rooted.
You still need acces to the information. And with only the decryption key you won’t have the ability to access the information or to send information.
The public keys that are stored on a key directory service, which is operated by Apple and is protected by strong encryption and authentication?
The app doesn’t connect to any servers at Beeper itself, only to Apple servers, the way a “real” iMessage text would.
That means that Beeper Mini can function as a true iMessage client, supporting high-resolution photos and videos, threads, replies, read receipts, direct messages and group chats, tapback emoji reactions, editing and unsending messages, as well as support for stickers, GIFs, voice notes and more.
Yes! Of course it is illegal to trick a private server into processing your data and accessing the private data of its users (most significantly their public keys).
can you show its tricking anything?
This is now possible because the iMessage protocol and encryption have been reverse engineered by
jjtech, an independent security researcher. Leveraging this research, Beeper Mini implements the iMessage protocol locally within the app. All messages are sent and received by Beeper Mini Android app directly to Apple’s servers. The encryption keys needed to encrypt these messages never leave your phone. Neither Beeper, Apple, nor anyone except the intended recipients can read your messages or attachments. Beeper does not have access to your Apple credentials.
It uses Apples push notification (APN) that is used to communicate with Apple servers are publicly accessible for any developers who uses push notifications in their applications.
They provide the client, and the user is using Apples iMessage services.
On my iPhone I will finally be able to run authentic iMessage in the beeper app instead of it using a relay service through a virtual machine that breaks the e2ee. And I can use the normal iMessage app as well if I want.
YI understood what you were talking about because we've discussed it multiple times. However, I actually read the post that you responded to which was about service interoperability, and you responded with something unrelated.
I responded to the fact and benefit of having the ability to send/receive multiple communication protocols in one application instead of 15 different apps.
The app he was inspired to build out of the founders personal need as a lifelong Android user.
Initially, Beeper launched a multi-network chat app that supported around 15 different networks, including WhatsApp, Messenger, Telegram, Signal, Slack, Instagram, LinkedIn, Discord, Google Chat, Android SMS, iMessage and others.
The intention of the DMA isn’t relevant to what this company is freely working on.