According to the researchers, there would be no way for an end user to detect an intercepted or rerouted message from their iOS device, as it is impossible to see whether or not a key has been switched or where a message has been routed.*The solution to the issue, to introduce true end-to-end encryption, would require Apple to store public keys on each iOS device to allow users to compare keys to verify that messages are going to the intended recipient.
Basically, Apple is a third party handling the public and private keys between devices, thus allowing them [at least] the ability for moderate control over the transmission of communication between iMessage users.
I wondered about the stance Apple took regarding the high standards in iMessage encryption. There is always a "key", and that key is linked to the developer of the system. Apple was coy regarding their statement; it would be difficult [for others] to decrypt iMessage content, yet Apple certainly has the means in doing so themselves. This begs the question, would Apple hand over decrypted iMessage content to the NSA?
The solution makes perfect sense, cut out the "middle man" [Apple] and akin to "AirDrop", simply allow devices end-to-end user communication.
Last edited: