this post was submitted on 06 Dec 2023
186 points (83.0% liked)

Technology

60052 readers
3024 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

• A new Android app called Beeper Mini allows users to send iMessages as blue bubbles from non-Apple devices.

• Beeper Mini bypasses traditional iMessage hacks by directly sending iMessages from Android devices.

• The app has been praised for its smooth functionality, sending messages seamlessly between Android and iPhone users.

you are viewing a single comment's thread
view the rest of the comments
[–] pickleprattle@midwest.social 15 points 1 year ago (1 children)

Sunbird worked - I was in the beta - but it turned out to have no encryption whatsoever. I am skeptical.

[–] fox2263@lemmy.world 19 points 1 year ago (1 children)

Sunbird just relayed messages back and forth using a Mac mini in a warehouse. They probably had something that read the messages app on there and sent to their app on the phone through their servers, and seemingly forgot to encrypt anything during this process.

This is actually sending messages as iMessage. It’s been reverse engineered which is an incredible feat, iMessage has been out like …10+ years? And no one figured it out yet until this 16yr old rocks up.

[–] realharo@lemm.ee 7 points 1 year ago* (last edited 1 year ago) (2 children)

Doesn't iMessage require some sort of Apple-issued device id? A key, unique to a device, hard-coded in the SoC? (which is easy to block if over-used).

Which is why hackintoshes used to require crazy workarounds to get this working, even with Apple's own software, if I remember correctly (never tried myself, could be wrong).

How did they get around this? (did they?)

[–] ilinamorato@lemmy.world 9 points 1 year ago (1 children)

It does, the article actually mentions that. Yes, they did get around or reverse-engineer it. The article does not describe how, though I imagine it's doing the same sort of workaround that Hackintoshes have to do. Honestly, it's quite a feat.

[–] Rootiest@lemmy.world 1 points 1 year ago

Check out my reply

I posted some links that get into the details of how the tech works

[–] Rootiest@lemmy.world 4 points 1 year ago* (last edited 1 year ago) (1 children)
[–] realharo@lemm.ee 2 points 1 year ago* (last edited 1 year ago)

Thanks, the second link talks about this in the "data.plist" and Mac serial numbers section.