this post was submitted on 06 Dec 2023
187 points (83.3% liked)

Technology

59708 readers
2027 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

• A new Android app called Beeper Mini allows users to send iMessages as blue bubbles from non-Apple devices.

• Beeper Mini bypasses traditional iMessage hacks by directly sending iMessages from Android devices.

• The app has been praised for its smooth functionality, sending messages seamlessly between Android and iPhone users.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 19 points 1 year ago (1 children)

Sunbird just relayed messages back and forth using a Mac mini in a warehouse. They probably had something that read the messages app on there and sent to their app on the phone through their servers, and seemingly forgot to encrypt anything during this process.

This is actually sending messages as iMessage. It’s been reverse engineered which is an incredible feat, iMessage has been out like …10+ years? And no one figured it out yet until this 16yr old rocks up.

[–] [email protected] 7 points 1 year ago* (last edited 1 year ago) (2 children)

Doesn't iMessage require some sort of Apple-issued device id? A key, unique to a device, hard-coded in the SoC? (which is easy to block if over-used).

Which is why hackintoshes used to require crazy workarounds to get this working, even with Apple's own software, if I remember correctly (never tried myself, could be wrong).

How did they get around this? (did they?)

[–] [email protected] 9 points 1 year ago (1 children)

It does, the article actually mentions that. Yes, they did get around or reverse-engineer it. The article does not describe how, though I imagine it's doing the same sort of workaround that Hackintoshes have to do. Honestly, it's quite a feat.

[–] [email protected] 1 points 11 months ago

Check out my reply

I posted some links that get into the details of how the tech works

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago) (1 children)
[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

Thanks, the second link talks about this in the "data.plist" and Mac serial numbers section.