this post was submitted on 14 Nov 2023
386 points (91.8% liked)

Technology

74754 readers
4458 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] LWD@lemm.ee 94 points 2 years ago* (last edited 2 years ago) (2 children)
[–] SHITPOSTING_ACCOUNT@feddit.de 18 points 2 years ago (2 children)

They might be able to relay them in a way that the end to end encryption is actually handled on the phone and the relay only relays encrypted messages.

That would likely still give them a capability to MitM but it's plausible that they couldn't passively intercept the messages.

[–] LWD@lemm.ee 10 points 2 years ago* (last edited 2 years ago) (1 children)
[–] KairuByte@lemmy.dbzer0.com 10 points 2 years ago (1 children)

Absolutely. The iMessage network isn’t some unknowable beast, it “just” requires an Apple device be involved and activated to work. In order to spoof that far, you’d essentially need to emulate quite a bit on device.

[–] LWD@lemm.ee 6 points 2 years ago* (last edited 2 years ago)
[–] LWD@lemm.ee 1 points 2 years ago* (last edited 2 years ago)
[–] Rootiest@lemmy.world 3 points 2 years ago* (last edited 2 years ago)

If it's anything like Beeper 's Matrix bridge then it's E2EE Matrix encrypted between your device and the bridge server and then using Apple's iMessage encryption between the bridge server and Apple/the other user.

The weak point is always going to be the bridge software as by necessity the message must be decrypted there to re-encrypt for iMessage.

At least in Beeper/Matrix the bridge software is open source and one can host their own bridge while continuing to use the existing Beeper/Matrix main server.

Doing so gives you no-trust security since the Beeper/Matrix host cannot decrypt the messages between you and the bridge you control and rubbing your own bridge eliminates that weak point.