this post was submitted on 14 Nov 2023
386 points (91.8% liked)

Technology

59249 readers
3151 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] SHITPOSTING_ACCOUNT@feddit.de 18 points 1 year ago (2 children)

They might be able to relay them in a way that the end to end encryption is actually handled on the phone and the relay only relays encrypted messages.

That would likely still give them a capability to MitM but it's plausible that they couldn't passively intercept the messages.

[–] LWD@lemm.ee 10 points 1 year ago* (last edited 10 months ago) (1 children)
[–] KairuByte@lemmy.dbzer0.com 10 points 1 year ago (1 children)

Absolutely. The iMessage network isn’t some unknowable beast, it “just” requires an Apple device be involved and activated to work. In order to spoof that far, you’d essentially need to emulate quite a bit on device.

[–] LWD@lemm.ee 6 points 1 year ago* (last edited 10 months ago)
[–] LWD@lemm.ee 1 points 1 year ago* (last edited 10 months ago)