this post was submitted on 06 Dec 2023
181 points (82.4% liked)
Technology
59696 readers
2426 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Sunbird just relayed messages back and forth using a Mac mini in a warehouse. They probably had something that read the messages app on there and sent to their app on the phone through their servers, and seemingly forgot to encrypt anything during this process.
This is actually sending messages as iMessage. It’s been reverse engineered which is an incredible feat, iMessage has been out like …10+ years? And no one figured it out yet until this 16yr old rocks up.
Doesn't iMessage require some sort of Apple-issued device id? A key, unique to a device, hard-coded in the SoC? (which is easy to block if over-used).
Which is why hackintoshes used to require crazy workarounds to get this working, if I remember correctly (never tried myself).
How did they get around this? (did they?)
It does, the article actually mentions that. Yes, they did get around or reverse-engineer it. The article does not describe how, though I imagine it's doing the same sort of workaround that Hackintoshes have to do. Honestly, it's quite a feat.
Check out my reply
I posted some links that get into the details of how the tech works
This blog post does a fairly good job outlining the tech
You can also take a look at the pypush proof-of-concept code that this is based on
Thanks, the second link talks about this in the
"data.plist" and Mac serial numbers
section.