this post was submitted on 19 Apr 2024
471 points (97.8% liked)
Technology
59148 readers
2260 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I assumed the Chinese government had a back door in that version of iMessage.
I’d be glad to be wrong.
Yeah you'd be wrong. Apple is very open about how the security model works - which is similar to Signal and fully encrypted. The only way to decrypt a message is with physical access to one of the sender/recipient's devices.
Their claims about how it operates have been confirmed by open source developers reverse engineering the protocol (e.g. Beeper).
There is one workaround — device backups can be accessed and depending how you backup, your message history is likely in there (you can do encrypted backups, but that means data loss if you forget your password or an attacker changes it on you which would happen, lots of money in a ransomware attack like that). However even then – all your other devices show a popup message if you restore from a backup - warning that a "new device" has access to your messages.