Can all the folks saying “I don’t care” on this just stop? If this doesn’t affect you, why are you commenting at all?
Some smart folks managed to reverse engineer Apple’s secretive tech that they refuse to put on any platform they don’t own, which is fucking awesome. Even if you don’t give a shit about using iMessage, it’s awesome they were able to stick it to Apple at all, and make the gap between iPhone and Android that much smaller.
And of course Apple comes in and breaks it. Do you not wonder why? Does this mean there was a minor security hole that was exploited or was it something else that changed? This arms race is fascinating, regardless of your preferred mobile OS.
gregorum@lemm.ee 11 months ago
“Oh, what’s this unauthorized bullshit on our servers?”
[block]
wrath_of_grunge@kbin.social 11 months ago
same. there seems to be a lot of people that don't realize some things don't get done, not because they're impossible, but because as soon as they do it a company will put a stop to it.
it's like cracking a Xbox or something. the very next patch will render the method obsolete and nonviable. when i heard this workaround was coming for Android, my immediate reaction was how long it would last before Apple just changed something so that it doesn't work.
skeezix@lemmy.world 11 months ago
My bum has a crack, can they fix that?
LinuxSBC@lemm.ee 11 months ago
Their hope was that they got close enough to an actual Apple device that breaking it would break Apple devices. It turns out they weren’t close enough, but they could be with a few improvements.
Toes@ani.social 11 months ago
Probably had to be extra careful to test. MDM software software might get glitched out.
drislands@lemmy.world 11 months ago
I’m really curious about how it was detected, how it was different from Apple devices. If nothing else I’m looking forward to reading about how that all worked.
AProfessional@lemmy.world 11 months ago
It is usually easy to detect a specific client. Like even if you ignore the keys there are dozens of little details like the TLS fingerprint of whatever library they use not matching iOS. Things that are easy to miss and sometimes hard to bypass. Then there are heuristics on how it is used is likely unique.
LinuxSBC@lemm.ee 11 months ago
From what I understand, their guess is that Apple is now checking if the device also has support for other services, such as FaceTime. Beeper Mini and pypush don’t pretend to support FaceTime, so it breaks.