Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Your comment does not make sense at all.

You are confusing security (no exploits) with privacy (encryption). The iMessage system is really private (no third party not even Apple can read your messages) but traditionally full of security holes (messages once decrypted can harm the rest of your device).



> no third party not even Apple can read your messages

This is not something that can be stated as fact unless 3rd party clients for a service exist. Apple can, with complete honesty, claim that messages are encrypted at rest/in transit all they want, but since they publish the only implementation of the client, they can modify it at any time to expose the messages to them, in any number of ways.


You appear to be the one confused.

I'm not confusing anything. The entire point of the exploits in question are to BREAK the privacy provided by messenger. Google doesn't provide any in the first place, and actively mines your data. Who needs an exploit when it's never encrypted in the first place?

To further this: you realize NSO isn't selling these exploits to Russian kiddies to steal your bank info, right?

These exploits are used by people like the Saudi Government to uncover a Jeff Bezos affair. They're after politicians/power brokers for the purpose of accessing otherwise secure communications for the purpose of stealing state secrets or blackmail.


> Who needs an exploit when it's never encrypted in the first place?

Someone that can't get a valid subpoena.

Someone that wants to track anything else you do on your phone outside the messaging app.


It not being e2e-enxrypted doesn't mean that the Mexican army can read my messages.


It absolutely does, you're exactly one subpoena away from that happening. Then you're at the mercy of Google deciding whether they care more about you or their balance sheet.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: