• 2 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle


  • So if I have read correctly both links talk about the same (the main source for the Cato article is the report from Carl Bernstein) and they state that some reporters that worked at some point in their lives at the Associated Press were tied to the CIA like 50 years ago.

    I mean, sure the CIA and other goverment agencies from different countries sure have an interest in deposing Maduro; but claiming that this coverage from AP is propagand (which stance is very much the same as other non-westie sources) is blissful in itself.

















  • Be Ware, if you have a device that cant be updated anymore, like an old iPhone or iPad, Apple forces you to delete that device from you account in order to proceed with the encription, losing synchronization with iCloud on those devices.

    So Apple chooses when a device stops getting software updates and that makes the device unfit to keep being synchronized with the cloud in a secure manner



  • They do use their infrastructure to connect to Apple Notification Service servers when the app is not used, they do act as a Man In The Middle but in a secure, concise manner (not in a sketchy way). And they conect to their servers for registration and subscription status. You can read a more in depth explanation on their blog

    https://blog.beeper.com/p/how-beeper-mini-works

    Besides all that I’m not sure if someone who wants to create it’s own implementation of all of this can do it without any apple device; reading jjtech technical explanation (https://jjtech.dev/reverse-engineering/imessage-explained/) where he explains pypush he mentions the obfuscation process for registering a device to apple servers, here is where pypush somehow manages to convince Apple that the machine is genuine, there is a mention there to some serial identifier stored on a file called data.plist, if someone wants to implement this proof of concept would need to give another serial identifier?