Without Interoperability, Apple Customers Will Never Be Secure

Every internet user should have the ability to privately communicate with the people that matter to them, in a secure fashion, using the tools and protocols of their choosing.
Apple's iMessage offers end-to-end encrypted messaging for its customers, but only if those customers want to talk to someone who also has an Apple product.
When an Apple customer tries to message an Android user, the data is sent over SMS, a protocol that debuted while Wayne's World was still in its first theatrical run.
Computers are all roughly equivalent, so there's no reason that an Android device couldn't run an app that could securely send and receive iMessage data.
If Apple won't make that app, then someone else could.
That's exactly what Apple did, back when Microsoft refused to make a high-quality MacOS version of Microsoft Office: Apple reverse-engineered Office and released iWork, whose Pages, Numbers and Keynote could perfectly read and write Microsoft's Word, Excel and Powerpoint files.
Beeper Mini stands out among earlier attempts at this by allowing users' devices to directly communicate with Apple's servers, rather than breaking end-to-end encryption by having messages decrypted and re-encrypted by servers in a data-center.
It blocked Beeper Mini users just days after the app's release.
If Beeper Mini indeed posed those risks, then Apple has a right to take action on behalf of its users.
The only reason to care about any of this is if it makes users more secure, not because it serves the commercial interests of either Apple or Beeper.
Apple's account of Beeper Mini's threats does not square with the technical information Beeper has made available.
Apple didn't provide any specifics to bolster its claims.
Large tech firms who are challenged by interoperators often smear their products as privacy or security risks, even when those claims are utterly baseless.
The gold standard for security claims is technical proof, not vague accusations.
EFF hasn't audited Beeper Mini and we'd welcome technical details from Apple about these claimed security issues.
While Beeper hasn't published the source code for Beeper Mini, they have offered to submit it for auditing by a third party.
The company released an update on Monday that restored its functionality.
If Beeper Mini does turn out to have security defects, Apple should protect its customers by making it easier for them to connect securely with Android users.
One thing that won't improve the security of Apple users is for Apple to devote its engineering resources to an arms race with Beeper and other interoperators.
Apple needs to acknowledge that it isn't the only entity that can protect Apple customers.


This Cyber News was published on www.eff.org. Publication date: Wed, 13 Dec 2023 19:43:04 +0000


Cyber News related to Without Interoperability, Apple Customers Will Never Be Secure

Without Interoperability, Apple Customers Will Never Be Secure - Every internet user should have the ability to privately communicate with the people that matter to them, in a secure fashion, using the tools and protocols of their choosing. Apple's iMessage offers end-to-end encrypted messaging for its customers, ...
1 year ago Eff.org
The Great Interoperability Convergence: 2023 Year in Review - From disinformation to harassment to copyright infringement, the go-to policy response of the past two decades has been to make tech platforms responsible for policing and controlling their users. What's more, deputizing giant companies to police ...
1 year ago Eff.org
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
7 months ago Eff.org
Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy - You hear a lot about zero trust microsegmentation these days and rightly so. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the ...
1 year ago Feedpress.me
Changing How Healthcare Works: Big News in Communication - In a pivotal transformation within the healthcare industry, a prominent shift is currently unfolding. Direct Secure Messaging has emerged as a game-changer, modernising the way vital information is shared among healthcare providers, pharmacies, and ...
10 months ago Cysecurity.news
Cohesity partners with NVIDIA to harness the power of generative AI - Cohesity announced a collaboration with NVIDIA to help organizations safely unlock the power of generative AI and data using the recently announced NVIDIA NIM microservices and by integrating NVIDIA AI Enterprise into the Cohesity Gaia platform. ...
9 months ago Helpnetsecurity.com
Identity Crisis: 14 Million Individuals at Risk After Mortgage Lender's Data Breach - Mr Cooper, the private mortgage lender, has now admitted almost 14.7 million individuals' private data has been stolen in a previous IT security breach, which resulted in the theft of their addresses and bank account numbers, but it is estimated the ...
11 months ago Cysecurity.news
T-Mobile Data Breach Affects 37 Million Customers: What You Should Know - T-Mobile recently announced that a data breach of its API had impacted the personal records of over 37 million customers. The breach occurred on the T-Mobile website, and could have allowed unauthorized users to access customer data such as name, ...
1 year ago Heimdalsecurity.com
Ivanti urges customers to patch yet another critical vulnerability - This vulnerability only affects a limited number of supported versions-Ivanti Connect Secure, Ivanti Policy Secure version 22.5R1.1 and ZTA version 22.6R1.3. Please read between the lines that there could be unsupported versions which will never see ...
10 months ago Malwarebytes.com
Building a Collaborative Approach to Secure the Connected World - In today's rapidly evolving digital landscape, public key infrastructure has emerged as an essential component of digital trust, underpinning security across myriad interconnected domains, from users and devices to the Internet of Things and ...
1 year ago Securityboulevard.com
Apple To Drop Sensor From Some Watch Models - Redesign plan to remove blood-oxygen sensor on certain Apple Watch models is dependent on an appeal court decision. Apple is reportedly prepared to remove the blood-oxygen sensor from certain Apple Watch models, depending on a court decision. The ...
11 months ago Silicon.co.uk
What Do Apple's EU App Store Changes Mean for App Developers? - In order to comply with the European Union's Digital Markets Act, Apple announced on Jan. 25 changes to its payment system for app sellers in the EU, and that it was letting go of the hold its App Store has over iOS app distribution in the EU. As ...
10 months ago Techrepublic.com
Your Free Upgrade to Cisco Secure Client Awaits - More than ever modern cybersecurity leaders need to strengthen their protection for their remote users with advanced cloud security. Cisco Umbrella provides always-on security on and off the corporate network. If you're an existing Cisco Umbrella ...
10 months ago Umbrella.cisco.com
Apple's AI Moves Will Impact Future Chip, Cloud Security Plans - The measures Apple has implemented to prevent customer data theft and misuse by artificial intelligence will have a marked impact on hardware security, especially as AI becomes more prevalent on customer devices, analysts say. Apple emphasized ...
5 months ago Darkreading.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
1 year ago Silicon.co.uk
Accelerating Your Journey to the 128-bit Universe - The 2023 National Cybersecurity Strategy requires acceleration of your agency's mission to go boldly into the 128-bit address space universe with greater speed and urgency. IPv6-only is the addressing standard for the U.S. Federal Government, ...
1 year ago Feedpress.me
Apple 'Find My' network can be abused to steal keylogged passwords - Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards. The Find My network and application is designed to help users locate lost or misplaced ...
1 year ago Bleepingcomputer.com
FCC orders telecom carriers to report PII data breaches within 30 days - Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by FCC's updated data breach reporting requirements. FCC's final rule follows several ...
10 months ago Bleepingcomputer.com
T-Mobile Hacked Again: 37 Million Customers Data Stolen - Security experts have sounded alarm bells again as the news surfaced that T-Mobile was hacked once again. This time, the personal data of around 37 million customers have been stolen by hackers. ...
1 year ago Grahamcluley.com
T-Mobile Compromised by Hackers - What You Need to Know - T-Mobile recently announced that it had been a victim of a data breach by hackers. Reports suggest that hackers accessed T-Mobile customer’s accounts and compromised their personal information. Reports also suggest private banking information, ...
1 year ago Hackread.com
Simplify budgets and purchasing with Cisco Security Suites - In the pursuit of better security outcomes, organizations have relied on an ever-increasing number of products and services. On average, enterprise customers use as many as 76 unique security solutions. This complexity makes it very difficult for ...
1 year ago Feedpress.me
How Secure Cloud Development Replaces Virtual Desktop Infrastructures - The need to secure corporate IT environments is common to all functions of organizations, and software application development is one of them. Development environments have notoriously complex setups and often require significant maintenance because ...
9 months ago Feeds.dzone.com
Investing in Cloud Infrastructure in the Kingdom of Saudi Arabia - Digital transformation is at the heart of the Kingdom of Saudi Arabia's ambitious Vision 2030 program as the nation looks to future-proof its economy and enhance people's lives. The Kingdom is looking to diversify its economy and develop public ...
6 months ago Paloaltonetworks.com
Kiteworks' Maytech Acquisition Reaffirms Commitment to UK Market - PRESS RELEASE. London / San Mateo, USA, November 22, 2023 - Kiteworks, which delivers data privacy and compliance for sensitive content communications through its Private Content Network, announced today the merger with Maytech, which offers data ...
1 year ago Darkreading.com
Apple Warns Users Targeted by Mercenary Spyware - Apple this week updated its spyware threat notification system to alert and assist users it identifies as targeted by mercenary spyware attacks. To date, Apple has spotted and alerted users in more than 150 countries that they were targeted in these ...
8 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)