Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, given that they resisted putting RCS in iMessage so long, I am a bit skeptical about the whole privacy narrative. Especially when Apple's profit is at odds with user privacy.


From my understanding, the reason RCS was delayed is because Google's RCS was E2EE only in certain cases (both users using RCS). But also because Google's RCS runs through Google servers.

If Apple enabled RCS in messages back then, but the recipient was not using RCS, then Google now has the decrypted text message, even when RCS advertises itself as E2EE. With iMessage, at least I know all of my messages are E2EE when I see a blue bubble.

Even now, RCS is available on Android if using Google Messages. Yes, it's pre-installed on all phones, but OEMs aren't required to use it as the default. It opens up more privacy concerns because now I don't know if my messages are secure. At least with the green bubbles, I can assume that anything I send is not encrypted. With RCS, I can't be certain unless I verify the messaging app the recipient is using and hope they don't replace it with something else that doesn't support RCS.


You know what would really help Apple customers increase their privacy when communicating with non-Apple devices?

Having iMessage available to everyone regardless of their mobile OS.


Agreed. While I have concerns regarding RCS, Apple's refusal to make iMessage an open platform due to customer lock-in is ridiculous and anti-competitive.


> "due to customer lock-in"

Their words or your words?


“moving iMessage to Android will hurt us more than help us.”


RCS is a net loss for privacy: it gives the carriers visibility into your social graph and doesn’t support end to end encryption. Google’s PR campaign tried to give the impression that RCS supports E2EE but it’s restricted to their proprietary client.


On top of that, rooted devices are denied access to it, which means Google is now gatekeeping a "carrier" service on top of that even more.


> rooted devices are denied access to it

By what? It's impossible for a process to know for sure if the system is rooted or not. A rooted system can present itself to a process to look like a non-rooted system if it's engineered well enough.

I'd bet that most of these apps probably just check if "su" returns a shell, in which case perhaps all that's needed is to modify the "su" executable to require "su --magic-phrase foobar" before it drops into a root shell, and returns "bash: su: not found" or whatever if called with no arguments.


>A rooted system can present itself to a process to look like a non-rooted system if it's engineered well enough.

That was true 20 years ago, but most smartphones these days have cryptograhically-verified boot chains and remote attestation of how the boot went.


How is RCS a win on the privacy front? It's not even e2e encrypted in an interoperable way (Google implementation is proprietary).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: