• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Apple Can Break Through its iMessage System

By Guest Authors

In the view of IT security firm Quarkslab, Apple lied when it said it totally couldn’t read iMessage contents. In fact, the researchers at the company said, Apple could furtively eavesdrop on conversations between users out of some sinister intentions or under government coercion.

Cyril Cattiaux, and his colleague with the handle “gg”, explained fully in a white paper the string of methods for anybody within Apple to ambush iMessages. Here’s what the presentation says in summary:

Although there is nothing yet to suggest Apple is actually reading iMessage communications, the end-to-end encryption tool used in the instant messaging system is not snoop proof, either. That means the public keys that supposedly secure the iMessage infrastructure is not hard to crack. Also, the cryptography system isn’t transparent enough to detect whether a message shows up on the device of the intended recipient or falls in the booby trap of the National Security Agency or other third-parties.

mitm1

Apple’s suspicious public key server

The recipient decrypts an incoming iMessage using a private key after an iOS device that extracts the receiver’s public key from Apple’s private server encrypted that message. Senders of encrypted messages need to trust the keys from Apple’s server as truly belonging to the recipient.

A server, indeed, has to be public for senders to determine any alterations to a key. Along this line, the sender is alerted whether a key can be trusted or part of a man-in-the-middle attack (when that key has been changed). But Apple of course has full control of its key server, meaning the company could decide to change the directory anytime if it wanted to read contents of iMessage.

The security flaw also extends to other Apple products such as iMac, Mac Pro, MacBook Pro, MacBook Pro Retina, iPhone, iPod Touch and iPad.

What attackers can do

What aggravates this systemic vulnerability is the capability of a hacker to stealthily change the iMessage before it turns up at the recipient’s device, without the sender and receiver knowing it.

Apple may be telling what it deems proper when it says it’s not intent on re-engineering the iMessage system to penetrate private conversations, but the flaw of the technology lingers for as long as the company refuses to address Quarkslab’s security concerns.

Apple’s recent alleged involvement in NSA’s surveillance program called PRISM remains fresh in our minds. So the tech firm’s assurance that nobody could read encrypted messages within its network is doubtful. Everyone is virtually suspect here.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Mammotion LUBA 2 AWD 5000HX Review – Premium Robot Lawn Mower for Large, Complex Lawns

INIU Pocket Rocket P50 Power Bank Review – A Pocket-Sized Powerhouse

LaserPecker LP5 Laser Engraver Review: A Portable Powerhouse with Potential

GOOLOO AP150 PRO Portable Air Compressor Review – Inflate Anything, Anywhere

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Olight to Reveal Flagship ArkPro Series Flashlights with Self-Developed LED in NYC Ahead of Brand Debut at IFA Berlin
  • Mammotion LUBA 2 AWD 5000HX Review – Premium Robot Lawn Mower for Large, Complex Lawns
  • Hands-On with Poposoap’s Solar Fountain Kits: A Smarter, Simpler Way to Upgrade Your Garden
  • How to Free Up Storage Space on iPhone?

Copyright © 2025 · All Rights Reserved