Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Meet Soham Parekh, the engineer burning through tech by working at three to four startups simultaneously

    July 3, 2025

    Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

    July 3, 2025

    Here are the letters that convinced Google and Apple to keep TikTok online

    July 3, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Beeper’s iMessage Fight With Apple Has Blown Up Into a Debate Over Regulating Big Tech
    Gear

    Beeper’s iMessage Fight With Apple Has Blown Up Into a Debate Over Regulating Big Tech

    News RoomBy News RoomDecember 20, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Beeper, a YCombinator-backed startup, initially came up with an expensive and inherently insecure method to make a beta version of its app work. This method sent every message through a relay server before arriving at the recipient’s messaging client. Then, late this summer, the company landed on a breakthrough technique, originally drafted as a proof of concept by a 16-year-old high school student in Pennsylvania. The young coder reverse-engineered the way notifications work on iPhone, found a loophole in the way credentials are registered with Apple’s servers during the notifications process, and applied that to messaging.

    Beeper bifurcated its product: It kept its original relay system in place (called Beeper Cloud) and separately launched a version of its app (called Beeper Mini) that would use this new technological framework for turning Android messages into blue bubble Messages.

    According to Beeper, its solution made Beeper Mini a more secure option than if an Android user were to use their phone’s default messaging app to text an iPhone user, because Beeper Mini maintained end-to-end encryption. Beeper users also didn’t have to share an Apple ID or Apple password with the Beeper Mini app in order to gain access to it. At launch earlier this month, the company charged $2 per month for Beeper Mini. It was downloaded by more than 100,000 people in its first 48 hours.

    But in the days after launch, Beeper Mini suffered an app outage. At that time, Migicovsky told WIRED he believed that Apple may have cut off the technical ability for Beeper Mini to function, noting that the app outage didn’t seem to be caused by any sort of broader network issue.

    Apple didn’t respond to WIRED’s requests for comment on the outage, but the company later issued a statement to The Verge acknowledging that it had taken action against Beeper. “We took steps to protect our users by blocking techniques that exploit fake credentials in order to gain access to iMessage,” an Apple spokeswoman told the outlet. “These techniques posed significant risks to user security and privacy, including the potential for metadata exposure and enabling unwanted messages, spam, and phishing attacks.”

    While Beeper scrambled to get the app working again, US lawmakers took notice of what was happening. On December 10, Senator Warren tweeted on X, “Green bubble texts are less secure. So why would Apple block a new app allowing Android users to chat with iPhone users on iMessage? Big Tech executives are protecting profits by squashing competitors. Chatting between different platforms should be easy and secure.” The tweet was viewed more than 3 million times, according to X’s visible metrics system.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous Article2023 in smartphones: it was the little things
    Next Article Adobe explains why it abandoned the Figma deal

    Related Posts

    What Is Apple One, and Should You Subscribe?

    July 3, 2025

    Top Hydrow Discount Codes for July

    July 3, 2025

    Wooting’s 80HE Feels Like the Pinnacle of Hall Effect Keyboards

    July 2, 2025

    These Transcribing Eyeglasses Put Subtitles on the World

    July 2, 2025

    AI Videos of Black Women Depicted as ‘Bigfoot’ Are Going Viral

    July 2, 2025

    Subscriber-Only Livestream Replay: Beginner Advice for Claude, a ChatGPT Alternative

    July 2, 2025
    Our Picks

    Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

    July 3, 2025

    Here are the letters that convinced Google and Apple to keep TikTok online

    July 3, 2025

    A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

    July 3, 2025

    Apple’s colorful Watch Solo Loop bands are up to 70 percent off now

    July 3, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Security

    How to Protest Safely in the Age of Surveillance

    By News RoomJuly 3, 2025

    If you insist on using biometric unlocking methods to have faster access to your devices,…

    E Ink is turning the laptop touchpad into an e-reader for AI apps

    July 3, 2025

    US Supreme Court Upholds Texas Porn ID Law

    July 3, 2025

    A European Startup’s Spacecraft Made It to Orbit. Now It’s Lost at Sea

    July 3, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.