Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Samsung’s Galaxy Watch 8 just came out and you can already save $50

    August 2, 2025

    The enforcer that could break up Apple and Google is facing upheaval

    August 2, 2025

    A ‘Grand Unified Theory’ of Math Just Got a Little Bit Closer

    August 2, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Meet the 16-Year-Old Whose Code Is Jailbreaking iMessage
    Gear

    Meet the 16-Year-Old Whose Code Is Jailbreaking iMessage

    News RoomBy News RoomDecember 6, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Earlier this year Gill had become intrigued by how Apple’s push notification service works, and how these bidirectional notifications might offer some clues into breaking open Messages.

    First, he had to better understand how the Apple ID worked, so he reverse engineered how Apple Music operated on a Windows computer. He noted the traffic and how a non-Apple device registered with Apple servers. Next, he noted how a macOS computer signs into iMessage, then inspected that traffic. Then he reproduced it all in Python.

    He began to put together a proof-of-concept that examined the various handoffs between the Apple ID, its push notification service, and its messaging technologies.

    “In theory, iMessage uses public encryption keys, because that’s how end-to-end encryption works,” Gill says. (Gill is correct, in that asymmetric encryption or public-key cryptography relies on a public-private key pairing; one is used to encrypt a message, and the other to decrypt it.) “Pypush actually figures out how we can publish those keys to Apple’s key server and how you can retrieve keys from Apple’s key server,” Gill says.

    “His proof of concept demonstrates that on any computer with Python, you can sign into iMessage and send and receive messages,” Migicovsky says. He was so impressed with Gill that he offered him a contract to work part-time at Beeper. Gill accepted, with parental approval.

    Gill’s mother, Erin Gill, says she and her husband were slightly concerned about Gill’s ability to manage his time as a junior in high school, but he had handled his part-time job at McDonald’s well enough that they told him to “go for it.” His father is a computer engineer and helped him with the details of the contract. “I’m an artist, and I understood almost nothing of what he was telling me, other than he was excited about it,” Erin Gill says.

    Migicovsky and the team quickly took Gill’s proof of concept, rewrote it, and added new features to it: support for photo and video sharing, group chat dynamics, and even someone’s typing status when they’re drafting a message. Over the past three months, the team folded all of those features into Beeper. The company’s original app, Beeper Cloud, still uses the Mac mini servers, but the new Beeper Mini runs entirely within the app client.

    Color Wars

    Migicovsky insists he’s not rushing out BeeperMini just because other upstarts have recently tried to hack Apple’s Messages, or because Apple recently acquiesced to a newer, Google-supported messaging standard that might make the blue-bubble/green-bubble wars less fraught.

    “We were planning to launch this two weeks before Nothing tried this, but we decided to hold off,” Migicovsky says.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleApple joins AI fray with release of model framework
    Next Article The Pilots Delivering Your Amazon Packages Are Ready to Strike

    Related Posts

    Tesla Found Partly Liable in 2019 Autopilot Death

    August 2, 2025

    Vivobarefoot’s Sensus Shoes Are Like Gloves for Your Feet

    August 2, 2025

    I’ve Been Reviewing Laptops for a Decade. These Are My Picks for College Students

    August 2, 2025

    Bike Friday’s Tiny, Purple, Lightweight Ebike Fits on the Most Crowded Bike Rack

    August 1, 2025

    Uber’s Drive to Become the Kleenex of Robotaxis

    August 1, 2025

    I Tried 10 Different Mouth Tapes. Here’s What You Need to Know (and Which to Try)

    August 1, 2025
    Our Picks

    The enforcer that could break up Apple and Google is facing upheaval

    August 2, 2025

    A ‘Grand Unified Theory’ of Math Just Got a Little Bit Closer

    August 2, 2025

    Tesla Found Partly Liable in 2019 Autopilot Death

    August 2, 2025

    I tried ‘Bricking’ my phone to fix my brain

    August 2, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Security

    The FBI’s Jeffrey Epstein Prison Video Had Nearly 3 Minutes Cut Out

    By News RoomAugust 2, 2025

    Newly uncovered metadata reveals that nearly three minutes of footage were cut from what the…

    A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

    August 2, 2025

    Watch Our Livestream Replay: Inside Katie Drummond’s Viral Interview With Bryan Johnson

    August 2, 2025

    Vivobarefoot’s Sensus Shoes Are Like Gloves for Your Feet

    August 2, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.