Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The AI sexting era has arrived

    October 19, 2025

    8BitDo’s new collection celebrates the NES’s 40th anniversary

    October 18, 2025

    TiVo won the court battles, but lost the TV war

    October 18, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Meet the 16-Year-Old Whose Code Is Jailbreaking iMessage
    Gear

    Meet the 16-Year-Old Whose Code Is Jailbreaking iMessage

    News RoomBy News RoomDecember 6, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Earlier this year Gill had become intrigued by how Apple’s push notification service works, and how these bidirectional notifications might offer some clues into breaking open Messages.

    First, he had to better understand how the Apple ID worked, so he reverse engineered how Apple Music operated on a Windows computer. He noted the traffic and how a non-Apple device registered with Apple servers. Next, he noted how a macOS computer signs into iMessage, then inspected that traffic. Then he reproduced it all in Python.

    He began to put together a proof-of-concept that examined the various handoffs between the Apple ID, its push notification service, and its messaging technologies.

    “In theory, iMessage uses public encryption keys, because that’s how end-to-end encryption works,” Gill says. (Gill is correct, in that asymmetric encryption or public-key cryptography relies on a public-private key pairing; one is used to encrypt a message, and the other to decrypt it.) “Pypush actually figures out how we can publish those keys to Apple’s key server and how you can retrieve keys from Apple’s key server,” Gill says.

    “His proof of concept demonstrates that on any computer with Python, you can sign into iMessage and send and receive messages,” Migicovsky says. He was so impressed with Gill that he offered him a contract to work part-time at Beeper. Gill accepted, with parental approval.

    Gill’s mother, Erin Gill, says she and her husband were slightly concerned about Gill’s ability to manage his time as a junior in high school, but he had handled his part-time job at McDonald’s well enough that they told him to “go for it.” His father is a computer engineer and helped him with the details of the contract. “I’m an artist, and I understood almost nothing of what he was telling me, other than he was excited about it,” Erin Gill says.

    Migicovsky and the team quickly took Gill’s proof of concept, rewrote it, and added new features to it: support for photo and video sharing, group chat dynamics, and even someone’s typing status when they’re drafting a message. Over the past three months, the team folded all of those features into Beeper. The company’s original app, Beeper Cloud, still uses the Mac mini servers, but the new Beeper Mini runs entirely within the app client.

    Color Wars

    Migicovsky insists he’s not rushing out BeeperMini just because other upstarts have recently tried to hack Apple’s Messages, or because Apple recently acquiesced to a newer, Google-supported messaging standard that might make the blue-bubble/green-bubble wars less fraught.

    “We were planning to launch this two weeks before Nothing tried this, but we decided to hold off,” Migicovsky says.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleApple joins AI fray with release of model framework
    Next Article The Pilots Delivering Your Amazon Packages Are Ready to Strike

    Related Posts

    If You Like Surround Sound, the Sonos Era 300 Is 20 Percent Off Right Now

    August 26, 2025

    Read This Before Buying a Window Air Conditioner

    August 26, 2025

    The Lenovo IdeaPad 5i 2-in-1 Is a Budget 16-Inch Laptop That Barely Squeaks By

    August 26, 2025

    Matter Is Finally Ready to Deliver the Smart Home It Promised

    August 26, 2025

    US EV Sales Are Booming—for Now

    August 26, 2025

    WIRED Might Have Found a New Best Bag in the World

    August 26, 2025
    Our Picks

    8BitDo’s new collection celebrates the NES’s 40th anniversary

    October 18, 2025

    TiVo won the court battles, but lost the TV war

    October 18, 2025

    Motorola’s Razr Ultra and the Marshall Emberton II top this week’s best deals

    October 18, 2025

    The future I saw through the Meta Ray-Ban Display amazes and terrifies me

    October 18, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Security

    Don’t Fall for Sketchy iPhone VPNs—Here Are the Only 3 You Should Use

    By News RoomOctober 18, 2025

    Other iPhone VPNs We TestedSurfshark: Surfshark was a strong contender for the main list. Even…

    Facebook’s new button lets its AI look at photos you haven’t uploaded yet

    October 17, 2025

    AI can’t even turn on the lights

    October 17, 2025

    Pokémon Legends: Z-A Rotom Phone review: better camera, higher jumps

    October 17, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.