Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Wyze’s new palm-scanning door lock has a second, backup battery

    September 16, 2025

    Here’s What to Know About Poland Shooting Down Russian Drones

    September 16, 2025

    Bullets Found After the Charlie Kirk Shooting Carried Messages. Here’s What They Mean

    September 16, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Meet the 16-Year-Old Whose Code Is Jailbreaking iMessage
    Gear

    Meet the 16-Year-Old Whose Code Is Jailbreaking iMessage

    News RoomBy News RoomDecember 6, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Earlier this year Gill had become intrigued by how Apple’s push notification service works, and how these bidirectional notifications might offer some clues into breaking open Messages.

    First, he had to better understand how the Apple ID worked, so he reverse engineered how Apple Music operated on a Windows computer. He noted the traffic and how a non-Apple device registered with Apple servers. Next, he noted how a macOS computer signs into iMessage, then inspected that traffic. Then he reproduced it all in Python.

    He began to put together a proof-of-concept that examined the various handoffs between the Apple ID, its push notification service, and its messaging technologies.

    “In theory, iMessage uses public encryption keys, because that’s how end-to-end encryption works,” Gill says. (Gill is correct, in that asymmetric encryption or public-key cryptography relies on a public-private key pairing; one is used to encrypt a message, and the other to decrypt it.) “Pypush actually figures out how we can publish those keys to Apple’s key server and how you can retrieve keys from Apple’s key server,” Gill says.

    “His proof of concept demonstrates that on any computer with Python, you can sign into iMessage and send and receive messages,” Migicovsky says. He was so impressed with Gill that he offered him a contract to work part-time at Beeper. Gill accepted, with parental approval.

    Gill’s mother, Erin Gill, says she and her husband were slightly concerned about Gill’s ability to manage his time as a junior in high school, but he had handled his part-time job at McDonald’s well enough that they told him to “go for it.” His father is a computer engineer and helped him with the details of the contract. “I’m an artist, and I understood almost nothing of what he was telling me, other than he was excited about it,” Erin Gill says.

    Migicovsky and the team quickly took Gill’s proof of concept, rewrote it, and added new features to it: support for photo and video sharing, group chat dynamics, and even someone’s typing status when they’re drafting a message. Over the past three months, the team folded all of those features into Beeper. The company’s original app, Beeper Cloud, still uses the Mac mini servers, but the new Beeper Mini runs entirely within the app client.

    Color Wars

    Migicovsky insists he’s not rushing out BeeperMini just because other upstarts have recently tried to hack Apple’s Messages, or because Apple recently acquiesced to a newer, Google-supported messaging standard that might make the blue-bubble/green-bubble wars less fraught.

    “We were planning to launch this two weeks before Nothing tried this, but we decided to hold off,” Migicovsky says.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleApple joins AI fray with release of model framework
    Next Article The Pilots Delivering Your Amazon Packages Are Ready to Strike

    Related Posts

    If You Like Surround Sound, the Sonos Era 300 Is 20 Percent Off Right Now

    August 26, 2025

    Read This Before Buying a Window Air Conditioner

    August 26, 2025

    The Lenovo IdeaPad 5i 2-in-1 Is a Budget 16-Inch Laptop That Barely Squeaks By

    August 26, 2025

    Matter Is Finally Ready to Deliver the Smart Home It Promised

    August 26, 2025

    US EV Sales Are Booming—for Now

    August 26, 2025

    WIRED Might Have Found a New Best Bag in the World

    August 26, 2025
    Our Picks

    Here’s What to Know About Poland Shooting Down Russian Drones

    September 16, 2025

    Bullets Found After the Charlie Kirk Shooting Carried Messages. Here’s What They Mean

    September 16, 2025

    Meta created its own super PAC to politically kneecap its AI rivals

    September 16, 2025

    Google’s new Windows desktop app brings a Spotlight-like search bar to PC

    September 16, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Security

    Jeffrey Epstein’s Yahoo Inbox Revealed

    By News RoomSeptember 16, 2025

    Against the background of Trump officials weighing whether to release the sealed “Epstein files” and…

    Official watch bands for your new Apple Watch are $34 off at Woot

    September 16, 2025

    The China-US deal for TikTok could take another month to work out

    September 16, 2025

    Charlie Kirk Shooting Suspect Identified as 22-Year-Old Utah Man

    September 16, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.