On Tue, 30 Jan 2024 09:01:44 -0500, Alan Browne wrote:
> Clearly pointed out it is indeed about Apple's servers many times. And
> to have access to said servers: buy Apple products. Otherwise get your
> own server.
We agree on everything you just said.
It's good you understand it was always about Apple's mainframe servers.
Apple built a system which turns the iPhone into a dumb terminal for the
purpose of all the things you like about Apple's server-based messaging.
That dumb-terminal iPhone was designed to require the use of Apple
mainframes to do the nice things you like about Apple's messaging system.
Beeper wanted some of those nice things that the mainframe model provides.
So Beeper took advantage of Apple's inability to code a secure server.
Apple subsequently closed the (multiple) loopholes that Beeper exploited.
It's no different a process when the hackers exploit a zero-day zero-click
hole in Apple's messaging implementation (five of which were this year!).
1. Apple puts out insecure server code.
2. Hackers exploit that insecure server code.
3. Apple subsequently patches the insecure server code.
Beeper didn't do anything different than what hackers do all the time.
Just like hackers serve the needs of their customer base, Beeper was only
serving the needs of its customer base. Only Apple finally plugged it up.