584
submitted 1 year ago by hop@rabbitea.rs to c/technology@lemmy.world

cross-posted from: https://kbin.projectsegfau.lt/m/tech@kbin.social/t/26889

Google just announced that all RCS conversations in Messages are now fully end-to-end encrypted, even in group chats. RCS stands for Rich Communication Services and is replacing traditional text and picture messaging, providing you with more dynamic and secure features. With RCS enabled, you can share high-res photos and videos, see typing indicators for your...

you are viewing a single comment's thread
view the rest of the comments
[-] Ape550@lemmy.world 12 points 1 year ago

What do you mean? iMessage is fully end to end encrypted.

As far as google messages RCS goes, that’s googles proprietary version of RCS.

[-] stinky613@lemmy.sdf.org 24 points 1 year ago

I think they might mean they wish Apple would support RCS in general (which Apple has been refusing to do)

[-] Telodzrum@lemmy.world 7 points 1 year ago

iMessage is not fully E2E encrypted unless you have advanced data protection turned on. If you don’t, the keys to your conversations still rest on Apple’s servers.

[-] SulaymanF@lemmy.world 9 points 1 year ago

That’s untrue. The keys are generated on your device and Apple doesn’t have those stored. You need apple devices to grant access for another device as Apple doesn’t have your key. There’s other security holes where apple can generate new keys but that doesn’t change the fact that it is actually E2E encrypted.

[-] Starmina@lemm.ee 7 points 1 year ago

I don’t think it’s true as long as you don’t make iCloud Backups

[-] feifei@lemm.ee 4 points 1 year ago

This is the correct answer.

[-] Earthwormjim91@lemmy.world 3 points 1 year ago

No that’s only for iCloud backups of your iMessages.

[-] bassomitron@lemmy.world 2 points 1 year ago

It's full E2E encryption even without that turned on. However, just because something is encrypted doesn't mean it's secure, as you point out.

Regardless, governments/organizations have gotten very good at finding vulnerabilities and exploiting them before academic and/or private sector security groups discover the same vulnerabilities, who will then go and publish their findings which eventually leads to them getting patched. As a side note: For anyone interested in some modern hacker/cybersecurity history, I recommend reading the book, Sandworm by Andy Greenberg. It's pretty damn wild what it covers and that's only a fraction of the modern state of global cyber warfare (and yes, just about the entire world has been engaged in what pretty much amounts to cyber warfare/espionage/sabotage for the last 10-15+ years).

this post was submitted on 10 Aug 2023
584 points (97.9% liked)

Technology

59419 readers
2840 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS