iMessage is also closed source, and iOS (as documented by Apple) backdoors the encryption in iMessage by including the cross-device “Messages in iCloud” endpoint iMessage sync keys in the non-e2ee iCloud Backup (as documented plainly in Apple’s own HT202303).
This means Apple can read the iCloud Backup contents, and Apple has the Messages in iCloud device endpoint keys, and Apple can decrypt the iMessages sent to or from the device in realtime.
iMessage is, in practical terms, not really e2ee.
It’s not fair to level these sorts of potential/speculative security concerns at Beeper Mini when iMessage’s first-party implementation has way worse problems that are actually documented.
> It’s not fair to level these sorts of potential/speculative security concerns at Beeper Mini when iMessage’s first-party implementation has way worse problems that are actually documented.
Apple has a proven track record of not handing over all your messages to russian and chinese intelligence, something that beeper is almost certainly doing (as their business model revolves entirely around MITMing your email and chat)
This means Apple can read the iCloud Backup contents, and Apple has the Messages in iCloud device endpoint keys, and Apple can decrypt the iMessages sent to or from the device in realtime.
iMessage is, in practical terms, not really e2ee.
It’s not fair to level these sorts of potential/speculative security concerns at Beeper Mini when iMessage’s first-party implementation has way worse problems that are actually documented.