Absolutely. The iMessage network isn’t some unknowable beast, it “just” requires an Apple device be involved and activated to work. In order to spoof that far, you’d essentially need to emulate quite a bit on device.
I have experimented a little bit with Intel Hackintoshes, and iMessage has been one of the more difficult components of the process. If they truly managed this reverse engineering, they’d really be opening Pandora’s Box with Apple… Maybe in a legal sense.
I don’t think I would trust Nothing to develop this software and just hand it out for free on their hardware. “Software (Hardware?) as a Service” is bad enough, but this seems like it could be legally fraught.
On second thought… Wouldn’t they have to reverse engineer at least part of the application, and at that point, would they even need Macs?
Absolutely. The iMessage network isn’t some unknowable beast, it “just” requires an Apple device be involved and activated to work. In order to spoof that far, you’d essentially need to emulate quite a bit on device.
I have experimented a little bit with Intel Hackintoshes, and iMessage has been one of the more difficult components of the process. If they truly managed this reverse engineering, they’d really be opening Pandora’s Box with Apple… Maybe in a legal sense.
I don’t think I would trust Nothing to develop this software and just hand it out for free on their hardware. “Software (Hardware?) as a Service” is bad enough, but this seems like it could be legally fraught.