So there is this app claiming on-device iMessage functionality on Android. Seems cool but only has subscription based pricing. Does anyone know of a way to circumvent this?

Edit: I found this but it seems a bit dodgy

  • daisyKutter@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    7
    ·
    edit-2
    7 months ago

    I definetely wouldn’t trust that link; Beeper mini functionality requires you to conect to their servers for registration, initial handshake and push notifications so I don’t think there is a way to avoid a subscription

    Edit for clarity: I wouldn’t trust the apk you linked in your edit, not the original Beeper mini app in the play store

    • Pons_Aelius@kbin.social
      link
      fedilink
      arrow-up
      15
      arrow-down
      2
      ·
      7 months ago

      No. That is beeper.

      Beeper mini is a stand alone app that was acquired by beeper that does not do the MITM shit.

      See the comment by @cm0002 for details.

      Still don’t think it is a good idea. As another comment stated I expected apple to block it in the near future.

      • daisyKutter@lemmy.ml
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        1
        ·
        7 months ago

        They do use their infrastructure to connect to Apple Notification Service servers when the app is not used, they do act as a Man In The Middle but in a secure, concise manner (not in a sketchy way). And they conect to their servers for registration and subscription status. You can read a more in depth explanation on their blog

        https://blog.beeper.com/p/how-beeper-mini-works

        Besides all that I’m not sure if someone who wants to create it’s own implementation of all of this can do it without any apple device; reading jjtech technical explanation (https://jjtech.dev/reverse-engineering/imessage-explained/) where he explains pypush he mentions the obfuscation process for registering a device to apple servers, here is where pypush somehow manages to convince Apple that the machine is genuine, there is a mention there to some serial identifier stored on a file called data.plist, if someone wants to implement this proof of concept would need to give another serial identifier?