• Eldritch@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    7 months ago

    The argument stands just fine. There’s a big difference between saying something and doing something. Just as there’s a big difference between doing something and doing something well. iMessage can absolutely do SMS messages. It’s one of the worst SMS clients in general. Which is part of the problem.

    I expect their RCS implementation to be degraded 2nd class citizen to iMessage based on Apple’s history. Anything else is a fools bet. I hope to be surprised, however I don’t expect it.

    Apple can make good hardware and software. The big issue is how they implement it to anti-competitive effect. Of the big 3, all of whom need to be broken up badly. Apple isn’t even the worst. Just close.

    Exploit is a strange choice of words for using a system as it was designed. Definitely not an unbiased choice. It was no threat to the non existent security. You can’t threaten what isn’t there. There was no buffer overflow, malformed packets, or any “exploit”. They sent credentials, the server accepted the message and relayed it as designed. Something which should have always been possible, but Apple artificially restricts.

    Warren and her group while tech illiterate, are more spot on than you in this case at least. Though you’re either just repeating things uninformed, or being disingenuous. If I leave my door standing wide open I cannot say someone exploited the lock when they walked in.