Their “how it works” blog article is worth a read - they’re using a blackbox reverse engineering of the protocol (called PyPush) and re-implementing it natively in an android app, so there are no man-in-the-middle servers. It’s pretty bonkers given how difficult Apple’s spec-less tech can be to work with.
Their “how it works” blog article is worth a read - they’re using a blackbox reverse engineering of the protocol (called PyPush) and re-implementing it natively in an android app, so there are no man-in-the-middle servers. It’s pretty bonkers given how difficult Apple’s spec-less tech can be to work with.
And Apple will work tirelessly, and litigate endlessly, to stop this from happening.
I read somewhere that RE for the sake of improving communications is allowed, or something along those lines.
Reverse engineering for the sake of ensuring compatibility. It’s not limited to communication.