this post was submitted on 18 Nov 2023
87 points (95.8% liked)
Technology
59261 readers
3984 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
How so?
Due to complexity and limited auditing a number of vulnerabilites have slipped through again & again, like zero-click exploits for example. Take a look at the sear volume of CVEs and more importantly what they entail. While they do eventually get found & patched, its not ideal compared to other messaging apps like signal that are very much security first, features 2nd.
A lot of people(normies), especially Apple users tend to think it's super secure virtually impenetrable technology.
The sheer volume of cves is not necessarily an indicator for insecurity. The CVE system is pretty bad and rulings are mostly arbitrary. For example, there was a recent curl "CVE", where an overflow happened in some part of the app which was not relevant to security. I don't remember the details, but the only solution to this apperent mess was that the main contributor of curl is becoming one of the guys that evaluate CVEs.
CVE is a measure for the US government, and always assumes the worst in any case.
That being said, I agree with you.
My man everyone and their favourite state sponsored hacking group is trying to break iMessage, of course there’s going to be a shed load of CVEs compared to other less popular tools.
The main problem with iMessage is the limited audits. It's a very complex application and with that complexity comes higher risk for vulnerabilities to slip through. It'd be way less of an issue if it was at least source available so more people could audit it, instead of just whomever gets permission from Apple.
Like Apple's bounty system is great and all, but it's not as effective as for example being able to directly scrutinize signals open source codebase.
The problem with Apple's approach is that even if someone finds and reports the vulnerability for the bounty money, that still means that vulnerability has made it into the production code and thus made it onto consumer devices. Unlike an open codebase where the vulnerability is more likely to be caught before it reaches consumer devices.
You can argue that the code being openly available isn't necessary indictive of being secure, which is true, but it's certainly more favorable and for signal it's worked out very well. Also there's plenty of state sponsored hacking groups trying to break signal. Maybe not as many, sure. However it's a lot less likely they'll succeed in breaking signal then iMessage.
Infact, just recently signal had to dismiss a 0-day vulnerability report people were freaking out about because it turned out completely bogus. Thought, I suppose that's beside the point.