• @[email protected]
    link
    fedilink
    English
    451 year ago

    Their “how it works” blog article is worth a read - they’re using a blackbox reverse engineering of the protocol (called PyPush) and re-implementing it natively in an android app, so there are no man-in-the-middle servers. It’s pretty bonkers given how difficult Apple’s spec-less tech can be to work with.

    • Drunemeton
      link
      fedilink
      English
      121 year ago

      And Apple will work tirelessly, and litigate endlessly, to stop this from happening.

      • @[email protected]
        link
        fedilink
        11 year ago

        I read somewhere that RE for the sake of improving communications is allowed, or something along those lines.