1
shinwood Sep 24, 2013
com.葫芦娃.imessage
|
2
0racleTink Sep 24, 2013 via Android
……
|
3
so898 Sep 24, 2013
『Are you referring to the seemingly-encrypted network connection over port 5332 to a server in China at IP address 222.77.191.206 that has traffic that precisely correlates to me sending and receiving messages using the application? [edit: Which happens to be the value of the resource ServerId in the APK?]』
看HN的讨论,似乎是中国人破的 |
4
valianliu Sep 24, 2013
Facetime是不是也指日可待了呢?
|
5
leosama Sep 24, 2013
葫芦娃。。
|
6
aerolqr Sep 24, 2013
|
7
lingaoyi Sep 24, 2013
oh yeah 果粉的东西被移植到安卓了。
|
8
kaysvip Sep 24, 2013
谁敢用??
|
9
kkdexl Sep 24, 2013
帐号里面有联系人资料各种app的数据 不是官方的敢用?
|
10
esayr Sep 24, 2013
“@pod2g: Please do not use this Android iMessage app, never ever! They can grab your AppleID and password! It can't be worse.”
|
11
foxni Sep 24, 2013
这都行~话说,新的apple id可以直接激活不?
|
14
studyro Sep 24, 2013 via iPhone
@leosama Saurik大神在hacker news的评论里提了猜测的根据。虽然算不上作恶的证据,不过也蛮危险了。
Here's what I'm seeing: every time I send it a message, I get a packet from Apple, and then immediately the app sends a packet of almost exactly the same size to 222.77.191.206 (which is listed in this application's APK as "ServerIp"). It then gets back two packets from the Chinese server, the first of which I'm presuming is the decoded result and the second packet being a response to send Apple (as immediately a packet is sent back to Apple with about the same size). Additionally, if you read the reviews of this application, the author is making some very weird responses to people with login issues: he's asking for their Apple ID, as apparently that's enough for him to debug their issue. That shouldn't be possible if the application is just directly talking to Apple the entire time. |