US senators have urged the DOJ to probe Apple’s alleged anti-competitive conduct against Beeper.

You are viewing a single thread.
View all comments View context
31 points

They didn’t, someone made an App to interface with it. Trying to shut that down is anti-competitive.

permalink
report
parent
reply
8 points

It’s also a huge security hole

permalink
report
parent
reply
27 points

How? It’s not a MitM or anything like that, it’s connecting exactly how an Apple device would connect. Everything is still E2EE, just one of the ends can now be an Android device.

permalink
report
parent
reply
-6 points

A non-trusted 3rd party that has the capability to decrypt messages? It’s a big problem.

permalink
report
parent
reply
-9 points

So is having unencrypted messages with all non-iOS devices with no real solution in sight. Security is obviously not their concern here, it’s vendor lock in.

permalink
report
parent
reply
11 points

SMS doesn’t support encryption, nor is Apple preventing you from downloading any number of encrypted chat apps that work cross platform.

If google didn’t release a new chat app every 6 months we might have a more widespread standard in the US already - and yes RCS is coming to the iPhone next year.

permalink
report
parent
reply
4 points

Businesses are naturally anticompetitive. It may or may not violate antitrust law. The two main categories are collusion with competitors to prevent new competition, or if they seek to gain or maintain a monopoly via shady methods (just a monopoly itself isn’t illegal though). I doubt if Apple conspired with Google here and it would be a stretch to say they have a monopoly, so it seems like a pointless case to me.

permalink
report
parent
reply
3 points

It’s not a public API. Hacking someone’s private API is already against law - charging $$ for it moreso.

permalink
report
parent
reply
22 points

Reverse engineering an API is not illegal

permalink
report
parent
reply
1 point

Reverse engineering it is not, sure. And Beeper could do that and run their own messaging service with their own infrastructure running their reverse engineered version.

permalink
report
parent
reply
14 points
*

Ah, common misconception - hacking an API != creating a compatible program. ( reverse engineering)

Imagine a drill company has a special shape for its bits. Our law allows someone else to either… make bits that can fit in that shape OR make their own drill that can accept those bits.

“BUT they copied!” - it doesn’t have to be a copy to be compatible, and they don’t even have to use the ‘special shape’ just be able to work with the special shape. The law does not allow for protections around that. Doing so would be by definition anti-competitive. Our anti competition laws or rather our IP protection laws are not intended in any way to ‘ensure a monopoly’. The IP laws give a person a right to either keep something they do secret OR share that knowledge with the world so we all benefit, in exchange for a very limited monopoly.

Practically speaking, If I got the KFC Colonel to give me the list of 11 herbs and spices in a Poker game, and then started making my own delicious poultry that is totally cool. Likewise, If I figured out that all that was inside a Threadripper was blue smoke and started making my own blue smoke chips, the law is ok with that.

In this case roughly, Having a public facing endpoint. And then saying that the public can access that endpoint is cool Saying that only the public using the code I alone gave them – well… that’s not been litigated a lot, but all signs point to no.

It’s like Bing saying its for Safari only, and suing people who accessed it using Chrome. It is a logical claim, but the law does not provide that kind of protection/enforcement.


tl;dr these concepts are old but being newly applied to fancy technology. The laws in place are clear in most cases. A car maker can not dictate what you put in the tank. FedEX and UPS can’t charge you differently for shipping fiction books or medical journals or self published stories. And they’d probably get anti-trust scrutiny they even told you what brand/style of boxes you had to use.

permalink
report
parent
reply
3 points

They didn’t hack it, they spoofed a device, they just tricked the systems around the api

permalink
report
parent
reply
22 points

That counts as unauthorized access in the eyes of the law. It’s a private system and they did not have any agreements permitting them to use it as they wanted.

permalink
report
parent
reply
2 points

Genuinely curious, what’s the law against reverse engineering an API? I can maybe see the argument for charging for the service, but beeper mini is planning to integrate other services as well so I don’t know if that’ll really hold water.

permalink
report
parent
reply
12 points

They can reverse engineer it and run it as their own service with their own infrastructure. But that doesn’t mean they can then start accessing Apple’s implementation and using Apple’s resources without permission.

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 12K

    Posts

  • 538K

    Comments