1
shinwood 2013-09-24 13:37:16 +08:00
com.葫芦娃.imessage
|
2
sophy 2013-09-24 13:38:09 +08:00 via Android
……
|
3
so898 2013-09-24 13:44:25 +08:00
『Are you referring to the seemingly-encrypted network connection over port 5332 to a server in China at IP address 222.77.191.206 that has traffic that precisely correlates to me sending and receiving messages using the application? [edit: Which happens to be the value of the resource ServerId in the APK?]』
看HN的讨论,似乎是中国人破的 |
4
valianliu 2013-09-24 13:44:35 +08:00
Facetime是不是也指日可待了呢?
|
5
leosama 2013-09-24 14:30:11 +08:00
葫芦娃。。
|
6
aerolqr 2013-09-24 14:40:21 +08:00
|
7
lingaoyi 2013-09-24 14:41:56 +08:00
oh yeah 果粉的东西被移植到安卓了。
|
8
avin550 2013-09-24 14:48:16 +08:00
谁敢用??
|
9
kkdexl 2013-09-24 14:52:40 +08:00
帐号里面有联系人资料各种app的数据 不是官方的敢用?
|
10
esayr 2013-09-24 18:53:52 +08:00
“@pod2g: Please do not use this Android iMessage app, never ever! They can grab your AppleID and password! It can't be worse.”
|
11
foxni 2013-09-24 19:05:15 +08:00
这都行~话说,新的apple id可以直接激活不?
|
14
studyro 2013-09-24 22:37:32 +08:00 via iPhone
@leosama Saurik大神在hacker news的评论里提了猜测的根据。虽然算不上作恶的证据,不过也蛮危险了。
Here's what I'm seeing: every time I send it a message, I get a packet from Apple, and then immediately the app sends a packet of almost exactly the same size to 222.77.191.206 (which is listed in this application's APK as "ServerIp"). It then gets back two packets from the Chinese server, the first of which I'm presuming is the decoded result and the second packet being a response to send Apple (as immediately a packet is sent back to Apple with about the same size). Additionally, if you read the reviews of this application, the author is making some very weird responses to people with login issues: he's asking for their Apple ID, as apparently that's enough for him to debug their issue. That shouldn't be possible if the application is just directly talking to Apple the entire time. |