Apple Tests End-to-End Encrypted RCS Messaging in iOS 16.4 Developer Beta

Apple-Tests-End-to-End-Encrypted-RCS-Messaging-in-iOS-16-4-Developer-Betadata

Apple Introduces End-to-End Encrypted RCS Messaging in Latest iOS Beta

Apple has released a new developer beta of iOS and iPadOS, featuring end-to-end encryption (E2EE) for Rich Communications Services (RCS) messages. The E2EE capability is currently available for testing in the iOS and iPadOS 26.4 Beta and is expected to be rolled out to customers in a future update for iOS, iPadOS, macOS, and watchOS.

End-to-End Encryption for RCS Messages

According to Apple, conversations labeled as encrypted will be protected with E2EE, ensuring that messages cannot be intercepted or read while in transit between devices. However, the company noted that the availability of RCS encryption is limited to conversations between Apple devices and does not extend to other platforms, such as Android.

According to Apple, conversations labeled as encrypted will be protected with E2EE, ensuring that messages cannot be intercepted or read while in transit between devices.

Background and Additional Features

The introduction of E2EE for RCS messaging comes nearly a year after the GSM Association (GSMA) announced its support for end-to-end encryption for safeguarding messages sent via the RCS protocol. To enable E2EE, Apple will need to update to RCS Universal Profile 3.0, which is built on top of the Messaging Layer Security (MLS) protocol.

In addition to E2EE, the latest beta also includes a new feature that allows applications to opt-in to the full safeguards of Memory Integrity Enforcement (MIE) for enhanced memory safety protection. Previously, applications were limited to Soft Mode, which provided a lower level of protection. MIE was introduced by Apple last September as a way to counter sophisticated mercenary spyware attacks by offering always-on memory safety protection across critical attack surfaces.

Stolen Device Protection

Furthermore, the iOS 26.4 beta is expected to enable Stolen Device Protection by default for all iPhone users. This feature adds an extra layer of security by requiring Face ID or Touch ID biometric authentication when performing sensitive actions, such as accessing stored passwords and credit cards, when the device is away from familiar locations. Stolen Device Protection also introduces a one-hour delay before making Apple Account password changes, giving users time to mark their device as lost.



About Author

en_USEnglish