iPhone and Android users can send encrypted rcs messages with each other


The text messages sent between iPhone and Android devices will benefit many benefits from EXT-end encryption (E2ee) from ElT-end encryption.GSMAYesterday New criteria published For rich communication services (RcsThe Protocol includes support for cross-platform e2e.

RCS is similar to the Group messaging, typing indicators and file sharing, such as typing indicators and folders and folders and folders and file-shings.

While Many Android handset manufacturer Was adopted Rcs Over the yearsApple is the main expansion until the event is finally despised The introduction of iOS 18 last year. Most major RCS features are available for cross-platform messaging. But E2ee is missing until now.

Trading

The E2EE is a Data Encryption method that only makes the sender, which makes it clear that only the recipient of a message. This specific promise for Tech Companies is a major sales. Apple has offered from E2 O2ee Reboot the IMSAGE in 2011WhatsApp has completed the E2EE that has been completed only in between iOS products Rellout in 2016 (That year, it was only working only between whatsapp users).

Google for its part Formerly Added to its e2e Personal messages appDespite the encryption of different customers as well as encryption, different platforms are with their own unique challenges. This is GSMA's place Universal Profile Getting access to the frame is a matter of equipment,

Cryptographic Messaging Layer Security. (Mlsd) new e2e mechanism RCS Universal profile 3.0 Finally, the iPhone and Android users are an important piece of Interoperable Jigsaw to communicate securely through their device messaging app.

“This means that the client Ember of the people of different supporters said,” RCS will be the first larger text message service to support the Interoperable E2e. ” Statement. With other unique security features such as Sim-based authentication, E2e will support RCS users with the highest level of strength and security from fraudulent and private security threats. “



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *