• From the FAQ of the Sunbird website (the tech powering Nothing Chats):

    Will the app be open source?

    Some of the messaging community believes that software that is open source is more secure. It is our view that it is not. The more visibility there is into the infrastructure and code, the easier it is to penetrate it. By design, open source software is distributed in nature. There is no central authority to ensure quality and maintenance and by putting that responsibility on Sunbird, development would not be feasible. Open source vulnerabilities typically stem from poorly written code that leave gaps, which attackers can use to carryout malicious activities.

    To help satisfy our own ambitious goals of providing total privacy and security, we are currently undergoing a third party audit that will validate our security, encryption and data policies and plan on receiving ISO 27001 certification after launch.

    This was a huge warning sign when the first round of news about Nothing Chats came around, so I’m glad we’re now getting early confirmation that security by obscurity still is a horrible idea and doesn’t work

  • I’m still shocked by the fact that people actually like or even trust Nothing when, personally, the company gives me nothing but bad vibes since the very beginning. This tech-bro-crypto-bullshit / Elon Musk-esque / Cybertruck-esque marketing and attitude is a massive red flag to me. Can’t say I’m surprised about this.

  • 🤖 I’m a bot that provides automatic summaries for articles:

    Click here to see the summary

    Nothing has pulled the Nothing Chats beta from the Google Play store, saying it is “delaying the launch until further notice” while it fixes “several bugs.” The app promised to let Nothing Phone 2 users text with iMessage, but it required allowing Sunbird, who provides the platform, log into users’ iCloud accounts on its own Mac Mini servers, which… isn’t great?

    The removal came after users widely shared a blog from Texts.com showing that messages sent with Sunbird’s system aren’t actually end-to-end encrypted — and that it’s not hard to compromise it.

    The app launched in beta yesterday after being announced earlier this week.

    9to5Google pointed to a thread from site author Dylan Roussel, who found that part of Sunbird’s solution involves decrypting and transmitting messages using HTTP to a Firebase cloud-syncing server and storing them there in unencrypted plain text.

    Roussel posted that the company itself has access to messages because it logs them as errors using Sentry, a debugging service.

    Sunbird claimed yesterday that HTTP is “only used as part of the one-off initial request from the app notifying back-end of the upcoming iMessage connection.”


    Saved 34% of original text.