From 4aa45837ffbdd8f7ed82689b010e422253122de4 Mon Sep 17 00:00:00 2001 From: redoomed1 <161974310+redoomed1@users.noreply.github.com> Date: Tue, 29 Oct 2024 11:10:50 -0700 Subject: [PATCH] fix: Typo Signed-off-by: redoomed1 <161974310+redoomed1@users.noreply.github.com> --- docs/os/ios-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/os/ios-overview.md b/docs/os/ios-overview.md index 6082f6d43e..0a111e041f 100644 --- a/docs/os/ios-overview.md +++ b/docs/os/ios-overview.md @@ -212,7 +212,7 @@ Normal phone calls made with the Phone app through your carrier are not E2EE. Bo ### Encrypted iMessage -The[ color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications.