CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

First reported
Last updated
2 unique sources, 2 articles

Summary

Hide ▲

Apple has introduced end-to-end encryption (E2EE) for Rich Communications Services (RCS) messaging in the iOS and iPadOS 26.4 Developer Beta. This feature is currently in beta and limited to Apple devices, with full rollout expected in future updates for iOS, iPadOS, macOS, and watchOS. The encryption is based on the RCS Universal Profile 3.0, which uses the Messaging Layer Security (MLS) protocol. Additionally, the beta includes enhanced memory safety protection with Memory Integrity Enforcement (MIE) and the default activation of Stolen Device Protection for all iPhone users. Applications can now opt in to the full protections of MIE, moving beyond the previously available Soft Mode. Stolen Device Protection introduces a one hour delay before allowing Apple Account password changes and requires biometric authentication for key security actions.

Timeline

  1. 17.02.2026 08:44 2 articles · 16h ago

    Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

    Apple has introduced end-to-end encryption (E2EE) for Rich Communications Services (RCS) messaging in the iOS and iPadOS 26.4 Developer Beta. This feature is currently in beta and limited to Apple devices, with full rollout expected in future updates for iOS, iPadOS, macOS, and watchOS. The encryption is based on the RCS Universal Profile 3.0, which uses the Messaging Layer Security (MLS) protocol. Additionally, the beta includes enhanced memory safety protection with Memory Integrity Enforcement (MIE) and the default activation of Stolen Device Protection for all iPhone users. Applications can now opt in to the full protections of MIE, moving beyond the previously available Soft Mode. Stolen Device Protection introduces a one hour delay before allowing Apple Account password changes and requires biometric authentication for key security actions.

    Show sources

Information Snippets

Similar Happenings

Apple increases bug bounty payouts for zero-click RCE vulnerabilities

Apple has expanded and redesigned its bug bounty program, doubling maximum payouts and adding new research categories. The highest reward is now $2 million for zero-click remote code execution (RCE) vulnerabilities, with a bonus system that can exceed $5 million. The program now includes higher payouts for various types of vulnerabilities, including one-click remote attacks, wireless proximity attacks, and unauthorized iCloud access. Apple also plans to distribute secured iPhone 17 devices to civil society organizations and researchers in 2026. The changes aim to incentivize the discovery and reporting of sophisticated security issues, particularly those exploited by mercenary spyware. The program has awarded $35 million to 800 security researchers since its inception in 2020. The expansion includes a $100,000 reward for a complete Gatekeeper bypass and a $1 million reward for broad unauthorized iCloud access. Apple's latest bug bounty announcement is a response to the growth of commercial spyware activity, with the UK’s National Cyber Security Centre (NCSC) estimating that the commercial cyber intrusion sector doubles every 10 years.