- Imessage Automatically Reading Messages App
- Why Is My Iphone Automatically Reading Messages
- Imessage Message Not Delivered
iMessage is one of my favorite things about having an iPhone and a Mac. It’s also one of my least favorite things.
This is the only way you'll know if they've read your message. If your outgoing messages are blue, the person can receive iMessages. If outgoing messages are green, the person is using a non-iMessage phone or tablet (usually an Android). You won't be able to see when this person has read your messages. Read Receipts on iPhone. On an iPhone, read receipts are the only way to tell if someone read a text you sent from Messages, the default texting app for iOS.If you and your recipient both use the Apple iMessage service and activated read receipts, you'll see the word Read under your last message to the recipient, along with the time the message was read.
I love being able to send messages from my computer, and the integration between the two devices is seamless. What frustrates me is the inability to efficiently search through old messages. iOS 13 helped with this quite a lot (while still leaving something to be desired), but searching on your computer is basically worthless.
Fortunately, there is a relatively easy fix for this. If you use iMessage on your Mac, you can access the SQLite database where all of your messages are stored. With a little setup, you can use SQL’s raw power to look through your old messages.
1. Initial Setup
There aren’t any prerequisites to getting started (other than a Mac with iMessage). However, your mileage may vary depending on whether you are using a SQL client (I use TablePlus) or sqlite3 on the command line. The setup for both is similar.
The database is located at ~/Library/Messages/chat.db
. If you open a terminal and run ls ~/Library/Messages/chat.db
, you’ll get a message like: ls: Messages: Operation not permitted
. Similarly, if you try and open the database in a SQL client, you’ll likely see an error. We need to grant access first.
I’m doing this on macOS Catalina, which has added some additional security features (i.e., restrictions). Even so, it’s actually quite easy to get access to the database, as long as you don’t mind granting full disk access to some applications. Let’s get that out of the way right away.
Open System Preferences, find the “Security & Privacy” pane, click on the “Privacy” tab, and find the “Full Disk Access” item. Make sure your SQL client and/or terminal are selected.
That should be it! You’ll need to restart any applications that were open while you granted them access. Otherwise, you should be able to access the message database:
- In a terminal, run
sqlite3 ~/Library/Messages/chat.db
- In a SQL client, connect to the database at
~/Library/Messages/chat.db
. If you’re having trouble navigating to it, you can press CMD+SHIFT+G in a finder window and type that in the dropdown.
2. Exploring the Tables
When you open the database, you should see about fifteen tables.
A few notable tables:
- attachment – metadata and storage location
- chat – a collection of your messages (both direct and group)
- handle – metadata about chats
- message – all messages sent and received
There are also join tables, which show the relationships between tables (handles to chats, chats to messages, messages to attachments, etc.). With these, we can build some pretty cool queries.
3. Queries
To see all of your messages with a nicely formatted date:
To find a message that matches some text:
To see the total count of messages across all of your chats:
To see some interesting information about messages between you and another person:
These are just a few examples of what you can do when you dig into the data behind your messages.
Accessing the chat database can, of course, be useful for finding old messages. But more than that, it’s fun to explore and write some interesting queries. Let me know in the comments if you’ve written anything exciting for this database!
Category: «Clouds», «Mobile», «Tips & Tricks»
1 - 1
How secure are your chats in your favorite instant messenger? John deere model year identification. Can someone intercept and read your secret conversations, and can you do something about it? Apple users have access to the highly popular instant messaging system, the iMessage. But how secure it really is? Let’s find out.
When it comes to instant messaging, there are generally three ways to gain access to your chats:
- Intercept messages in transit
- Obtain conversation backups from a cloud
- Extract messages from the endpoints (devices)
Whatever messenger you use (built-in or third-party with “military-grade encryption”), it is important to understand all the risks. We covered some issues in Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition. Torrent family tree maker. There is also Secure Messaging Scorecard (by the EFF), a nice though outdated source.
What are the most popular messengers? I know you’re going to hate the answer, but… it depends.
In most countries, the top hits are Facebook Messenger and WhatsApp, and we have an app for the latter (Elcomsoft eXplorer for WhatsApp). In China, there are some very different instant messengers in use (WeChat, QQ, Momo and so on). In Russia it’s a different story altogether (have you heard about Viber?), and Brazil is quite unique with heavy WhatsApp dominance. Today, we are going to talk about another one, which is pre-installed and intensively used on Apple devices: the iMessage.
Messages in transit
You may forget about iMessage interception. The iMessage protocol has no known vulnerabilities (although some security flaws may exist), so there is absolutely no way to decrypt messages in transit. You don’t need to do anything to protect your iMessages in transit; they are already secure.
Protecting iMessages in local backups
Local backups (the ones you may or may not have made with the iTunes app) do have contain the entire iMessage database, complete with messages and all the attachments. If you never protected your backups with a password, is easily available as a part of the iTunes backup. The only way to protect the backup (and encrypt your iMessage database) is setting a backup password in iTunes. Once you do, the entire backup, including your iMessages, will be encrypted with that password. Since you’re likely won’t be using that password very often, do yourself a favor and set up a long, complex and, most importantly, unique password. Once you configure a password, all backups you make from then on will be protected with that password.
Can someone bypass the backup password? If they have physical access to your iPhone and they happen to know your passcode, they can reset the backup password through iPhone settings by going through a simple walkthrough.
Can you protect yourself against this scenario? Yes, you can block the reset attempts by enabling the Screen Time password in your iPhone settings. We have a comprehensive article detailing how you can do it; read Using Screen Time Password to Protect iPhone Local Backups for details.
Once you configure a (unique!) Screen Time password, you are well-protected against so-called logical acquisition attempts. Unless they happen to know both your screen lock passcode AND your Screen Time password, your messages will be safe from extraction (but can still be read in the Messages app if they can unlock your phone).
Protecting your iPhone
If the password cannot be reset, your messages might be pulled from your iPhone. If you are using an older model (up to and including the iPhone 8, 8 Plus and iPhone X range), your iPhone is vulnerable to a hardware exploit. This exploit cannot be patched by Apple.
Imessage Automatically Reading Messages App
Older versions of iOS have known vulnerabilities that can be also exploited to access the file system. Therefore, if someone has your phone and knows your passcode (or there is no screen lock passcode at all), they can jailbreak it by installing the checkra1n jailbreak or extract data by using the agent with Elcomsoft iOS Forensic Toolkit.
One more thing you should be aware of: if you are using the older device (the use of checkra1n allows extracting some message data (up to and including the iPhone 8, 8 Plus and iPhone X range), some iMessage-related data such as the message drafts and some message attachments can be extracted even from locked devices with full file system acquisition in BFU (Before First Unlock) mode.
How can you protect your iPhone against these attacks? If you are still using an older device, upgrade it to at least the iPhone SE 2, iPhone Xr/Xs/Xs Max or newer. The iPhone 11 and 12 range is immune to the hardware exploit.
If you are still using an older version of iOS, update it to the latest one.
Finally, make sure you are using a 6-digit or better screen lock passcode that can not be easily guessed.
Your iMessages in iCloud
Depending on whether or not you had enabled the Messages in iCloud feature available in recent versions of iOS. In Keep all your messages in iCloud, Apple provides information about enabling and disabling the feature. What this article does not tell is how enabling this feature affects the security of your iMessages. Does it increase or reduce security?
In fact, enabling Messages in iCloud does indeed make them more secure. With this feature disabled, your entire iMessage is saved to iCloud backups (if you have them enabled). Not only can anyone with access to your Apple account download the backup with Elcomsoft Phone Breaker, but Apple will also provide them to the law enforcement when facing a legal order.
If, however, the Messages in iCloud feature is enabled, Apple will encrypt your messages with end-to-end encryption. If Messages in iCloud is enabled, the iMessage database is not included to iCloud backups (local backups remain unchanged); instead, they are directly synced with the your iCloud account. How secure is that? Look at the iCloud security overview:
Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages. This ensures you can recover your Messages if you lose access to iCloud Keychain and your trusted devices. When you turn off iCloud Backup, a new key is generated on your device to protect future messages and isn’t stored by Apple.
Apple’s implementation of “end-to-end” encryption is secure, at least on the most part. With proper account credentials, one can download messages along with attachments directly from iCloud. However, in addition to the login and password, one extra thing is needed: your iPhone screen lock passcode or the passcode of an already trusted device (just the passcode, not the device itself). Here is everything that is needed to pull iMesages if you have Messages in iCloud enabled:
Why Is My Iphone Automatically Reading Messages
- Your Apple ID
- Your Apple account password
- Second authentication factor (SMS or trusted device)
- Passcode of any of your trusted Apple devices
For more details, see iMessage Security, Encryption and Attachments.
Can you secure your account? The only thing you can do is choosing a long, complex (6 digits or more) screen lock passcode on all iOS devices with Messages in iCloud enabled. Make sure the passcodes are unique and cannot be easily guessed.
Conclusion
Are your iMessages secure? Yes, in the most part, but it is your duty and your responsibility to physically secure your personal devices and protect access to your Apple account.
Imessage Message Not Delivered
1 - 1