What am I supposed to present? A complete history of computer science and system design?
"isn't possible"
Any app on any system, if exploitable, can be used for a chain attack to exploit further vulnerabilities (and 14.8 was a bandaid for just such an attack). That's ignoring that iMessages is also such a high value target for its own data, in the same way that Signal and other messaging apps are high value targets, and not just as a path to chaining 0 days.
This is a not useful conversation that I hesitated engaging in at first glance (when someone does the "if only they just waved hand everything would be great" it's founded in dubious logic 100% of the time), so feel free to reply into the ether.
Facts that support your position, like I did. I provided a couple of in-depth articles about the inner workings of iMessage, with specific emphasis on security. You've yet to even explain in technical terms what is erroneous about my critique.
> Any app on any system, if exploitable, can be used for a chain attack to exploit further vulnerabilities.
That isn't how iOS is structured. If it were normal app developers could design their own apps to gain root, but the system is specifically engineered to combat that and has been quite successful. Whereas Apple's own apps have a set of components that run with elevated privileges that allow sideways exploitation to bypass the normal UID sandboxes, and ultimate cause significant escalation including root.
The two articles I linked explain how this occurs. There's nothing akin to the SYSTEM services within normal (non-Apple) apps, therefore your comparison is technically unfounded.
> This is a not useful conversation that I hesitated engaging in at first glance (when someone does the "if only they just waved hand everything would be great" it's founded in dubious logic 100% of the time), so feel free to reply into the ether.
You're backing out of the conversation because you've shown you lack the technical foundation to participate. You assumed at the start that I knew as little as you and therefore we could both make baseless claims without anyone checking either one. The reality is that I understand iOS's internal structure and can provide founded critiques whereas, you lack the technical foundation to mount a defense of the design (and that your original defense is between confusing and just wrong).
What am I supposed to present? A complete history of computer science and system design?
"isn't possible"
Any app on any system, if exploitable, can be used for a chain attack to exploit further vulnerabilities (and 14.8 was a bandaid for just such an attack). That's ignoring that iMessages is also such a high value target for its own data, in the same way that Signal and other messaging apps are high value targets, and not just as a path to chaining 0 days.
This is a not useful conversation that I hesitated engaging in at first glance (when someone does the "if only they just waved hand everything would be great" it's founded in dubious logic 100% of the time), so feel free to reply into the ether.