Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS. “End-to-end encryption is in beta and is not available for all

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages.

The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS.

“End-to-end encryption is in beta and is not available for all devices or carriers,” Apple said in its release notes. “Conversations labeled as encrypted are encrypted end-to-end, so messages can’t be read while they’re sent between devices.”

The iPhone maker also pointed out that the availability of RCS encryption is limited to conversations between Apple devices, and not other platforms like Android.

The secure messaging test arrives nearly a year after the GSM Association (GSMA) formally announced support for E2EE for safeguarding messages sent via the RCS protocol. E2EE for RCS‌ will require Apple to update to ‌RCS‌ Universal Profile 3.0, which is built atop the Messaging Layer Security (MLS) protocol. 

The latest beta also comes with a new feature that allows applications to opt in to the full safeguards of Memory Integrity Enforcement (MIE) for enhanced memory safety protection. Previously, applications were limited to Soft Mode, Apple said.

MIE was unveiled by the company last September as a way to counter sophisticated mercenary spyware attacks targeting its platform by offering “always-on memory safety protection” across critical attack surfaces such as the kernel and over 70 userland processes without imposing any performance overhead.

According to a report from MacRumors, iOS 26.4 is also expected to enable Stolen Device Protection by default for all iPhone users. The feature adds an extra layer of security by requiring Face ID or Touch ID biometric authentication when performing sensitive actions like accessing stored passwords and credit cards when the device is away from familiar locations, such as home or work.

Stolen Device Protection also adds a one-hour delay before making Apple Account password changes, on top of the Face ID or Touch ID authentication to give users some time to mark their device as lost in the event it gets stolen.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Previous Post

Over 500,000 VKontakte accounts hijacked through malicious Chrome extensions

Next Post

Cycom Hacking Conference

Related Posts

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution or program crashes. "Type
Read More

Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild

Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it said have been exploited in the wild. The patch addresses a total of 107 security flaws spanning different components, including Framework, System, Kernel, as well as those from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unison. The two high-severity shortcomings
Read More