Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Nothing kills iMessage bridge because it profoundly violated user privacy & security

Nothing Chats

Nothing and Sunbird pulled the shockingly insecure iMessage bridge, but only after it was discovered that not only did Sunbird log and retain messages, vCards, and more, but that retained user data could also be downloaded by others.

Nothing Chats was pulled from the Google Play Store on Saturday only a few days after it was introduced. Launched on November 14, suspicions were raised about the app within days, including its seeming lack of encryption, and the sending of login credentials over the internet using plaintext HTTP.

On Saturday, things got worse for the Nothing and Sunbird service, with more revelations over the astounding lack of security safeguards for the app.

Early in the day, Nothing removed the app from the Google Play Store. In a post on X, formerly Twitter, the phone maker somewhat optimistically says it is "delaying the launch until further notice to work with Sunbird to fix several bugs."

Before Nothing pulled the plug, Android app developer Dylan Roussel made some discoveries about the app that demonstrated it as being extremely insecure for its users. In a thread, Roussel declared that Sunbird had "access to every message sent and received through the app on your device," that all documents including images, videos, and vCards sent through the app are publicly viewable, and that Nothing Chats doesn't use end-to-end encryption at all.

Pushed forward by a claim by Sunbird that HTTP was fine for an initial request, Roussel says that Sunbird has access since it abuses error detection tool Sentry. Rather than using it to log errors, Sunbird instead used Sentry to log the messages and pretending they were errors.

After trying and succeeding with texts, Roussel then tried sending other forms of media, and found that they were sent to Firebase. He then wondered if it was possible to see media posted by other users, and not only managed to generate a list, but was able to access some elements.

More than 637,000 media items were stored by Sunbird at the time of the thread's posting. That collection included vCards, which the app suggests to send to others at the start of a conversation so that the user's Apple ID email address is merged with a phone number on the contact's phone.

Roussel then proceeded to download one of the 2,300 or so vCards in the archive, proving it was possible to get other users' phone numbers and details.

Files were also stored with the original file names intact. Roussel said this was an issue as it could include part of a URL, or confidential or sensitive information, which has further security implications.

Finally, Roussel said the chats aren't end-to-end encrypted at all. "After discovering that medias are shared publicly, this news comes with the realization that Sunbird, and by extension, Nothing Chats is not end-to-end, as advertised everywhere," the developer wrote.

As for what Nothing could do, at the time Roussel said the app should get removed from the Play Store, and then to warn all users. Under Europe's GDPR, rules, Sunbird has 72 hours from being notified of a vulnerability to notify the victims.

"Nothing Chats was not developed by Nothing. But Nothing should have verified that the app which uses their name is secured, before claiming it is," Roussel comments on the matter. "This is probably the biggest privacy nightmare' I've seen by a phone manufacturer in years."