The GSMA Association recently unveiled version 3.0 of the Rich Communication Services (RCS) protocol. While this update doesn’t introduce any particularly groundbreaking features, it notably addresses the issue of encrypted RCS messaging between Android and iOS devices.
Apple’s recently introduced iOS 18.x supports RCS messaging, a service that transmits content via the internet rather than traditional carrier SMS or MMS channels. RCS allows users to seamlessly send text, images, videos, and other types of files.
If all mobile devices and carriers embraced RCS, users could effortlessly exchange various multimedia content with friends and family without relying on third-party instant messaging apps, primarily utilizing only their internet data allowances.
However, Apple currently supports the RCS 2.0 protocol, which lacks cross-platform end-to-end encryption (E2EE). Consequently, messages sent from iOS to Android devices via RCS are presently transmitted without end-to-end encryption.
Version 3.0 of the RCS protocol resolves this critical shortcoming by natively integrating support for end-to-end encryption. Both Apple and Google have agreed to adopt this updated standard, thereby rectifying the lack of encryption in cross-platform communication.
An official Apple spokesperson commented:
“End-to-end encryption is a powerful privacy and security technology that iMessage has supported since the beginning, and now we are pleased to have helped lead a cross industry effort to bring end-to-end encryption to the RCS Universal Profile published by the GSMA. We will add support for end-to-end encrypted RCS messages to iOS, iPadOS, macOS, and watchOS in future software updates.”
Google has also confirmed its commitment to adopting this new standard, pledging to incorporate RCS 3.0 into Android swiftly. However, neither Apple nor Google has provided specific timelines or detailed plans regarding their rollout of the RCS 3.0 standard.
RCS 3.0 employs end-to-end encryption based on the Message Layer Security (MLS) protocol. This ensures that texts, images, and other files are encrypted before transmission over the network and can only be decrypted by the intended recipient. Consequently, neither network operators nor malicious actors can intercept or decipher the encrypted messages through man-in-the-middle attacks.