Last week on December 5, Beeper Mini was launched, enabling Android users to utilize Apple’s iMessage service through a nominal monthly subscription. However, shortly after its debut, Apple intervened to block the service, raising concerns over privacy and security. In response, Beeper asserted that its platform is designed with user security in mind, facilitating smoother communication between Android and iPhone users. The company confirmed that it was actively working to reinstate the service at the earliest opportunity.
On December 11, Beeper issued a blog post announcing the restoration of its services, albeit with significant modifications. Users of Beeper Mini will now need to log in using their Apple ID due to the unavailability of phone number registration. The company explained that it had completely deregistered all phone numbers, with messaging now exclusively managed through the email address associated with the Apple ID.
In light of the operational disruptions, Beeper has decided to offer Beeper Mini free of charge for the time being. The team has indicated that they plan to revert to a subscription model once the service stabilizes, following its initial launch priced at $1.99 (approximately Rs. 160) per month. The updated version is now available for download on the Google Play Store. Users experiencing difficulties with two-factor authentication are encouraged to uninstall and reinstall the app to resolve issues.
Furthermore, in its announcement, Beeper dismissed Apple’s claims regarding the supposed lack of security in Beeper Mini. The company reiterated that its services are locally hosted and include end-to-end encryption. Beeper also stated that it is open to sharing its entire source code for security evaluation with mutually consented third parties, should Apple agree to the arrangement.
Following the block on its services, Apple contended that it took these steps to safeguard its users, asserting that Beeper’s methods “posed significant risks to user security and privacy” and criticized the use of “fake credentials.”