Apple has released a new developer beta of iOS and iPadOS that introduces support for end to end encryption in Rich Communications Services messaging. The feature is currently available for testing in iOS and iPadOS 26.4 Beta and is expected to roll out to customers in a future update spanning iOS, iPadOS, macOS and watchOS. According to Apple’s release notes, the encryption capability remains in beta and is not yet available across all devices or carriers. Conversations that are labeled as encrypted are protected end to end, meaning messages cannot be accessed while in transit between devices. However, Apple clarified that encrypted RCS messaging is presently limited to conversations between Apple devices and does not extend to other platforms such as Android.
The move comes nearly a year after GSM Association formally announced support for end to end encryption within the RCS protocol framework. To enable encrypted RCS messaging, Apple is expected to update to RCS Universal Profile 3.0, which is built on the Messaging Layer Security protocol. The adoption of this profile is intended to strengthen privacy protections for modern messaging services that go beyond traditional SMS. RCS has been positioned as a next generation messaging standard offering features such as read receipts, typing indicators and enhanced media sharing. By integrating encryption into RCS conversations between Apple devices, the company is aligning with broader industry efforts to enhance confidentiality and reduce exposure to interception risks in mobile communications.
In addition to encrypted RCS support, the latest developer beta introduces a new security enhancement that allows applications to opt in to the full safeguards of Memory Integrity Enforcement for stronger memory safety protection. Previously, applications were limited to a Soft Mode configuration. Memory Integrity Enforcement was unveiled by Apple in September as part of its strategy to counter advanced mercenary spyware threats targeting its ecosystem. The technology provides always on memory safety protection across critical attack surfaces, including the kernel and more than 70 userland processes, without imposing noticeable performance impact. By enabling broader access to full Memory Integrity Enforcement protections, Apple is extending deeper security controls to developers seeking to harden their applications against sophisticated exploitation techniques.
Reports from MacRumors also indicate that iOS 26.4 is expected to activate Stolen Device Protection by default for all iPhone users. This feature adds another security layer by requiring Face ID or Touch ID biometric authentication when performing sensitive actions such as accessing stored passwords or credit card information while away from familiar locations like home or work. In addition, Stolen Device Protection introduces a one hour delay before allowing changes to an Apple Account password, alongside biometric verification requirements. The delay is designed to give users time to mark their device as lost if it is stolen, reducing the risk of unauthorized account access. Together, these updates reflect Apple’s continued emphasis on strengthening privacy, messaging security and device level protections across its software ecosystem.
Follow the SPIN IDG WhatsApp Channel for updates across the Smart Pakistan Insights Network covering all of Pakistan’s technology ecosystem.




