Beeper doesn't "hack" anything though, it uses the exact same authorization mechanism as a real iOS device and grants the user access to no more than a real device would.
I agree that the CFAA can be abused to try and prosecute this (as well as the DMCA), and I suspect Beeper is intentionally hoping for (heavily publicized) litigation to settle this once and for all and set a precedent.
> it uses the exact same authorization mechanism as a real iOS device and grants the user access to no more than a real device would.
And a hacker that social engineers someone's bank password is entering just like the account owner would. "Hacking" doesn't have to involve exploiting a technical vulnerability. It's just unauthorized system access, regardless of methodology
I agree that the CFAA can be abused to try and prosecute this (as well as the DMCA), and I suspect Beeper is intentionally hoping for (heavily publicized) litigation to settle this once and for all and set a precedent.