Well this is interesting. Apple’s iMessage service has been reverse engineered to look at how the API paths work and, generally, how messages are sent/received through the service. This includes the XML for authentification as well as the return from successful authentification. It also demonstrates push and image attachments.
I’m not sure if anything can really happen as a result of this because it’s so reliant on the server that Apple can easily stop people using iMessage in odd ways (like using it on Android or something mad). However it’s always interesting to see this hacker stuff.
You can check the full document via imfreedom.