Exploit

Chronic Dev Team still working on an untethered iOS 5 jailbreak

Chronic Dev Team member @pod2g sent out a tweet stating they are all still actively working on an iOS 5 untethered jailbreak. After Comex's departure to Apple a lot of the jailbreak community is wondering how it affects future development of jailbreak tools. Even though Comex played a huge part in the jailbreak scene there will always be many others willing to step in and fill his shoes. The cat and mouse game will always continue.

More →

0
loading...
0
loading...
0
loading...
0
loading...

State of the Jailbreak: iOS 4.3.5 and iOS 5 beta

We're getting a lot of questions from Jailbreakers and would-be Jailbreakers both on iOS 4.x and iOS 5 so we figured it was time to once again take a look at the state of iPhone, iPod touch and iPad Jailbreak. Here it is:

If you still have an untethered Jailbreak on iOS 4.3.3 or below and want to stay untethered, don't upgrade just yet.

If you've already updated and you currently have a tethered jailbreak on iOS 4.3.5, you'll probably have to stay tethered until the release version of iOS 5 drops this October.

More →

-
loading...
-
loading...
-
loading...
-
loading...

Dev-Team working out final issues with iOS 4.3 untethered jailbreak

Following up on earlier news that an untethered exploit was handed over to the Dev-Team from developer Stefan Essen, prominent Dev-Team member @MuscleNerd tweeted that the exploit is working and they're hammering out remaining jailbreak issues at this time.

well @i0n1c's untether is solid! Just working out overall 4.3.x JB issues and Cydia :)

More →

-
loading...
-
loading...
-
loading...
-
loading...

iOS 4.3 untethered jailbreak exploit handed over to Dev-Team

Developer Stefan Essen recently demoed an iOS 4.3 untethered jailbreak exploit on video. Today on Twitter, he has stated that the exploit has been turned over to the iPhone Dev-Team. He stated when he released the demo video that he had no intention of releasing a jailbreak tool himself.

More →

-
loading...
-
loading...
-
loading...
-
loading...

iPad 2 and iOS 4.3 state of the Jailbreak

Will I be able to Jailbreak iPad 2 running iOS 4.3 when it launches? Thats a question on a lot of user's minds. We already know the jailbreak community is working towards an iOS 4.3 jailbreak. What we "do" know is that a tool won't go official until iOS 4.3 is out of beta and in the hands of consumers. Most of the reason behind this is so Apple doesn't patch it in a last minute update.

More →

-
loading...
-
loading...
-
loading...
-
loading...

SHAtter bootrom exploit possibly leaked, what it means for jailbreakers

The SHAtter exploit found by pod2g appears to have been leaked. Who leaked it and for what reason is still unclear. What is clear is that Apple will certainly find a way to patch the hardware if it did in fact leak. When Limera1n was released, it kept the SHAtter bootrom exploit safe for future jailbreaks as it would require a complete hardware revision to be done by Apple.

SHAtter basically used a hardware exploit in the A4 series of devices (iPhone 4, iPad, AppleTV 2nd generation, and iPod Touch 4G). You can bet Apple will make a hardware revision to patch SHAtter. It seems there is some drama between some members of the jailbreak community over who actually "leaked" the SHAtter exploit.

@P0isixninja of the Chronic Dev Team is pointing a blame finger to @Musclenerd. As Musclenerd concentrates on unlocks, it seems unreasonable to think he'd leak an exploit he would need in order to create an unlock. Click through for a response to the drama from @comex, who claims if it doesn't stop, he'll just e-mail the exploit directly to Apple. Not good news for the jailbreak community.

More →

0
loading...
0
loading...
0
loading...
0
loading...

Paypal for iPhone Wi-Fi exploit discovered, patched

It seems a security hole in Paypal's iPhone app has been discovered that would allow hackers to access user's Paypal username and passwords over Wi-Fi. The "man-in-the-middle attack" let's the hacker come between the user input information and Paypal's servers. Although this is dangerous, it does require the hacker to be on the same Wi-Fi connection as the user in order to steal their information.

More →

0
loading...
0
loading...
0
loading...
0
loading...

iOS 4.1 security flaw allows calls to be made on passcode locked iPhone

It looks as if there's yet another Phone.app security hole, this time in iOS 4.1 that allows someone to get around a passcode locked iPhone, gain access to the owner's contact list, make calls and send emails to anyone in said contact list.  From MacStories:

"To reproduce the bug, make sure to have a passcode lock turned on and lock your device. In the lockscreen, tap on Emergency Call in the lower left corner. Now type a non-existent emergency number, I tried #946494. Start the call, and as soon as the red button appear hit the sleep button. You’ll be brought to the contact list."

More →

0
loading...
0
loading...
0
loading...
0
loading...

Geohot exploit + Comex userland tools to keep Apple A4 iPhones Jailbroken and untethered Forever

iPhone Dev Team's MuscleNerd has announced via twitter that Comex's Userland Tools can be used to keep all Apple A4 chipset-based, Jailbroken iPhones, iPod touches, and iPads untethered for all future firmware releases. Coupled with Geohot's limera1n exploit which will work on all current A4 devices for the duration of their lifespan, and iPhone Dev Teams custom pwnagetool which will keep your baseband unlockable, Jailbreakers can look forward to being up to date with all current firmware releases without any worry of losing their Jailbreak or Unlock status.

More →

0
loading...
0
loading...
0
loading...
0
loading...

Apple to patch Jailbreakme.com, PDF font exploit in upcoming software update

I think we all generally assumed this, but it's nice to see Apple going on record as saying they'll patch the PDF font exploit that currently allows Jailbreakme.com -- and potentially any malicious hacker out there -- to run code on an iPhone with just the tap of a web button. CNET scored the quote from an Apple spokeswoman:

"We're aware of this reported issue, we have already developed a fix and it will be available to customers in an upcoming software update."

More →

-
loading...
-
loading...
-
loading...
-
loading...

Pages