By Joaquim Barbosa on Dec 10, 2016
As reported recently on iDB, Luca Todesco has decided to solve the certification problems which have plagued the most recent Pangu release for 9.2-9.3.3, by making public a web-based tool for re-activating the jailbreak.
After doing some testing and research it seemed appropriate for a more in-depth discussion of the tool, along with a walkthrough, in order to address some of the more technical questions surrounding this latest development in the jailbreaking scene. Read More
By Joaquim Barbosa on Dec 8, 2016
Noted iOS security researcher and hacker Luca Todesco has just released a WebKit-based loader for the Pangu 9.3.3 jailbreak. This impressive browser exploit is reminiscent of the original JailbreakMe exploits on iOS 1 and iOS 4, after which it is named.
All that is required for the technique to work is to follow a URL in mobile Safari, press a button, lock your device and wait for the respring.
Whilst this development is testament to Todesco’s hacking skills and has alleviated one major problem with the current 9.3.3 jailbreak: its reliance on developer certificates for the loader app, there is bound to be some confusion over what this tool actually does, and what it means for the jailbreak community. This post aims to bring some clarity to the topic. Read More
By Anthony Bouchard on Jul 25, 2016
For those who are unaware, Pangu launched a new jailbreak for iOS 9.2-9.3.3 over the weekend. Now, an iOS developer from the jailbreak scene has made it possible to jailbreak your iOS 9.3.3 device directly from your iOS device itself without the need for a computer.
It’s officially JailbreakMe-style, and in this tutorial, we’ll show you how to do it! Read More
By Sébastien Page on May 28, 2016
Italian hacker Luca Todesco is once again making waves in the jailbreak community after demonstrating on video a browser-based jailbreak on a 6th generation iPod touch running iOS 9.3.2.
Similar to the now classic JailbreakMe, the method used by Todesco can apparently jailbreak the device directly from Safari, without requiring a computer. Read More
By Sébastien Page on Mar 21, 2013
The cat and mouse between Apple and the jailbreak community has been going on for about 6 years now. Every time a new jailbreak tool is released, taking advantage of some holes in Apple’s tight mobile operating system, you can bet your shirt that Apple will be quick at patching those holes with a software update.
Sometimes those software updates are released faster than others. For example, it took Apple 43 days to patch a series of vulnerabilities that allowed iOS 6 users to jailbreak their devices using evasi0n. In comparison, it took Apple only nine days to fix the bugs that were exploited by JailbreakMe 3.0.
The time difference can be easily explained by the fact that exploits like those used by JailbreakMe represent a much a higher security threat to iOS users than those used in evasi0n. Remember, JailbreakMe could be run directly from the device’s browser, thus exposing virtually every single iOS 4.3.3 user at the time to security risks. In comparison, evasi0n requires you to plug the device to a computer via USB. Clearly, the security threats is much lower with evasi0n.
This being said, every time Apple releases a software update that patches vulnerabilities used in a jailbreak, some enthusiastic jailbreakers are always quick at calling Apple names and accusing the company to actively fight the jailbreak community. “Apple hates jailbreakers. They just released a software update to kill the jailbreak,” you can often read every time an iOS update that patches a jailbreak is released. But is that really the truth? Does Apple really hate the jailbreak community or is it trying to protect the safety of its most popular operating system? Read More
By Jeff Benjamin on Oct 18, 2012
Nicholas Allegra, a.k.a.Comex — the iOS hacker responsible for the popular jailbreak tool JailbreakMe — has parted ways with Apple after interning there for a little over a year.
Last August, Comex broke the news that sent shockwaves through the jailbreak community, announcing that he would be joining the very company whose security he’d successfully undermined more than once.
Is it possible that Comex might pick up where he left off in the jailbreak community? Read More
By Christian Zibreg on Mar 23, 2012
Jailbreak community owes a lot to adept hackers who find and exploit weaknesses in the design of iOS mobile operating system, thus allowing Apple’s mobile gadgets to run unsanctioned software. It’s more often than not a neverending cat-and-mouse game between Apple and hackers that at the end benefits jailbreakers the most.
Say you’re an expert hacker who just figured an exploit in one of Apple’s products. You could report your findings directly to Apple and help them plug those holes with a software update.
But did you know you could also hand over this valuable information to an exploit broker who will sell it to a government agency and net you a decent profit, minus the broker’s commission? A U.S. government agency, to be precise… Read More
By Jeff Benjamin on Jan 9, 2012
Blutrol is a recently released jailbreak app that allows you to map your iCade control cabinent to pretty much any game that features on screen controls. That means that the iCade is no longer limited to a handful of so-so games, which makes the device a lot more useful and appealing to gamers.
Basically, Blutrol transforms your iCade from a mere conversation piece, into a legitimate gaming machine. All you need is a jailbroken iPad, and you’re good to go… Read More
By Sébastien Page on Oct 8, 2011
Yesterday the news broke that JailbreakMe.com had been sold to an unknown person, creating a bit of panic in the jailbreak community after a few prominent iOS hackers had suggested not to use the site anymore for security reasons.
As it turns out, JailbreakMe.com is now a safe place again, thanks to saurik, who apparently purchased the domain name from the previous owner… Read More
By Alex Heath on Oct 7, 2011
JailbreakMe, the wildly popular web-based jailbreak tool created by comex, is no more. Comex recently announced that he had been hired by Apple, and the JailbreakMe.com domain has been owned by a third party for quite some time.
MuscleNerd, frontman for the Dev Team, has warned jailbreakers to stay clear of JailbreakMe.com from now on… Read More
By Cody Lee on Aug 4, 2011
For those who aren’t familiar with the event, the Pwnie Awards is an annual awards show celebrating failures and achievements in the security community. This year’s ceremony took place in Las Vegas, Nevada at the BlackHat security conference.
All together there were 9 awards handed out, and it probably won’t surprise you that a certain iDevice hacker took home one of them. As a matter of fact, 2 well known members of the jailbreak community ended up taking home Pwnies… Read More
By Sébastien Page on Aug 1, 2011
If you’ve ever considered jailbreaking your iPhone or iPad, no doubt you’ve heard about an iOS hacker going by the handle Comex, the guy who discovered several important exploits, and the creator of JailbreakMe.
Besides his Twitter handle, we don’t know much about Comex. A Forbes journalist did a bit of digging and found out who Comex really is, and managed to talk to him… Read More
By Alex Heath on Jul 19, 2011
JailbreakMe 3.0 is a web-based jailbreak tool that provides an untethered jailbreak for all iDevices on iOS 4.3.3, including the iPad 2.
The hacker behind JailbreakMe, Comex, has officially made the code for JailbreakMe open source. His jailbreak code, called “saffron,” is now available for anyone to view on GitHub. Read More
By Alex Heath on Jul 18, 2011
Apple will no longer allow users to update or restore an iOS device to iOS 4.3.3. The signing window for 4.3.3 has been closed, meaning that you can no longer restore a device to 4.3.3 in iTunes without previously saved SHSH blobs from that firmware.
This news is important for jailbreakers that are either considering using JailbreakMe on iOS 4.3.3, or those that may have possibly upgraded to an iOS 5 beta without saving their blobs. The recently released iOS 4.3.4 kills the untethered jailbreak that was previously offered in iOS 4.3.x, so 4.3.3 is the most up to date firmware that offers an untethered jailbreak. Read More
By Alex Heath on Jul 17, 2011
Apple has begun to step up its game with patching jailbreak exploits in iOS. When Comex’s PDF exploit was used in the latest version of JailbreakMe, Apple pushed out iOS 4.3.4 about two weeks later to combat the security hole.
Jailbreakers on 4.3.3 (4.2.9 for the Verizon iPhone) can stay on their current firmware to keep their untether, but the bad news is that Apple actually patched the untethered exploit that’s been used by jailbreakers since iOS 4.1. Read More
By Alex Heath on Jul 16, 2011
The Dev Team has released an update to the jailbreak tool, RedSn0w, with support for a tethered jailbreak on iOS 4.3.4. Apple released 4.3.4 yesterday to combat the PDF vulnerability uncovered in the latest version of JailbreakMe.
JailbreakMe users are advised to stay with the untethered jailbreak that the web-based tool provides on iOS 4.3.3, and not upgrade to 4.3.4. Read More
By Guest Author on Jul 15, 2011
The biteSMS team has pushed out a compatibility update for JailbreakMe 3.0.
Just over a week ago, we discovered that Cydia’s popular text messaging tweak, biteSMS, was conflicting with Comex’s latest jailbreak, JailbreakMe 3.0.
BiteSMS’ quick reply functionality would send users device’s into an infinite boot loop. This was quickly confirmed with multiple sources, predominantly the biteSMS support forum, JailbreakQA, and of course our readers here at iDB. Read More
By Alex Heath on Jul 14, 2011
If you haven’t heard of JailbreakMe by now, you may be living under a rock. One thing you’re definitely not doing is flying in a plane, because a video has surfaced that shows an iPhone 4 being jailbroken with JailbreakMe.com from 20,000 up in the air.
The cool thing about JailbreakMe is that it allows you to jailbreak an iDevice in Safari on the device itself. All you need is an internet connection and a few seconds to let Cydia install. And thanks to the availability of internet access on most commercial airlines, we bring you JailbreakMe on a plane… Read More
By Guest Author on Jul 13, 2011
Many Verizon iPhone users are experiencing issues with the latest JailbreakMe exploit that causes their device to get stuck at the Apple boot logo. If you’re one of them, here’s how to fix it!
Comex, the brains behind JailbreakMe 3.0, has published instructions on how to fix the issue that should get your device running smoothy again, and here they are.
You have two options if you’re experiencing this issue: you can either restore your device and forget about the jailbreak, or you can try a “quasi-experimental fix using redsn0w” to try and maintain your jailbreak: Read More
By Sébastien Page on Jul 11, 2011
Those of you who have been experiencing bugs after using JailbreakMe will be glad to find out that Comex made some fixes to the kernel patches for the userland jailbreak, and these fixes have been pushed as an “Essential Upgrade” in Cydia.
To get this update, simply launch Cydia and you should be prompted to upgrade. Make sure you do not run JailbreakMe again over your current jailbreak. Instead, let Cydia do the job for you… Read More