Radio proximity security attack targeting up to iOS 13.5 detailed by Ian Beer

Matrix code hacked iPhone.

Accomplished security researcher Ian Beer, known for releasing a host of iOS exploits used by modern jailbreak tools, dropped a bombshell on Twitter late Wednesday evening after sharing a detailed blog post about a jaw-dropping radio proximity exploit affecting up to and including iOS and iPadOS 13.5.

The blog post summary goes on to explain that the hacker can remotely trigger kernel memory corruption through the execution of arbitrary code. Furthermore, it can force affected iOS and iPadOS devices in radio proximity to reboot with no user interaction needed or put privacy at risk by breaching user data or utilizing cameras and microphones without the user’s knowledge.  Scary indeed…

Chimera jailbreak updated to v1.5, supports up to iOS 12.4.9 & adds Procursus bootstrap

As iOS 12-using jailbreakers might recall, the Chimera Team issued a new public beta of its Chimera jailbreak tool earlier this week with Procursus bootstrap and full libhooker tweak injection integration and a plethora of backported improvements from the iOS & iPadOS 13-centric Odyssey jailbreak tool.

Early Wednesday morning, however, the Odyssey Team took to Twitter to announce that Chimera version 1.5 had been officially released to the general public without the ‘beta’ asterisk attached to the name: