Exploit

Ever Wonder What it Takes to Jailbreak iOS? i0n1c’s Exploit Paper Reveals All

Stefan Esser, better known in the jailbreak community as i0n1c, was responsible for one of the most successful exploits in jailbreak history. While the iOS 4.3.1 jailbreak was certainly a collaborative effort, Esser's work was perhaps the most important.

No one likes to connect their iDevice to their computer every time they reboot, and i0n1c's untether meant they didn't have to. What made it so successful? The fact that the exploit continued to work through iOS 4.3.2 and 4.3.3 updates.

Have you ever wondered what goes into hacking the most secure mobile operating system? Esser tells all in this 97 page paper...

Bad News: iOS 4.3.4 Permanently Kills the 4.3 Untethered Jailbreak

Apple has begun to step up its game with patching jailbreak exploits in iOS. When Comex's PDF exploit was used in the latest version of JailbreakMe, Apple pushed out iOS 4.3.4 about two weeks later to combat the security hole.

Jailbreakers on 4.3.3 (4.2.9 for the Verizon iPhone) can stay on their current firmware to keep their untether, but the bad news is that Apple actually patched the untethered exploit that's been used by jailbreakers since iOS 4.1.

Apple Plans to Fix JailbreakMe PDF Exploit in Next iOS Update

After a long wait, Comex released JailbreakMe 3.0. And now a huge number of iOS devices have already utilised the hack.

The jailbreaking method, which simply requires a user visit a website and press a button, is aimed at jaibreaking iOS devices running version 4.3.3, as well as being the first jailbreak available for Apple's iPad 2.

With experts warning that the same method Comex uses could also be used in a malicious context, it was only a matter of time until Apple looked to plug the PDF exploit that the jailbreak relies on....

JailbreakMe 3.0 FAQ

JailbreakMe 3.0 recently went live for all iDevices on iOS 4.3.3, and Comex's PDF exploit is the first to successfully jailbreak the iPad 2.

Although the process of jailbreaking with JailbreakMe is incredibly easy, many of you probably still have questions concerning the userland jailbreak. The iPhone Dev Team has put together a helpful FAQ outlining the details behind JailbreakMe 3.0...

JailbreakMe 3.0 to Drop Today or Tomorrow?

It's been a seemingly endless saga as Comex prepares his upcoming jailbreak tool for the iPad 2. JailbreakMe 3.0 has been expected to drop any day now for the past few weeks, but several speed bumps and unexpected turns have kept the userland jailbreak from getting released.

This past weekend, JailbreakMe 3.0's exploit was leaked online in an attempt to hurry up Comex's official release. Some people were able to get to the download links in time (before they were pulled) and successfully jailbreak the iPad 2 on iOS 4.3.

Thanks to a string of alleged emails between Comex and MultiMediaWill (the guy that leaked JailbreakMe 3.0), the latest rumor pegs JailbreakMe's relaunch for tomorrow...

Chinese Woman Offers her Virginity in Exchange for an iPhone 4

It's no secret that young adults are taking extreme measures to get their hands on Apple products. It wasn't long ago that the story of the kid who sold one of his kidneys to buy an iPad 2 made its way around the internet.

Offering an organ for an Apple product seems pretty drastic, until you hear what this next girl is offering. The Korea Herald is reporting that a young Chinese woman has posted an "ad" offering to trade her virginity for an iPhone 4...

iOS 5 Jailbreak Could Be the End of Pirated Apps

Stefan Esser, better known as i0n1c, is a prominent member of the jailbreak community. His untethered exploit was responsible for the jailbreak that lasted from iOS 4 to 4.3.3, and he has been contributing to the Dev Team for quite some time.

i0n1c's untethered jailbreak may have been killed in iOS 5, but he's got a new and very controversial idea for another iOS 5 jailbreak in the future: blocking access to pirated apps.

New PDF Exploit Uncovered By Comex in iOS, Return of JailbreakMe?

We're calling it, folks: famed jailbreak hacker, Comex, has uncovered another PDF exploit in iOS that will allow for a userland jailbreak, ala JailbreakMe.

This is based off the above teaser image, which Comex just announced on his Twitter and is available for viewing on jailbreakme.com. If our detective work is correct, we expect a new, untethered, userland jailbreak for iOS.

Untethered Jailbreak Not Fixed in iOS 4.3.3

Some good news for jailbreakers coming from comex himself. Apparently, Apple hasn't fixed the exploit used by iPhone hacker i0n1c in his 4.3.2 jailbreak. What does that mean? Well it means that you might not be able to jailbreak and untether iOS 4.3.3 right now, but it's just a matter of time.

The Dev Team will most likely update PwnageTool and RedSn0w in the very near future, and provide us with stable and reliable jailbreaks. You can probably also expect iH8Sn0w to update Sn0wBreeze...

Reminder: Save Your SHSH Blobs for iOS 4.3.2

Earlier today, Apple released an FAQ to address the controversial location debacle. Apple acknowledged that there was a bug within iOS. When Location Services was turned off, the iPhone continued to updated WiFi and cell tower data from Apple's crowd-sourced database.

To address this issue, Apple announced that it would be releasing a software update within the next few weeks, most likely iOS 4.3.3. In addition to rectifying the location-tracking issues on iOS devices, Apple might also patch @i0n1c's untethered iOS 4.3.x jailbreak exploit, leaving you with a tethered jailbreak. 

Pwn2Own Safari Exploit Not Fixed in iOS 4.3.1, Could Mean Return of JailbreakMe

Charlie Miller, a security expert who managed to jailbreak iOS 4.3 during the Pwn2Own hacking contest, has revealed an interesting piece of information about 4.3.1. According to Mr. Miller, the Safari exploit uncovered at Pwn2Own is still un-patched in Apple's latest build of iOS.

An official jailbreak has yet to be released for 4.3.1, but the fact that this obvious exploit still exists points to the possibility of a jailbreak solution similar to JailbreakMe. There is no concrete evidence that this bug will be used in a jailbreak tool for iOS 4.3.1...

Comex’s iOS 4.3 Jailbreak uses a Userland Exploit

Last week we reported about Comex being the first to jailbreak iOS 4.3 on the iPad 2. Today we find out a bit more information about this iOS 4.3 jailbreak. In a reply to a tweet asking him what kind of exploit Comex had found in iOS 4.3, he said that he uses a userland exploit, meaning the jailbreak might be applied directly from the device, a la JailbreakMe.

Because a userland jailbreak can easily be patched via a software update, and with the rumors of iOS 4.3.1 coming in the next couple weeks, I doubt we will see Comex's jailbreak before then...