If you may recall, with the release of the long awaited JailbreakMe 3.0 for iOS 4.3.3, literally 10 days later Apple patched the clever PDF exploit in iOS 4.3.4. The security exploit could be triggered by viewing a maliciously crafted PDF file which may lead to an unexpected application termination or arbitrary code execution. While the main reason Apple patched the exploit was to stop the use of JailbreakMe, it can also be a security concern. A few days later, Apple released another iOS software update, iOS 4.3.5. Apple released this update to patch the certificate validation vulnerability. If you love customizing your iDevice to the fullest, you’ve probably already jailbroken, unless you didn’t update by accident or purchase your iDevice after Apple stopped signing iOS 4.3.3. Unfortunately, while not updating to the latest software may preserve your jailbreak, you may also be at risk from the same vulnerability…
The Gevey SIM supports an unlock for the iPhone 4 on Apple’s latest firmware, iOS 4.3.4. Apple recently pushed the 4.3.4 update to combat the exploit uncovered by the jailbreak tool, JailbreakMe, in iOS 4.3.3.
If you upgrade to iOS 4.3.4, you lose your untethered jailbreak. But the Gevey SIM still works…
Apple will no longer allow users to update or restore an iOS device to iOS 4.3.3. The signing window for 4.3.3 has been closed, meaning that you can no longer restore a device to 4.3.3 in iTunes without previously saved SHSH blobs from that firmware.
This news is important for jailbreakers that are either considering using JailbreakMe on iOS 4.3.3, or those that may have possibly upgraded to an iOS 5 beta without saving their blobs. The recently released iOS 4.3.4 kills the untethered jailbreak that was previously offered in iOS 4.3.x, so 4.3.3 is the most up to date firmware that offers an untethered jailbreak.
Apple has begun to step up its game with patching jailbreak exploits in iOS. When Comex’s PDF exploit was used in the latest version of JailbreakMe, Apple pushed out iOS 4.3.4 about two weeks later to combat the security hole.
Jailbreakers on 4.3.3 (4.2.9 for the Verizon iPhone) can stay on their current firmware to keep their untether, but the bad news is that Apple actually patched the untethered exploit that’s been used by jailbreakers since iOS 4.1.
A couple days after making TinyUmbrella compatible with iOS 5 Beta 3, and following the release of iOS 4.3.4, Notcom has updated his tool yet again, this time to allow you to save your iOS 4.3.4 SHSH blobs.
Because you’d better be safe than sorry, we highly suggest you download the latest version and save those blobs. In case you don’t know what we’re talking about here, feel free to peruse our SHSH guide, as well as our tutorial on how to save your SHSH blobs…
Apple released iOS 4.3.4 yesterday, and as always, the Dev Team was right on it and updated RedSn0w to version 0.9.8 beta 3, which is a tethered jailbreak for iOS 4.3.4 for all devices (except the iPad 2).
Those of you (all of us?) waiting for an untethered jailbreak for iOS 4.3.4 shouldn’t get their hopes too high. As iOS hacker i0n1c mentioned today on Twitter, there probably won’t be an iOS 4.3.4 untether anytime soon…
The Dev Team has released an update to the jailbreak tool, RedSn0w, with support for a tethered jailbreak on iOS 4.3.4. Apple released 4.3.4 yesterday to combat the PDF vulnerability uncovered in the latest version of JailbreakMe.
JailbreakMe users are advised to stay with the untethered jailbreak that the web-based tool provides on iOS 4.3.3, and not upgrade to 4.3.4.
Apple has released iOS 4.3.4 for the iPhone, iPod touch and iPad. This update is now available in iTunes and has been released to fix the PDF exploit uncovered and distributed by Comex in the latest addition of JailbreakMe.
iOS 4.3.4 can be applied to your iDevice by updating your software in iTunes.
After a long wait, Comex released JailbreakMe 3.0. And now a huge number of iOS devices have already utilised the hack.
The jailbreaking method, which simply requires a user visit a website and press a button, is aimed at jaibreaking iOS devices running version 4.3.3, as well as being the first jailbreak available for Apple’s iPad 2.
With experts warning that the same method Comex uses could also be used in a malicious context, it was only a matter of time until Apple looked to plug the PDF exploit that the jailbreak relies on….
iOS 4.3.4 is expected to be released soon because of the JailbreakMe 3.0 leak, and a lot of people are wondering if this will block the Gevey SIM from working. As we have posted previously, Apple has blocked the use of the Gevey SIM unlock in iOS 5 Beta 2.
This block also comes after Apple released an unlocked iPhone 4 in the U.S. for use on any carrier (mostly T-Mobile)…
The jailbreak scene has been extremely talkative since Comex’s iPad 2 jailbreak was leaked earlier today. Some folks jumped at the chance to install the beta version of the exploit, while others continue bashing the ones responsible for the leak.
It seems the individual(s) responsible for the leak claim they did so to encourage Comex to hurry up and release a final version. But it looks like all the leak did was create more work for the jailbreak community…