Blutrol is a recently released jailbreak app that allows you to map your iCade control cabinent to pretty much any game that features on screen controls. That means that the iCade is no longer limited to a handful of so-so games, which makes the device a lot more useful and appealing to gamers.
Basically, Blutrol transforms your iCade from a mere conversation piece, into a legitimate gaming machine. All you need is a jailbroken iPad, and you’re good to go…
Are you growing tired of waiting for an iOS 5 jailbreak? Do you wish you could go back to the good old days of iOS 4.3.3, when jailbreaking was simple? If you answered yes to either one of those questions, you might be interested in TinyCFW.
TinyCFW is a new downgrading tool by TinyUmbrella-creator NotCom. Using your saved SHSH blobs, you can use TinyCFW to downgrade your iPhone 4 or iPad 2 to iOS 4.3.3 so you can go back to having an untethered jailbreak.
How do you plan on preparing for the next iPhone? Whether it’s the iPhone 5, or the iPhone 4S, a lot of folks have different gameplans when it comes to acquiring the next iPhone.
What will you do with your current iPhone? Will you downgrade the firmware, jailbreak and unlock it, and try to pull in a premium? Or will you do like me, and keep your old iPhone and use it as a testing device?
These, and many, many more questions are answered in this week’s episode of Ask Jeff…
If you’re the type of person who likes to sell your current iPhone and use the funds to upgrade to the latest and greatest iPhone, then you’ve been there before. Restoring your iPhone to stock, and cleaning it up, is essential if you want to ensure you get top dollar for your device.
Thankfully, Cody already covered quite a few bases in his article, here. But what if you’re still having issues downgrading your iPhone, or getting it back to stock after jailbreaking? I know a lot of you have personally told me about your struggles with the iPhone’s dreaded recovery loop.
If you’re having issues downgrading your iPhone back to iOS 4.3.3, issues with iTunes Error (1), and/or you’re stuck in the recovery loop, and can’t get out, this video tutorial should fix what ails you…
If you may recall, with the release of the long awaited JailbreakMe 3.0 for iOS 4.3.3, literally 10 days later Apple patched the clever PDF exploit in iOS 4.3.4. The security exploit could be triggered by viewing a maliciously crafted PDF file which may lead to an unexpected application termination or arbitrary code execution.
While the main reason Apple patched the exploit was to stop the use of JailbreakMe, it can also be a security concern. A few days later, Apple released another iOS software update, iOS 4.3.5. Apple released this update to patch the certificate validation vulnerability.
If you love customizing your iDevice to the fullest, you’ve probably already jailbroken, unless you didn’t update by accident or purchase your iDevice after Apple stopped signing iOS 4.3.3. Unfortunately, while not updating to the latest software may preserve your jailbreak, you may also be at risk from the same vulnerability…
Apple will no longer allow users to update or restore an iOS device to iOS 4.3.3. The signing window for 4.3.3 has been closed, meaning that you can no longer restore a device to 4.3.3 in iTunes without previously saved SHSH blobs from that firmware.
This news is important for jailbreakers that are either considering using JailbreakMe on iOS 4.3.3, or those that may have possibly upgraded to an iOS 5 beta without saving their blobs. The recently released iOS 4.3.4 kills the untethered jailbreak that was previously offered in iOS 4.3.x, so 4.3.3 is the most up to date firmware that offers an untethered jailbreak.
Apple has begun to step up its game with patching jailbreak exploits in iOS. When Comex’s PDF exploit was used in the latest version of JailbreakMe, Apple pushed out iOS 4.3.4 about two weeks later to combat the security hole.
Jailbreakers on 4.3.3 (4.2.9 for the Verizon iPhone) can stay on their current firmware to keep their untether, but the bad news is that Apple actually patched the untethered exploit that’s been used by jailbreakers since iOS 4.1.
The Dev Team has released an update to the jailbreak tool, RedSn0w, with support for a tethered jailbreak on iOS 4.3.4. Apple released 4.3.4 yesterday to combat the PDF vulnerability uncovered in the latest version of JailbreakMe.
JailbreakMe users are advised to stay with the untethered jailbreak that the web-based tool provides on iOS 4.3.3, and not upgrade to 4.3.4.
After weeks of anticipation, the long awaited JailbreakMe jailbreak by Comex is now out and available for everyone to use. As always, JailbreakMe is dead simple to use and doesn’t even require a tutorial but we’ll do it anyway for those that are new to jailbreaking and need to be reassured.
As noted before, JailbreakMe Saffron (its code name) will only be compatible with iOS 4.3 devices and newer, including the iPhone 3GS, iPhone 4, iPad 1, iPad 2, and iPod Touch. Support for older firmwares will come later.
In this guide, we will show you how to jailbreak your iPhone, iPad or iPod Touch using JailbreakMe…
It’s finally here, folks! Comex has released the highly anticipated JailbreakMe 3.0, code named Saffron. The web-based jailbreak works on all iDevices, including the iPad 2, on iOS 4.3.3, and iOS 4.3.3 only for the time being.
This userland jailbreak is super easy to perform straight on your iDevice, and Comex’s PDF exploit will give you an untethered jailbreak for the iPad 2 via Mobile Safari.
Comex just gave us all a heads up that the initial launch of JailbreakMe 3.0 will only support the latest version of iOS, 4.3.3. If your iDevice is currently jailbroken or hasn’t been updated past 4.3.1 or 4.3.2, you should go ahead and do that now.
It’s expected that Comex will unveil JailbreakMe 3.0 sometime today, and he has dropped initial support for older iOS firmware versions due to time constraints.
As we await the release of Comex’s JailbreakMe 3.0, a roundabout method has been uncovered for jailbreaking the iPad 2 on the latest version of iOS.
Comex’s jailbreak got briefly leaked online over the holiday weekend, and a hacker named Ryan Vanniekerk has put together a complex tutorial on how to use the JailbreakMe 3.0 files to set up your own web-based exploit for all iDevices running iOS 4.3.3 and below!