As reported recently on iDB, Luca Todesco has decided to solve the certification problems which have plagued the most recent Pangu release for 9.2-9.3.3, by making public a web-based tool for re-activating the jailbreak.
After doing some testing and research it seemed appropriate for a more in-depth discussion of the tool, along with a walkthrough, in order to address some of the more technical questions surrounding this latest development in the jailbreaking scene.
The latest Pokémon GO update blocks jailbreakers from using the game in a move to crack down on third-party apps and tweaks that harvest data for Pokémon tracking and cheating.
Of course, not all jailbreakers cheat in Pokémon GO, so it’s a pretty harsh assumption on their part, so in this piece, we’ll discuss how you can run Pokémon GO on your jailbroken device even if you have the latest update.
Earlier this week, word got out that there’s a gap in security in iOS. Security researcher Andreas Kurtz discovered that all versions of iOS 7.1, and at least iOS 7.0.4, don’t encrypt email attachments.
Kurtz says that he has informed Apple of the bug, and they are working on a fix, but there’s no word when it will be available. Fortunately, the jailbreak community has a much faster response time…
Filippo Bigarella has released a new jailbreak tweak this weekend called GlyphPatch. The utility patches the recently exposed DoS exploit which targets Safari’s WebKit engine and causes apps to crash when rendering a malicious sequence of characters.
The bug, which was made public last week, affects users on both iOS and Mac and can be triggered through a few different surfaces: SMS, iMessage, the web, and network SSID. But jailbroken iOS users can protect themselves from it with this new tweak…
In case you didn’t know, satellite provider DirecTV recently updated its iPad app with the ability to stream live TV. Customers can stream a selection of channels on the iPad when connected to the same home network as the DirecTV HD DVR.
Like Time Warner, DirecTV has blocked streaming access to users on jailbroken iDevices. A jailbreak patch has been released to fix the block…
If you may recall, with the release of the long awaited JailbreakMe 3.0 for iOS 4.3.3, literally 10 days later Apple patched the clever PDF exploit in iOS 4.3.4. The security exploit could be triggered by viewing a maliciously crafted PDF file which may lead to an unexpected application termination or arbitrary code execution.
While the main reason Apple patched the exploit was to stop the use of JailbreakMe, it can also be a security concern. A few days later, Apple released another iOS software update, iOS 4.3.5. Apple released this update to patch the certificate validation vulnerability.
If you love customizing your iDevice to the fullest, you’ve probably already jailbroken, unless you didn’t update by accident or purchase your iDevice after Apple stopped signing iOS 4.3.3. Unfortunately, while not updating to the latest software may preserve your jailbreak, you may also be at risk from the same vulnerability…
JailbreakMe 3.0 has garnered some serious attention over the last 48 hours. The last report we heard was that the site had been visited over a million times, and the PDF exploit had been downloaded over 500,000 times.
The exploit must have also grabbed the attention of Germany’s Information Security team, because the group just issued a country-wide warning for all iOS products. The Mobile Safari vulnerability exposed by Comex in his new jailbreak tool has really made some folks nervous…
Now that you are finally able to hack Apple’s latest tablet with JailbreakMe 3.0, what’s your next move? For starters, you may want to consider closing that hole that Comex’s exploit used to break into your iDevice. Think about this:
JailbreakMe 3.0 is extremely easy to use. You simply navigate to a website on your iDevice, and within a few screen taps you’re jailbroken. But if Comex can design web software that can gain root-level access to your iDevice so easily, why couldn’t someone else?
When Apple announced iOS 5 a few weeks ago, there was some speculation that its hundreds of new features would deter a lot of folks from jailbreaking . In fact, iOS 5 was thought by some to be a jailbreak killer.
While it doesn’t look like the promise of new features has phased the jailbreak community, there are some things in iOS 5 that are troubling. The Dev Team recently posted a report on some things they are seeing in iOS 5 that are making them nervous…
In my previous post today I was telling you the Dev Team was working on a patch for the PDF exploit found in iOS and not fixed by Apple on older iPhones and iTouch. The PDF Patch has been released in Cydia for free and you can install it now.
PDF Patch will fix the security hole that was used by JailbreakMe and could potentially be used to inject malicious softwares on your device.
If you have updated your iDevice to 4.0.2, there is no point using this patch. However, if you’re still on an older iPhone 2G or iPod Touch 1G, or if you don’t want to update to 4.0.2, then this patch will be for you.