Security

Curb privacy paranoia when lending your iPhone to someone else with Spy

When you’re generous enough to loan your iPhone to a friend or family member, or even worse a complete stranger to make a phone call, one thing that probably weighs heavy on your mind is whether that person is invading your privacy by launching apps they shouldn’t be, such as Messages, Notes, or Photos to name a few.

I’ve found myself in this situation quite a few times myself, and that’s why I’m particularly excited about a newly released jailbreak tweak dubbed Spy by iOS developer Elias. This tweak works to your advantage in situations like the one above by logging the apps that a user opens with the mere flip of a toggle switch.

Ra1nbox is a NanoPi Neo2-powered box that can deploy checkra1n without a computer

The checkra1n jailbreak is driven by a powerful bootrom exploit that can’t be patched with a software update from Apple, and with that in mind, it’s easy to see why some people may opt to use checkra1n over some of the other jailbreaks available, such as unc0ver for example.

While it’s a great jailbreak, Windows users have relentlessly expressed dissatisfaction about having to borrow friends’ Macs or run Linux on their machines. With no certain ETA for a Windows-based checkra1n release, third parties are now cooking up interesting solutions. One is Ra1nbox, a small and portable box powered by a NanoPi Neo2 that can be used to deploy the checkra1n jailbreak from anywhere without the need for a computer.

Luca Todesco teases checkra1n hacks on a T2-equipped MacBook Pro’s Touch Bar

The checkra1n team is best known for its checkm8 bootrom exploit-based jailbreak tool for A9-A11 devices. But those closely following outspoken members of the team on Twitter, namely Luca Todesco (@qwertyoruiopz), likely took note of some particularly interesting teasers Tweeted Tuesday morning and afternoon.

A series of images shared by Todesco himself appear to depict checkra1n-centric hacks being deployed and displayed on a MacBook Pro’s OLED Touch Bar:

Jake James rewrites oob_timestamp exploit as Pwn20wnd plans integration with unc0ver

Those who’ve been keeping close tabs on the jailbreak community as of late should be keenly aware of Brandon Azad’s oob_timestamp exploit, which made iOS 13.0-13.3 support for A12(X)-A13 devices via the unc0ver jailbreak possible. As wonderful as it is, the oob_timestamp exploit isn’t without its shortcomings, such as memory leaks.

Given the aforementioned circumstances, a series of Tweets shared early this morning by renowned hacker Jake James may be considered great news for the jailbreak community: