Security

Hacker iBSparkes achieves tfp0 on A13 with iOS 13.3

The jailbreak community has been on fire these past few months, with checkra1n delivering an un-patchable jailbreak experience for handsets ranging from the iPhone 5s to the iPhone X, and with unc0ver picking up support for iOS 12.4.1. But hey, why let the pwnage stop there?

Renowned hacker and iOS security researcher iBSparkes broke the silence this weekend after sharing a teaser of what appears to be successful tfp0 on a brand-new A13 device running iOS 13.3. Yes indeed folks, that’s both Apple’s latest hardware and software – pwned in one fell swoop. Not too shabby!

Apple offers up to $1.5 million payout for security exploits

Apple has announced the expansion of the scope and the payouts of its security bounty program. After first making the program invite-only, it now encourages all security researchers to participate. What's more, researchers that discover heretofore unknown exploits in Apple operating systems and services can earn up to $1.5 million, a huge bump from the previous $200,000 cap.

Apple explains iPhone 11 location requests

iPhone photo with geolocation

Earlier this week researcher Brian Krebs asked why the iPhone 11 Pro appears to be pinging location data even when Location Services are disabled in the iPhone's settings. After a few days of head scratching, Apple has responded, citing regulatory necessity because of the technology involved.

Apple halts downgrades from iOS 13.2.3 by unsigning iOS 13.2.2

Apple systematically stops signing older mobile software releases as newer ones become available. Given the company’s track record in this regard, it should come as no surprise to anyone familiar with the matter that Apple has stopped signing iOS 13.2.2 Monday evening, a move that effectively averts firmware downgrades from the newer iOS 13.2.3 that Apple released approximately two weeks ago with miscellaneous bug fixes.

There are two primary reasons why someone would want to downgrade their firmware in the first place, with the first being to revert back to an older version of iOS after a new release breaks functionality or introduces unwanted bugs, and the second being to restore the device to a jailbreakable firmware after a software update patches the necessary exploits used by a tool.

New tfp0 POC encompasses iOS 12.4.1 & 12.4.2 on ‘all iOS devices since A12’

Matrix code hacked iPhone.

Good news for jailbreak hopefuls who aren’t presently able to take advantage of the brand-new checkra1n tool due to having too new of a device: there’s a new tfp0 proof-of-concept in town.

Citing a blog post first shared by Twitter user @ZecOps this Thanksgiving, the new tfp0 POC affects iOS 12.4.1 and 12.4.2, and this potentially opens the door for existing semi-untethered jailbreaks like Chimera and unc0ver to implement support for two new versions of iOS on all iOS devices since the A12(X) variety:

How to set up Twitter two-factor authentication

Twitter two-factor authentication

It is highly recommended you enable two-factor authentication (2FA) to secure your Twitter account and prevent anyone from getting access to it. This extra level of protection will ensure any intruder can't log in to your Twitter account even if they happen to know your password!

2FA requires you to enter your correct password (which is something you know) and then verify using a secondary means of proving your identity with something you have, like a changing code from the authenticator app.

Follow along as we show you how to set up Twitter two-factor authentication without using your phone number.