Skip to main content

Apple device Now jailbroken for life

Devices with Apple A5x processors can now be jailbroken for life. This is the position that the popular hacker iH8sn0w have made us see in one of the tweets he posted.



In the words of iH8sn0w 
"So looks like all my A5(X) devices are fully untethered and jailbroken for life now.
A5 AES Keys anyone? 4S 7.0.4 iBSS -iv 3a0fc879691a5a359973792bcd367277 -k 371e3aea9121d90b8106228bf2b5ee4c638a0b4837fefbd87a3c0aca646e5996
All A5(X) AES Keys will be posted on @icj_’s icj.me/ios/keys as soon as I clean this up a bit more :)"

Not many people understand what that means. Basically, What it means is that no matter what iOS version you are running on your A5x device, it will always be jailbreakable just like how iPhone 4 (A4 devices) can be jailbroken tethered on any iOS version. 

Now the exploit found by iH8sn0w is a iBoot exploit (Not bootrom exploit) which is not in a complete state yet. However, when it does become complete those that have an iPhone 4S, iPad 2 & 3, iPad mini and iPod touch 5 will able to untether jailbreak their devices whenever a new iOS device is released.

While this is a kinda good news, it's not so much knowing that these devices with the A5x processors will become obsolete soon enough perhaps with only iOS 8 to be supported on them. 

Furthermore, because the exploit is an iBoot exploit, it can easily be patched by Apple in subsequent iOS firmware.  

Jay Freeman (Saurik) puts it this way

For informational purposes (as many people reading might not appreciate the difference), to get the encryption keys you only need an "iBoot exploit", not a "bootrom exploit". It is easier to find iBoot exploits (being later in the boot sequence, it has a larger attack surface: it has to be able to parse filesystems, for example), and they do afford more power over the device than an untethered userland exploit (in addition to letting you derive firmware encryption keys, you can boot custom kernels, and you might be able to dump the bootrom itself), but they are software updatable as part of new firmware releases from Apple and may have "insane setup requirements" (like, you might pretty much need an already-jailbroken device to actually setup the exploit). You thereby wouldn’t see an iBoot exploit used for a jailbreak (unless everyone is out of ideas for a very long time): instead, you’d see it hoarded away as a "secret weapon" used by jailbreakers to derive these encryption keys, making it easier to find and implement exploits on newer firmware updates for the same device (especially kernel exploits, where even if you have an arbitrary write vulnerability you are "flying blind" and thinking "ok, now where should I write? I can’t see anything… :’(").

Actually, it's a little too soon to say how this exploit will develop into something really big if it will ever be, but we shall keep close eyes on this to see how things finally turn out in the future for the jailbreak community. 

Until then, stay close to this blog and like our Facebook page and follow us Twitter for more smartphone news. 

Comments

Popular posts from this blog

Tecno M3 Specifications and Features

Tecno is making the news again after a slight break. This time around Tecno have released a low-end smartphone called Tecno M3 for those that are on a tight budget.  This phone comes with 8GB internal memory card, USB adapter & charger, earphone and a plastic case. Although Tecno L3 and D3 are almost the same with M3, M3 has a better camera (5mp) with more swift feel especially when browsing. L3 on the other hand has a better battery performance but much slower internet speed. As we said in one of our posts, the 3 is a designation for low-end devices and the newly released L3 and M3 is proof of that. For a device of the price, feel and usage is smooth enough. Make sure you check the speaker of your M3 since some have reported that its not too clear. Below is the specifications of the M3 low-end smartphone. Network : the new M3 supports both 2G and 3G networks Connectivity : Bluetooth 3.0 with Advanced Audio Distribution Profile (A2DP). It also has

How To Root Tecno Phantom A (Tecno F7)

There are no limit to the possibilities one can achieve on a rooted Android device compared to one that isn't rooted. As you know, Rooting is to Androin as Jailbreak is to iOS. For those that don't know what rooting means, a little definition will suffice. Rooting basically means that you install a set of programs on your phone that gives you total control over your device. Total control means that you have the right to install any applications or even delete core applications that you don't want.  Simply put, you have administrative rights over your device, giving  you super user access, and of course, you can use DroidVPN to have free unlimited internet. The guide below shows how you can root Tecno Phantom A also known as Tecno F7 and its super easy to achieve. Don't forget to like us on Facebook. Requirements 1. Computer with internet connection 2. PdaNet+ V4.12 zipped file 3. eroot_v1.3.3 zipped file 4. USB to connect your device to the

How To Unbrick Tecno F7 Smartphone

About a week ago, a friend rooted his Tecno Phantom A smartphone. He was so excited about the endless possibilities to customize his device so he kept installing a lot of applications that caught his attention unaware of the dangers some apps can create on rooted smartphones. Finally, he installed an application called Font Changer Lite and that was when it all happened. After installing this app, his phone attempted to reboot and instead of booting normally, the phone froze at the Tecno logo. It wasn’t going passed that state. He couldn’t boot into his phone. Practically, his phone was bricked and had to look for a way to unbrick and use his phone again. If you are presently in the same limbo state as described, please follow the instructions below step by step to fix your device. I recommend reading through first before actually starting the process. Kudos to Seunpayne of Nairaland for uploading his files for download and also giving instructions on the usage.