Good news for all jailbreakers: i0n1c has just posted a video showing his new utility for untethered jailbreak of iOS 7.1.1. It is called Cyberelevat0r and according to its creator, to jailbreak iOS 7.1.1 it uses a recently discovered kernel bug. Nobody knows for sure if the hacker plans to release Cyberelevat0r to public or not. Anyway, let’s take a look at how it works.
The jailbreak, which has not yet been released, is unique in that it uses a kernel bug which is hidden inside functionality that can be easily reached, even from within the iOS application sandbox.
I honestly hope that i0n1c will release its untethered jailbreak of iOS 7.1.1. However, I don’t think that the release will take place before the release of Apple’s iOS 8. You see, the hackers need to make sure that the bug used for jailbreak remains unpatched.
Apple is expected to announce its iOS 8 at the annual Worldwide Developers Conference, which is set to take place in June. The jailbreak may be released after the conference.
A Chinese company reportedly paid evad3rs $1 million to install its third-party mobile application – Taig store. This app replaced Cydia on devices with default language set to Chinese. As to the hackers, they confirmed that they had received a kind of compensation from Taig. Take a look at the open letter posted on evad3rs’ officialwebsite:
Yes, we have benefitted financially from our work, just as many others in the jailbreak community have, including tweak developers, repo owners, etc. Any jailbreak from us will always be free to the users but we believe we have a right to be compensated in an ethical way, just as any other developer.
Well, I don’t think it’s strange that the creators of untethered jailbreak for iOS 7 accepted such an advantageous offer. They need money to continue their work on jailbreak. If they had no money, we wouldn’t have jailbroken iPhones, iPads and iPods. It’s simple.
One of the most interesting Samsung Galaxy S4’s features is probably Smart Pause. This is the feature that automatically pauses video playback each time you look away. For quite a long period of time those who use iPhones had to put up with the fact that there’s nothing similar for the iOS platform. And then FaceHalt was released.
iOS 7 has been jailbroken. Popular iOS developer Ryan Petrich has posted a screenshot which appears to show Activator running on iOS 7.
Earlier today Petrich tweeted saying, “System version too new?”. Alongside the tweet was the picture below. The picture shows the Springboard of an iPod touch with an Activator icon and a UIAlert window which reads:
System Version Too New
Activator has not been tested to work with this version of iOS. Some features may not work as designed.
Notably, this alert does not seem to be a UIAlert that could be generated from within a sandboxed application, suggesting that device may be jailbroken.
It’s unclear what expoit was used by Petrich. Last year Apple had closed comex’s developer account based exploit that had been used by hackers to root their iDevices for two years.
Hacker p0sixninja recently announced that he has “got a lot of amazing things coming to you all soon. think bigger than jailbreak ” It’s been suggested that he may have found a bootrom exploit.
The Evad3rs Dev-Team has launched an official website for the jailbreak of iOS 6.1, called ‘Evasi0n’.
The official evasi0n 6.1 jailbreak: http://evasi0n.com — Check regularly for updates! #evasi0n
The site currently indicates the following status:
68%: Applications for Windows and OS X are finished. Remains linux and some testing. Come back soon!
Next step: private beta testing
A progress bar indicates the team is more than half way done the jailbreak. According to the team new Evasi0n untethered jailbreak is compatible with all iPhone, iPod touch, iPad and iPad mini models running iOS 6.0 through iOS 6.1.
The new team of hackers consists of Pod2g, Planetbeing, MuscleNerd, and Pimskeks. Following the release of iOS 6.1, Planetbeing confirmed that their untethered jailbreak works with the firmware and MuscleNerd hinted that the jailbreak could be released on Sunday.
This week Gareth Wright reported that Facebook’s app for iOS has a security vulnerability through which malicious users can access login credentials saved in a .plist file of the app. With a copy of that .plist file malicious users could automatically log into the affected user’s Facebook account on another device. Reportedly, the vulnerability also exists on Android devices.
Wright describes several different ways in which your login credentials could be obtained by a malicious user, including hidden applications installed on shared PCs, customized apps, or modified speaker dock that could copy your plist.
According to Facebook, the issue only affects jailbroken or lost devices, as it requires physical access or installation of a custom app on the device. But Wright and The Next Web pointed out that simply plugging into any device would be sufficient for malicious users to gather these files.
The Next Web has confirmed that Dropbox for iOS is also vulnerable to this issue. Given that two such high-profile apps as Facebook and Dropbox are vulnerable to credential theft, it is likely that other apps are also affected by the issue.
As many reports note, this method of gathering login credentials is not actively utilized in a malicious manner, and users can protect their data for the time being by not plugging their devices into shared computers and charging stations.
Semi-tethered jailbreak is already available for some devices for both iOS 5 and iOS 5.0.1. But we all want untethered jailbreak and we want jailbreak for iPad 2 and iPhone 4S. So why not help hackers to find new exploits and vulnerabilities?
The Chronic Dev-Team has a released a tool to collect crash reports from iOS devices in order to find vulnerabilities that could lead to an untethered jailbreak.
The idea is very simple. When your iPhone, iPad or iPod Touch crashes it sends data to Apple (you can turn it this off though). Apple uses these reports to update iOS in the future. By the way, it also uses them to fix exploits found by jailbreakers. P0sixninja says that Apple closed several exploits they have found in IOS 5 beta before the final version of the software was released.
In order to find more vulnerabilities as fast as possible, the team has developed a tool which will copy the crash reports from your device and analyze them to locate potential exploits. The tool will also remove the crash reports from your device and modify your iTunes installation to prevent uploading of that diagnostic information to Apple.