Research | Jailbreak iPhone, iPod Touch, iPad Skip to content

Jailbreak iPhone, iPod Touch, iPad

новости про джейлбрейк iPhone, iPod Touch и iPad


Tag: research

According to the latest rumors, both Evasi0n and Pangu jailbreak utilities have been recently nominated for 2014 Pwnie Awards. This award is presented to those developers and security researchers, who find bugs or important exploits in the software. This year’s award will be given to a developer (or the developers) that made some important discoveries in the period of the past twelve months.

jailbreak award 500x203 Evasi0n and Pangu Jailbreak Utilities Are Nominated for 2014 Pwnie Awards

Both the Evasi0n and Pangu jailbreaks for iOS 7 have been nominated for 2014 Pwnie awards. The Pwnie Awards celebrate the achievements of security researchers and developers who find certain bugs and exploits. The awards cover bugs disclosed over the last year (July 2013 – June 2014).

Last year the Pwnie Award was given to a developer nicknamed Planetbeing. It is very difficult to predict whom judges will choose this year as both Evasi0n and Pangu tools for jailbreak are worth winning the award.

If to speak about me, I would probably choose Evasi0n as the people behind this product were using their own exploits and methods for jailbreaking iOS 7, unlike the authors of Pangu.

[via iClarified]

You’ve probably heard about the iOS 7.1.1 jailbreak developed by i0n1c and Winocm. As it turns out, there’s another jailbreak. It was developed by the researchers Yeongjin Jang and Tielei Wang.

another ios7.1.1 jailbreak Another iOS 7.1.1 Jailbreak [Video]

The jailbreak seems to be legit, however, there’s no official confirmation from trustworthy sources.

Here’s what iClarified writes about the new jailbreak:

Researchers Yeongjin Jang and Tielei Wang of the Georgia Tech Information Security Center (GTISC) disclosed that they jailbroke iOS 7.1.1 late last month. Jang (@blue9057), a grad student at Gatech, has posted a video to YouTube demonstrating the jailbreak.


The authors of the jailbreak promise to tell how it works in August. It would be interesting to see how it differs from those jailbreaks developed by i0n1c or Winocm. Anyway, we’ll get such an opportunity only in a couple of months. Let’s wait.

Good news for all jailbreakers -- iOS 7.1.1 has been jailbroken. According to the image shared by famous security researcher Stefan Esser aka i0n1c, the devices running iOS 7.1.1 can be successfully hacked.

ios 7.1.1 jailbroken 300x400 iOS 7.1.1 Successfully Jailbroken   Photo, Video

What we can see on the image is an iPhone 5c running Cydia 1.1.9. Here’s what the hacker says about the jailbreak (via iClarified):

That iOS 7.1.1 jailbreak is not based on a long vulnerability chain. It uses a single beautiful kernel bug that goes from mobile to kernel.

A couple of minutes after i0n1c, another hacker -- Winocm -- posted a video of a jailbroken iPhone 4 running iOS 7.1.1. You can take a look at the clip below.


The hacker claims that this jailbreak will work on other devices if ‘you put in the effort’.

I don’t know if the jailbreak for iOS 7.1.1 will become public or not. Anyway, let’s hope for the best.

Earlier this week it was reported that iOS 7 doesn’t encrypt email attachments, though it should. The only possible way out was not to detach important or confidential files to emails, but fortunately, another one appeared on Wednesday.

email encryption tweak 392x400 Attachment Encryptor: Fix for Email Encryption Issue

A developer named Ryan Petrich released a new jailbreak tweak that helps to fix the email encryption issue. This tweak is called ‘Attachment Encryptor’.

Here’s what iDownloadBlog reporters write about Petrich’s creation:

Prominent jailbreak developer Ryan Petrich released ‘Attachment Encryptor’ this evening, a tweak that patches the aforementioned bug. All you have to do is install it and respring your iPhone or iPad.

The tweak is available for free via Petrich’s beta repo. You can add it by entering ‘Manage’ tab in Cydia and hitting Sources and Add sections. After you select the last menu, you need to enter That’s all.

I honestly hope that Apple will fix the issue in the next iOS version.

Stefan Esser aka i0n1c, a security researcher and a person behind the untethered jailbreak for iOS 4.3.2, says someone close to evad3rs may have stolen a jailbreak exploit and sold it to an unknown private buyer.

jailbreak 500x189 Someone has Stolen Jailbreak Exploit from Evad3rs   Rumor

As to the members of the evad3rs team, they deny such a theft. Moreover, they note that “the jailbreak stuff is moving on, but slowly.” That means that we won’t see it until 2014.

According to iClarified,

Even if the a jailbreak was stolen from the evad3rs and sold to a private buyer, it’s unlikely that the buyer would be looking to share it with Apple. However, if a jailbroken device is found in the wild, Apple could examine it to close the vulnerabilities for future firmware versions.

Let’s hope nobody has stolen the jailbreak exploit.

a5 jail 1 Saurik makes contribution towards iPad 2 and iPhone 4S untethered jailbreak

It looks like iPad 2 and iPhone 4S untethered jailbreak will truly be a team effort. Recently another hacker Saurik joined the team and made “some major contributions” yesterday.

Last week Pod2g announced that Planetbeing, MuscleNerd, and P0sixninja joined his effort to release an untethered iOS 5.0.1 jailbreak of the iPhone 4S and iPad 2 (A5 CPU devices).

Today, MuscleNerd noted that the team has received some major contributions from saurik:

props to @saurik for major contributions to the A5 version of @pod2g’s untether yesterday! (still no ETA, but moving forward)

Pod2g also thanked planetbeing for his help in escaping from the sandbox.

And greetings to @planetbeing for the coding + research. Really great stuff to escape from the sandbox.

Good news, that means that there is progress and we might see utility sometime this month.

a5 jail 2 Saurik makes contribution towards iPad 2 and iPhone 4S untethered jailbreak

Pod2g has also addressed the request that the untethered jailbreak be released to developers. He previously revealed that there is a working jailbreak that requires a developer account.

Sorry, we can’t release the A5 for the developers, the exploit used have to be kept secret. I know this is unfair.

pwned Dream Team will work on untethered iPad 2 and iPhone 4S jailbreak

Pod2g has recently announced that Planetbeing, MuscleNerd, and P0sixninja have joined his effort to release an iOS 5.0.1 untethered jailbreak for the iPhone 4S and iPad 2.

@planetbeing, the legendary hacker behind iPhone Linux and lot of jailbreaks has joined the A5 research! The famous @MuscleNerd, the leader of the iPhone Dev Team, who did a lot of tests for Corona and whom integrated it and made it simple in redsn0w is willing to help also. And last, but not least @p0sixninja, the leader of the Chronic Dev Team, and my partner for years on iPhone security research has started to code and fuzz the Apple sandbox.

That means that we now have a dream team to create a public release of the A5 jailbreak.

Several day ago pod2g posted information why the A5 jailbreak had not been released yet. The key reason being that the exploit used for A4 devices (called limera1n) doesn’t work on A5 devices. The untethered iPhone 4S and iPad 2 jailbreak that we have seen on videos and photos was created relying on having a developer account.

We are sure that planetbeing, MuscleNerd, p0sixninja and pod2g is just a great team. Hopefully they will find necessary exploit and implement it fast, because Apple might release 5.0.2 or 5.1 and fix untathered.

Chronic Dev Team is almost done with a much anticipated untethered jailbreak for iOS 5 and iOS 5.0.1. Team member and French hacker pod2g just released a video showing off the jailbreak. It looks to be near-complete and functioning properly. Take a look:

pod2g even created a blog, where he plans to post the most recent news about his progress:

Today I succeed in jailbreaking my iPod 3G. The exploit is user-land, rely on a user ROP payload and a kernel write anywhere exploit.

I can’t give much details right now, but here are the next steps :
- upgrade the iPod 3G to iOS 5.0.1
- do the same on iPhone 4 / iOS 5.0.1
- then iPad 1 & iPod 4G

At every step, the exploit code needs certainly to be reworked, but I really don’t know right now. Next, I’ll return to the research for iPad 2 and iPhone 4S. I don’t know if I gonna release first for other devices or not. I’ve to think about it. Feel free to give your opinion.