Untethered jailbreak pentru iOS 6.1.3 si iOS 6.1.4 va fi lansat cu intarziere deoarece exploit-urile descoperite pentru el sunt utilizabile in iOS 7

  Asteptati cu nerabdare lansarea solutiei de untethered jailbreak pentru iOS 6.1.3 si iOS 6.1.4 ? Daca raspunsul este afirmativ, atunci va anunt ca va trebui sa aveti si mai multa rabdare, deoarece hackerii care o dezvolta au facut o descoperire foarte interesanta. Exploit-urile utilizate de catre ei pentru a face jailbreak chip-ului A5 sunt utilizabile si in iOS 7, asa ca au decis sa le pastreze secrete pentru a nu oferi companiei Apple posibilitatea de a le bloca si a impiedica lansarea unei solutii de jailbreak pentru iOS 7.

  Luand aceasta decizie, hackerii se afla in momentul de fata in cautarea unor noi vulnerabilitati pe care sa le utilizeze pentru iOS 6.1.3 si iOS 6.1.4, insa desigur ca va fi nevoie de timp pentru descoperirea lor. Exista fara indoiala si o un scenariu in care aceasta solutie de jailbreak va fi lansata impreuna cu cea pentru iOS 7, ele folosind acelasi tip de exploit-uri pentru a face jailbreak-ul, insa in aceasta situatie, oare va mai utiliza cineva iOS 6.x daca nu este fortat in vreun fel sa o faca?

  In concluzie, asteptarea tocmai s-a prelungit si nimeni nu stie exact pana cand, dar partea buna este ca vom avea sigur jailbreak pentru iOS 7.

People are probably wondering why focus on A5+ devices is being lowered in priority. This is not because of difficulties, it is actually because it turns out a few of the vulns we were planning on using still work on iOS 7 (kind of exciting [yes and no]). We do not want to publish these vulns as they have the potential of being used in a future iOS 7.x A5+ jailbreak. With that being said, we are not removing our focus on an A5+ 6.1.3/6.1.4 jailbreak completely. We are looking for some vulns that exist in 6.1.3/6.1.4 but not iOS 7. The problem is… in terms of security iOS 7 looks likes an iOS 6.2 :P. This wouldn’t be a problem if Apple did not silently kill the lockdown socket bug. We were initially planning on using that vuln to recycle the shebang attack used in evasi0n to remount the rootfs, but when I found out it was patched, I initially said it wouldn’t halt the progress of the jb. This was before we found out the other vuln we had to get root and remount the rootfs as r/w still works in iOS 7. So as I said above, we are currently working on getting the A4 untether bootstrap finished. After that, we will resume looking into the A5+ possibility. If worse comes to worse, we’ll release it alongside evad3r’s iOS 7 jb to prevent disclosing any more vulns.