For everyone wondering about my recent iBoot bug, I’m working on a writeup right now. Stay tuned.
-
-
-
-
-
The best way I could describe these exploits are checkm8 mixed with untethered kernel exploits. Like checkm8, it can do a lot of stuff like boot custom iOSes or jb. Although it’s patchable by apple in an update much like a kernel exploit. And yea iBoot exploits are untethered.
4 replies 4 retweets 14 likes -
Replying to @ThermalDOE @urielopp and
So pros - untethered and can load custom bootchain (allows for 32 bit untethered downgrades) Cons - patchable by apple in an iOS update, so your device model doesn’t dictate if it works
3 replies 2 retweets 8 likes -
Replying to @ThermalDOE @urielopp and
iBoot does not mean untethered! Just like BootROM does not mean tethered, it all depends on the type of bug.
1 reply 0 retweets 3 likes -
Replying to @opa334dev @urielopp and
You can’t write to read only memory So it’s always tethered
1 reply 0 retweets 0 likes -
Replying to @ThermalDOE @urielopp and
Has nothing to do with that, you can't overwrite iBoot either, that would cause signature checks to fail and cause a bootloop.
1 reply 0 retweets 1 like
Yea So you have nvram set to load an exploit partition and exploit the iBoot
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.