2/ What I am releasing today is not a full jailbreak with Cydia, just an exploit. Researchers and developers can use it to dump SecureROM, decrypt keybags with AES engine, and demote the device to enable JTAG. You still need additional hardware and software to use JTAG.
-
-
Prikaži ovu nit
-
3/ Maybe someone can figure out a nice way to use JTAG on iPhone without proprietary hardware and software. I and many others would be forever grateful if someone makes that possible.
Prikaži ovu nit -
4/ Exploit released today supports s5l8947x, s5l8950x, s5l8955x, s5l8960x, t8002, t8004, t8010, t8011, t8015. Others will be added soon. It is not perfectly reliable yet; it uses a race condition and I only tested it on my MacBook Pro.
Prikaži ovu nit -
5/ During iOS 12 betas in summer 2018, Apple patched a critical use-after-free vulnerability in iBoot USB code. This vulnerability can only be triggered over USB and requires physical access. It cannot be exploited remotely. I am sure many researchers have seen that patch.
Prikaži ovu nit -
6/ That's how I discovered it. It is likely at least a couple other researchers were able to exploit this vulnerability after discovering the patch. The patch is easy to find, but the vulnerability is not trivial to exploit on most devices.
Prikaži ovu nit -
7/ A bootrom exploit for older devices makes iOS better for everyone. Jailbreakers and tweak developers will be able to jailbreak their phones on latest version, and they will not need to stay on older iOS versions waiting for a jailbreak. They will be safer.
Prikaži ovu nit -
8/ It will also be better for security researchers interested in Apple's Bug Bounty. They will not need to keep vulnerabilities on hand so that they have access they need for their research. More vulnerabilities might get reported to Apple right away.
Prikaži ovu nit -
9/ Needless to say, jailbreaking is not dead. Not anymore. Not today, not tomorrow, not anytime in the next few years. What a time to be alive. It is a tethered bootrom exploit, but it should be possible to make a cable or a dongle that jailbreaks your device without a computer.
Prikaži ovu nit -
10/ What
@nervoir mentioned could be implemented, but I think everyone is better off if this is not possible. If Apple has hardware support for this today, I believe they are much better off not using it now. I think doing that would open a can of worms.https://twitter.com/nervoir/status/1178539015508811778 …Prikaži ovu nit -
11/ Apple's devices can be trusted because SecureROM cannot be modified and Apple's private key is kept safe by Apple. If one-off modification was possible, whether remotely or otherwise, there would be no way to know if anyone was abusing it or if someone found a way to hack it.
Prikaži ovu nit -
12/ It would be a hardware backdoor. Can you imagine all the court orders Apple would get for its use if it was revealed that they can modify devices in this way? No one could be certain if their device was modified or not. I definitely would feel less safe using an iPhone.
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.