Tweetovi

Blokirali ste korisnika/cu @xSpiralTeam

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @xSpiralTeam

  1. Prikvačeni tweet
    19. velj 2019.

    Official xSpiral Team members :

    Prikaži ovu nit
    Poništi
  2. 10. sij

    For people who do run this, please send of screenshots of the error. It should show up in Xcode like this (the image shown is an example, and is to show where to find the error) :

    Poništi
  3. 3. sij

    After a long hiatus, xSpiral is back in development for A12 devices.

    Poništi
  4. 28. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    10. pro 2019.

    So, I’m starting to have some extra time for coding, so here’s what’s going down : PwnedOS11 & are my main focus. I want to complete the jailbreaks I had promised. is next. I would love for xSpiral to have its own package manager.

    Prikaži ovu nit
    Poništi
  6. 26. stu 2019.
    Poništi
  7. proslijedio/la je Tweet
    1. stu 2019.

    In a few days I will be talking about checkm8 and checkra1n in Seoul at my talk “The One Weird Trick SecureROM Hates”.

    Poništi
  8. proslijedio/la je Tweet
    31. lis 2019.
    Poništi
  9. 20. lis 2019.

    There is just some extra things needed before the iOS 12 safari exploit gains code execution, but (a xSpiral member) & is working on it!

    Poništi
  10. 13. lis 2019.

    pwnedOS11 has been updated that fixes the go trigger and can execute the iOS 11 safari exploit! We just need qwertyoruiop’s iOS 12 safari exploit.

    Poništi
  11. 12. lis 2019.

    pwnedOS11 will go through a final “go” trigger change. This will allow checking the users iOS version and using the correct exploit, based on OSVersion.

    Poništi
  12. proslijedio/la je Tweet
    11. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    10. lis 2019.

    I'm discontinuing TNS11, that crap would probably take ages to modify and get working and I just don't have time. So, all iOS 11 Safari JB crap will be on this GitHub repo :

    Poništi
  14. 8. lis 2019.

    Some progress has been made on Totally-Not-Spyware11’s Patchfinder update for iOS 11. TNS11 still has a lot to be done before it is ready for release, but progress is being made. A12 though is now our main focus.

    Poništi
  15. proslijedio/la je Tweet
    7. lis 2019.

    Got some progress done on TNS11’s patchfinder fix, will finish it and commit to GitHub tomorrow.

    Poništi
  16. 6. lis 2019.

    We will also update Totally-Not-Spyware for iOS 11 devices. This however, will be after the release of xSpiral for A12 devices.

    Poništi
  17. 27. ruj 2019.

    Besides outside work from others, xSpiral has been progressing in figuring out what exactly is the main issue with pmap. We will let you know when we’ve found the root cause.

    Poništi
  18. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  19. 27. ruj 2019.

    Congratulations to for finding a BootROM exploit for A7-A11 devices, freeing them forever! This is amazing news, and shows the jailbreak community isn’t over yet.

    Poništi
  20. 22. ruj 2019.

    Congrats to the for the A12 iOS 12.4 support! amazing work!

    Poništi
  21. 19. ruj 2019.

    Tons of researching will have to be done before tfp0 for iOS 13 is taken into consideration. PAC was hardened, ultimately killing brute force bypass methods. We will focus on iOS 12 first though.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·