He also noted that all the A5(X) AES keys will be posted here shortly.
All A5(X) AES Keys will be posted on @icj_’s http://www.icj.me/ios/keys as soon as I clean this up a bit more :)
While the iBoot exploit is not as good as a bootrom exploit, iH8Sn0w notes that it is very powerful and will result in his A5(X) devices having an untethered jailbreak for life.
So looks like all my A5(X) devices are fully untethered and jailbroken for life now. :)
No. This isn’t a bootrom exploit. Still a very powerful iBoot exploit though (when exploited properly ;P /cc @winocm).
Update: It appears that this exploit may never go public, according to a tweet from winocm.
@iH8sn0w @livealex13 this one isn't ever going public. It's hell to use.
So why is this important? If kept private, this exploit can be used to help find other ones. We now have a 'secret weapon' that can be used to grab encryption keys and find new jailbreaks on newer firmwares and devices!
It seems like you guys are not understanding the meaning of this exploit! With this exploit that Apple can not close because it's hardware exploit and not software, will be able to upgrade A5(X) devices to any iOS that Apple will come out with and find software exploits for jail braking all devices.
if i'm not mistaken he jailbroke his iPhone 5 iOS 6 24 hours after the release but he never shared that jailbreak with nobody and teasing everybody about it for 6 month that he is the only person walking around with an iOS 6 jailbroken iDevice till the evasion team managed to creat their own jailbreak for iOS 6. just covering my a*ss i'm not absolutely sure if it's him or another hacker which i rather not say his name but the story is true.
Some people seem incapable of deciphering what is what. And unlock simply means "to unlock the phone from a particular CELLULAR provider and open it to any cellular provider". That is a world of difference from a jailbreak exploit that deals with thr entire OS of the device. Just because an iPhone is jailbroke DOES NOT mean it is unlocked. The two are entirely different.
Just buy an Apple unlock, do a search for IMEI unlocking, it used to be really cheap but since it become against the law in the U.S, the prices went up in Europe but still worth it because you'll never ever need to worry about unlocking that device again and if it's locked by AT$T then it's really cheap. "IMEI unlock is Apple factory unlocking so it's forever ". And it's all done over the net.
Because a load of people are still using WW1 devices, which includes me. If I remember correctly, there are more iPad 2s than any other, and that its sales success made it into the GBoWRs (during WW1). And A5 devices are still certified to handle everything the next gens are, maybe not so well, but can handle it still.
Actually, the AT3 isn't jailbreakable because of this iBoot exploint. The device needs to be jailbroken first o be able to utilize this (from what I've heard).
What Ive learned is there is no absolutes. There is no such thing as "unexploitable". So for hackers and developers, the claim of "permanent" jailbreak is merely an understanding rather than a set in stone concept. Its not that Apple cant eliminate such an exploit, it's that they would have to change the structure of the boot process, which is something that is generally a constant with little variable.
I guess I don't see the importance of this when these devices will plateau soon in terms of OS upgradability. If I can't upgrade beyond iOS 7.0.4 and it's already jailbroken, I'm essentially already jailbroken for life, right? Does Apple go back and patch old versions of iOS? No, right? And the average iPhone user will upgrade their device in 3-4 years, if not sooner, so you'll be back to square one then anyway...Still, short term benefits are good, I suppose.
The Devils >> Devil....!! - February 2, 2014 at 12:39am
so what ur saying is apple have no way, to access this hardcoded key, even though they designed and know every there is to know? if i designed something anything im sure i would know how to flush out what i don't want there! until i fully know how it works, i doubt everything i read or hear! unless its proven! plus tomorrow is another day who knows what comes next, these guys are at the top, and do what they like when they like!
Read this in a book i have and thought it might help explain in more detail.
"Vulnerabilities inside iBoot are nearly as powerful as vulnerabilities inside the bootrom when it comes to features they can provide. These vulnerabilities have the downside that iBoot is not baked into the hardware and therefore they can be fixed by a simple software upgrade.
Aside from this, iBoot is still early enough in the bootchain that boot arguments can be given to the kernel, the kernel can be patched, or the hardware can be used directly to perform GID key AES operations"
Its possible if it goes into the kernel (which more than likely does) and is inserted into the actual boot processes itself. Any code bootable code can be entered into the boot process, this is how Apple or any OS is able to load an OS in the first place
The Devils >> Devil....!! - February 1, 2014 at 8:57pm
Im Not Sure How Sure How This All Works, Surely Apple Could Patch It Once It Heard, A Jailbrake 4 Life To Me Is Only Possible With No Software Updates On The Device? I Don't See How a Jailbroken Device Could Exist With Software Updates For Life When No 1 Knows Which Way Apple Decide 's To Go? I Might Be Wrong! But I Guess No-One Really Knows?