Musclenerd has announced that as predicted the iPad 2 is not susceptible to Limera1n.
iPad2 bootrom version iBoot-838.3 means it was compiled March'10. Seems geohot guessed right: limera1n was already closed
Also, it looks like Apple has blocked SHAtter as well.
Early testing also seems to show at least one thing SHAtter depends on was gone by March 2010 too :(
SHAtter can't work at all with the "thing" I referred to gone
For those hoping to jailbreak their new iPads this likely means that any early iPad 2 jailbreaks will have to be userland jailbreaks.
Spirit is the latest example of a userland jailbreak. While it is super easy for users, p0sixninja noted some of the disadvantages of this type of jailbreak.
"The only problem with this method of jailbreaking is it can be easily patched by Apple in the next firmware update. Also, since the exploit being used resides in userland, you're denied access to many of the low level hardware features, including the ability to decrypt firmware keys. iBoot exploits, on the other hand, are much lower level and offer much more freedom to interact directly with the system unrestricted."
I guess this is a bit of a win for Apple engineers...they fixed both holes long before either exploit was developed.
The hunt is on for the first workable exploit and we will let you know as soon as one is found!
Read More
iPad2 bootrom version iBoot-838.3 means it was compiled March'10. Seems geohot guessed right: limera1n was already closed
Also, it looks like Apple has blocked SHAtter as well.
Early testing also seems to show at least one thing SHAtter depends on was gone by March 2010 too :(
SHAtter can't work at all with the "thing" I referred to gone
For those hoping to jailbreak their new iPads this likely means that any early iPad 2 jailbreaks will have to be userland jailbreaks.
Spirit is the latest example of a userland jailbreak. While it is super easy for users, p0sixninja noted some of the disadvantages of this type of jailbreak.
"The only problem with this method of jailbreaking is it can be easily patched by Apple in the next firmware update. Also, since the exploit being used resides in userland, you're denied access to many of the low level hardware features, including the ability to decrypt firmware keys. iBoot exploits, on the other hand, are much lower level and offer much more freedom to interact directly with the system unrestricted."
I guess this is a bit of a win for Apple engineers...they fixed both holes long before either exploit was developed.
The hunt is on for the first workable exploit and we will let you know as soon as one is found!
Read More