|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Mark Forums Read |
iPhone 4 / iPhone 4S iPhone 4 / 4S |
| LinkBack | Thread Tools | Display Modes |
11-27-2011, 10:16 | #1 (permalink) |
Banned Join Date: May 2003 Location: Heavens
Posts: 6,267
Member: 30124 Status: Offline Sonork: 100.1590000 Thanks Meter: 7,900 | Help Chronic Dev-Team to Find Jailbreak Vulnerability for U-Jailbreak Ios5[Win+Mac] Help the Chronic Dev-Team Find a Jailbreak Vulnerability Using Their New Tool Greetings, friends & jailbreakers! It has now been several months since I (posixninja) took the stage at JailbreakCon (fka MyGreatFest) in London. Since then, I & other members of the Chronic Dev team have been keeping quietly busy on many fronts, so I thought it was about time to give you all a brief update. First & foremost: during my JailbreakCon talk in September, I was excited to announce that the Chronic Dev team had already discovered 5 different exploits for use in our upcoming jailbreak. Unfortunately, that announcement was a bit premature, because in the subsequent weeks, Apple found & patched a (critical) few of those exploits, between the beta versions we used for testing and the final release of iOS5 on October 12. Sadly (and trust us, we are much more sad about this than any of you could possibly be), this has prevented us from being able to release a new jailbreak as quickly as we wanted to. As I hinted at earlier this week on Twitter, I was initially disheartened to think that so many of the countless hours we’ve worked on this jailbreak seemingly went right down the drain. Not to mention, these are by no means the first exploits that have been “lost” by Chronic Dev (or any other iOS hacking teams) in this manner. In fact, these are just a few in a long-running series of exploits that were patched by Apple before we hackers could make use of them in a free jailbreak for you, our loyal fans. Well, to be frank… this is bull****!!! And now, Chronic Dev is ready to turn this little information battle into an all-out, no-holds-barred information WAR. So we want to use this experience as an opportunity to explain the method Apple uses to find potential vulnerabilities, as well as to unveil our new master plan, which should not only prevent this from happening to us again in the future, but also allow us to use all of you to find more exploits, so we can ultimately get an untethered jailbreak into your hands as quickly as possible. One of the primary challenges in working with userland exploits is that, every time any program crashes on your iPhone, a “crash report” is generated and instantly sent back to Apple. As you can imagine, while we’re working out all the kinks in the exploitation of a vulnerability, we may need to crash any particular program thousands & thousands of times. It’s possible to change your iTunes settings to stop sending this diagnostic information back to Apple, and of course everyone in Chronic Dev has made this change on all our development machines. However, even this is not always 100% effective at preventing Apple from obtaining our data. For instance, if one of us is at a friend’s house and plugs our iPhone up to his or her computer (even just to charge it), it’s very likely that computer is set up to send all our valuable data & crash reports right back to Apple. As a side note, this is also the primary reason we’re unable to perform or allow any public beta testing of our software before it’s released. Any potential beta tester could be unknowingly sending crash reports back to Apple, which would prematurely alert the company to our exploits & the discovery of their vulnerabilities before we even have the chance to release. Help Us Help You: Send Us Your Crash Reports Instead of allowing this vicious cycle to continue, we decided to write a new program to turn Apple’s own beast against its master, per se. All this program requires from you is to attach your iOS device to your computer and click a single button! At this point, the program copies all the crash reports off your device (which, under normal circumstances, would be sent right back to Apple), and instead sends this data to a secure, private server hosted by your friendly Chronic Dev team. Next, our program proceeds to neuter your copy of iTunes, simply by changing your settings to prevent your computer from sending any further diagnostic information from your device to Apple. Using this agglomeration of your crash reports and our ninja skills, Chronic Dev will be able to quickly pinpoint vulnerabilities in various programs by using the same techniques Apple currently employs. At the very least, your data will help point us in the direction of which applications are the most vulnerable, so we can focus our time & energy on these with laser-like intensity. And, of course, this will also prevent Apple from accessing all your valuable data, just so they can then turn around and use it against you. Thank You! Many thanks in advance for your prompt response & help in this effort, your continued support of GreenPois0n & the Chronic Dev team, and your patience while we continue our never-ending, diligent work on your (free!! coming soon!) untethered jailbreak for iOS5 and/or iPhone 4S. One final THANKS! While I have spent many of my own hours on the development, design & programming of this tool, especially the back-end, I also owe a great debt of gratitude to:
NOTE : This link is to the Mac beta version of our software. An updated/final Mac version as well as a Windows version will be available in the next 24 hours. Finally, we will be making a more concerted effort to keep you updated on our progress in the days & weeks to come, so keep checking back here on our blog! Last edited by Yashaka; 11-28-2011 at 16:03. |
The Following 78 Users Say Thank You to Yashaka For This Useful Post: |
11-28-2011, 01:16 | #15 (permalink) |
No Life Poster Join Date: May 2010
Posts: 1,147
Member: 1300483 Status: Offline Thanks Meter: 27 | great work my man your a huslter yashaka you no how to make money you have a thing in you which is helping others thats why you are one the top just waiting for your window version i am willing to help and i will spread the mesege to all of my friends |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Seeking for flash nokia 5110 old version (3 version) can exchange for new | Tomas | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 8 | 10-14-2017 19:29 |
Need software upgrade for Nokia 5110 | ptkrf | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 30 | 02-24-2016 10:21 |
How to add a language in 51xx/61xx | tati | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 8 | 05-21-2013 19:20 |
How to upload a new firmware... | Brand | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 8 | 06-08-2012 18:29 |
Help with 6110 | paulomt1 | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 2 | 05-25-2009 16:29 |