Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

stlblufan

macrumors regular
Original poster
Jul 14, 2008
143
51
New York City
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3_1 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Mobile/8G4)

Did i0n1c just post a "beta" lol??

From his twitter feed:

If you want you can play around with antid0te.com/untether_4.3.2.zip <- but beware those might be not working 100%
 
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3_1 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8G4 Safari/6533.18.5)

Has anyone tried it yet
 
Dont know who that person is, but I dont jailbreak unless it is with a tool from the dev or chronic team
 
1. He's joking.
2. How do I know? It gives a blank file with no extension.
3. It would be very stupid to release the source code for the exploit to the public, which could let Apple figure it out and patch it.
 
Looks to be the binaries needed by the dev team. Last exploit he didn't provide the source code and only the compiled files needed for the exploit. This seems to be them - I'd expect dev team to update in the next day or so if it works.
 
1. He's joking.
2. How do I know? It gives a blank file with no extension.
3. It would be very stupid to release the source code for the exploit to the public, which could let Apple figure it out and patch it.

Source code or not Apple can figure it out using the jailbreak tools easy enough.
 
Source code or not Apple can figure it out using the jailbreak tools easy enough.

I don't think Apple will put in enough manpower to reverse engineer an entire program, analyze it for the source code, figure out the source code, then edit iOS to fix that exploit. Plus, if this was true then the iOS 4.3.1 exploit would not work in iOS 4.3.2. And yes, i0n1c's exploit right now for both versions are the same. He just has to edit some lines for it to work on iOS 4.3.2.
 
I don't think Apple will put in enough manpower to reverse engineer an entire program, analyze it for the source code, figure out the source code, then edit iOS to fix that exploit. Plus, if this was true then the iOS 4.3.1 exploit would not work in iOS 4.3.2. And yes, i0n1c's exploit right now for both versions are the same. He just has to edit some lines for it to work on iOS 4.3.2.

The 4.3.1 exploit works on 4.3.2 because Apple "built" 4.3.2 the same day that the untethered jailbreak for 4.3.1 was released. Fixing it would have delayed the build another two weeks.

Don't kid yourself, Apple has smart people who will figure it out in an afternoon easy.
 
Source code or not Apple can figure it out using the jailbreak tools easy enough.

I really don't think Apple is still trying to figure out how to stop jailbreakers...why would they? Every firmware released from Apple has been jailborken by someone...I can't imagine they're still goin at it...maybe I'm wrong though...just seems like a waste of time to me...
 
I really don't think Apple is still trying to figure out how to stop jailbreakers...why would they? Every firmware released from Apple has been jailborken by someone...I can't imagine they're still goin at it...maybe I'm wrong though...just seems like a waste of time to me...

Every jailbreak is a widely published and exploited security vulnerability of their platform, you bet they are working on closing those holes.

I am actually surprised we have untether on 4.3.2 now, I guess it was more important to get the bug fixes out there. Rightfully so IMO.
 
I really don't think Apple is still trying to figure out how to stop jailbreakers...why would they? Every firmware released from Apple has been jailborken by someone...I can't imagine they're still goin at it...maybe I'm wrong though...just seems like a waste of time to me...

They are unfortunately still patching untethered exploits. If not we would still be using the jailbreakme exploit or the limerain untether or the greenpoison hack now.
The bootrom exploit it's hardware so they can't do anything about that. There will always be a tethered jb.
 
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3_1 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8G4 Safari/6533.18.5)

What do u think is the main reason why there 3GS has an untethered and the ip4 not? Isn't it the same software with very little differences in enabling
 
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3_1 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8G4 Safari/6533.18.5)

What do u think is the main reason why there 3GS has an untethered and the ip4 not? Isn't it the same software with very little differences in enabling

The early 3GS has forever untethered jb. But most 3GS phones have the new bootrom so they're not pwned for life.
It's a hardware exploit.
 
Every jailbreak is a widely published and exploited security vulnerability of their platform, you bet they are working on closing those holes.

I am actually surprised we have untether on 4.3.2 now, I guess it was more important to get the bug fixes out there. Rightfully so IMO.

I understand what you're saying, but we continue to jailbreak all of the firmwares. Sometimes it takes awhile to do, but we anyways eventually get the jailbreak out.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.