To those complaining about the size of updates for iOS, reinstalling iOS at each update (especially with recent root escalation exploit) eliminates any malicious software that may have been installed due to an exploit.
This promotes security and saves them from having to include software that can find malicious code to remove it. Such programs (antivirus software) are bloated, eat up resources, and reduce battery life.
Until someone provides a source that 4.1 isn't fixing the proximity sensor issues - which I had on my first iPhone 4 when outside but not on my replacement - I think you all are spreading fud.
You make me laugh. An exploit in an open source font is hardly Apple's fault but Apple stepped up and fixed it.
You do know that they could put the scanning part of the software in iTunes and that scanned software add on would be SMALLER than the patch. Apple's method of updating software is VERY outdated.
Apple way of doing it is a very poor meathod and a reason why I avoid updating my iPod and my brother avoids updating his iPhone. It takes to long to download the file. If it was a 1 meg file the download and install could be done in a matter of minutes instead of the 30+ it takes now. Rather inconvenient
It's not a stupid jailbreaking hole. It's an exploit that allows for arbitrary code execution.
Almost 1/6th of the iPhone 4's expected lifecycle has gone and the proximity sensor issue still remains.
Arbitrary code execution is not a god thing but it is much worse when done in conjunction with a privilege (root) escalation exploit. Priv escalation required for more invisible and damaging malware install.
AFAIK, stringing two exploits together like jailbreakme is difficult as it makes it difficult to produce a payload that runs reliably.
The only evidence is anecdotal - but what else do you expect, it's a closed beta with a NDA.
iOS 4 on iPhone 3G is still slow
Proximity sensor is known software issue (as mentioned by CEO of the company)
iBooks App was slow when they released it eventually got fixed it
Safari 5.0 was slow and got fixed 5.0.1
few examples, you tell me how is the QA?
Arbitrary code execution is not a god thing but it is much worse when done in conjunction with a privilege (root) escalation exploit. Priv escalation required for more invisible and damaging malware install.
AFAIK, stringing two exploits together like jailbreakme is difficult as it makes it difficult to produce a payload that runs reliably.
1/6th of its lifecycle ? You think they will only sell this thing for 1 year ?![]()
I'm probably not going to JB, but in case I do, I'm not upgrading!
+1.
It's ridiculous they haven't offered a fix for this yet.
Proximity issue = hardware!!!
This is crap.. they will keep themselves from losing money on JB phones.. but won't fix the issue so people can actually use the phone to make calls!!
I say quit fixin holes like this and focus on more important updates...
No, but most people wont want to buy one when the iPhone 5 comes out.
It'll be the low end model.
I intend to keep my iPhone 4 for two years - the duration of my contract.
Unlike the 3Gs and 4, can't the 3G can be restored with older versions of iOS? If so, why not go back to 3.x until performance issues on the 3G are fixed?
all you numbnuts freedom fighter jailbreakers for making my life just that much more difficult.
You're like the teenagers at the wedding, getting into the beer, leaving the bottles and cigarette butts for somebody else to clean up, and then going for a joy ride drunk and wrecking Mom's car. Thanks, brave lads.
You do know that they could put the scanning part of the software in iTunes and that scanned software add on would be SMALLER than the patch. Apple's method of updating software is VERY outdated.
Apple way of doing it is a very poor meathod and a reason why I avoid updating my iPod and my brother avoids updating his iPhone. It takes to long to download the file. If it was a 1 meg file the download and install could be done in a matter of minutes instead of the 30+ it takes now. Rather inconvenient
Jailbreakme seems to run pretty reliably. Maybe you underestimate this vulnerability ? Exploit code is out there. All that remains is to change the payload.
Point being, though, if they did it and it's available to be executed via their website then it's a major issue as people can capture that code and learn to use it for other purposes.
That doesn't make its lifecycle 1 year.And they wouldn't bother selling the 3GS as a 8 GB low end model if people weren't scooping it up. Nor would they have bothered to do it with the 3G.
And again, it's about software support. With the original iPhone, that's 3 years.
Wrong comment was wrong.