Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Jailbreaking is most certainly legal in the USA.

http://www.wired.com/2010/07/feds-ok-iphone-jailbreaking/

However, getting to the actual article at hand, and comparing that to say, Pangu, TaIG, comex, the evad3rs, and even geohot, You now see the difference between ethical and unethical hacking: hacking with the intent of making a software better by finding bugs and notifying the authors of the software of said bugs and proof of concept to make them better...

.. versus hacking for pure unadulterated exploitation.

Everyone needs to be sure to not lump one side of this in with the other.

BL.

Thanks for correcting me then. And I agree that there's a massive difference between the two things are radically different. Whilst the good form of hacking is no problem however, it is hard to allow it without also enabling malicious hackers.
 
OS X has many more vulnerabilities VS windows
This doesn't surprise me at all... its just marketing.

Vulnerabilities != Exploits. Many are the DOS attack and those are easily fixed. It's much harder to attack OS X or Linux than it is Windows.

Windows is not secure at all, despite what lines of BS Microsoft feeds the gullible.
 
  • Like
Reactions: jhfenton
Because they intend to sell it for criminal activities. Yes, an exploit that would hack into _my_ iPhone without my permission is criminal.

You are missing the point of what this would do, as it is not an exploit that would get into your iPhone.

You would have to be the catalyst for it, as you would have to visit a website set up to perform this jailbreak on your phone.

So no, the site wouldn't be responsible for criminal activity, you would have done this to yourself by visiting the site, or allowing someone to use your iDevice to visit the site. All you have to do to prevent it is to be a human firewall.

BL.
 
Vulnerabilities != Exploits. Many are the DOS attack and those are easily fixed. It's much harder to attack OS X or Linux than it is Windows.

Windows is not secure at all, despite what lines of BS Microsoft feeds the gullible.

That's it you ignore the data... and create your own dimension or reality.
The numbers are not from any vendor, they are independent of that.

Also if you looked you will see only 158 of the 335 vulnerabilities are DoS, 147 are code execution vs 24 for windows.

On OS X some of the others are 138 for overflow, 119 memory corruption. Then you have 41 bypass and 49 gain info. Windows 8.1 by contrast has 40 code exe, 9 over, 7 memory 26 bypass info 21 gain info..

Opps! So despite Apples BS... they are even worse.
 
Last edited:
This is very very bad. This is going to be abused by either our government or another malicious party. For example, all one would need to do is inject the exploit in an unencrypted WiFi to gain complete control over a phone since this is a browser based hack.

All one needs to do is update to 9.2.2 ; problem solved. If it's one thing Apple is good at it is patching up iOS.
No system can be labeled as hack proof.
 
You are missing the point of what this would do, as it is not an exploit that would get into your iPhone.

You would have to be the catalyst for it, as you would have to visit a website set up to perform this jailbreak on your phone.

So no, the site wouldn't be responsible for criminal activity, you would have done this to yourself by visiting the site, or allowing someone to use your iDevice to visit the site. All you have to do to prevent it is to be a human firewall.

BL.


It's my understanding, or perhaps lack of, that all that is needed for someone to exploit my phone without my knowledge is to send a text to my phone; once received my phone is open to exploit by the sender.

Yes/No?
 
How long before this exploit is discovered and scattered about social media?
Counting the days

At least it is not some secret black ops back door encryption key. :eek:
 
Last edited:
Puts me in mind of the jailbreakme.com days. Halcyon days they were, such excitement around the first iPhone.
 
It's my understanding, or perhaps lack of, that all that is needed for someone to exploit my phone without my knowledge is to send a text to my phone; once received my phone is open to exploit by the sender.

Yes/No?

Depends. Do you need to open the actual text?

If you do nothing to it, go into the messages app, and delete it, are you exploited?

Yes/No?

BL.
 
So even if Apple doesn't specifically purchase this, be in no doubt that they will acquire it somehow and push a patch. All you need is a dark alley, a thumb drive, and a willing collaborator (anyone think Apple doesn't have the funds to motivate one of those?).
And Zerodium has every interest to keep that from happening by requiring all its customers to handle this internally as confidentially as possible, maybe using tactics like giving different customers slightly different versions (if possible) to allow them to identify who leaked things to Apple. But they are playing defence on that and that is always harder than offence in computer security.

Of course, part of the big debate here is whether the government should prioritise its own snooping capabilities over the security of its citizens, companies and in the end itself as iOS is certainly used on various government levels.
 
What is everyone so worried about? its a hack, not a virus. A hack requires the user to put it on the phone, a virus doesn't. I do admit that once the hack is on the phone, you're vulnerable to all types of attacks. I think history is repeating itself. There was an article previously that stated that certain jailbroken phones that had a certain app on it were left vulnerable. Nothing new here.
 
There are two possible (but quite different) interpretations of the phrase "... via Chrome or Safari on an iOS device".

#1: The exploit must be installed independent of whether the user is accessing the web via Chrome or Safari (i.e it must work in both cases)

#2: The exploit must be installed via web access utilizing either Chrome or Safari (i.e. requirements are met if either one is achieved)

F**ked or double f**ked. Which is it?
Which I think neither of them are good.
 
What is everyone so worried about? its a hack, not a virus. A hack requires the user to put it on the phone, a virus doesn't. I do admit that once the hack is on the phone, you're vulnerable to all types of attacks. I think history is repeating itself. There was an article previously that stated that certain jailbroken phones that had a certain app on it were left vulnerable. Nothing new here.
Well it seems that this one can install/do something while you simply visit a web site. So, while technically speaking it requires the action of you actually visiting a web site, given that plenty of sites can be hacked directly or indirectly (though some ad network script or something like that) to serve something up without you even knowing when you visit the site, it seems like it's not all that clearcut.
 
Please do yourself a favor and learn what a jailbreak is, it is a fancy name for gaining access to the root status on the device or more accurate, a massive security exploit. Also, yes, it can be applied to the phone without the owner's permission, you have no idea what you're talking about.
For the sake of completeness, jailbreaks can have different levels of severity. This one requires the target to open a text message or visit a webpage (which isn't too difficult, faking a text message from your cellular provider is easy, sure you must know which provider the target is using, in general knowing something about your target makes it easier to trick it but if you just infect enough website with your malware or send out mass texts, you can infect large numbers of people). A jailbreak that would require the target to download a file might be a bit harder to exploit (though opening an email generally already downloads the attachments). The less serious jailbreaks are those that require a physical connection to the target device (ie, you first have to infect a computer the device is synced with but then a special charger that isn't just charging can do so as well).
 
Well it seems that this one can install/do something while you simply visit a web site. So, while technically speaking it requires the action of you actually visiting a web site, given that plenty of sites can be hacked directly or indirectly (though some ad network script or something like that) to serve something up without you even knowing when you visit the site, it seems like it's not all that clearcut.

Which, as many people here already alluded to, hearkens back to the jailbreakme dot com days, where someone would go into an apple store, play around with the iDevices, hit up that site, and have every iDevice (except for an iMac) jailbroken. We definitely may see the next round of that.

However, this does indicate one major thing; there is an exploit in iOS 9.1 and possibly the 9.2 betas that could mean other jailbreaks will come, especially from those who are ethical.

BL.
 
So basically ignore text messages from odd numbers and unless they corrupt DNS don't visit web sites you don't know.
But I still can say even those presumably good sites can be used to inject malicious jailbreak code and do something from there.

Again, nothing is secure, and we probably cannot trust anything over the Internet at all. Yes. We should break the trust. But then? I would rather guess that be another worldwide chaos.

Bring back the days when apple was not popular. Beginning to feel like the old days of Windows with the constant exploits these days.
As Mac OS X goes popular, I believe their system could become much more vulnerable than Windows now.

(Multi quotes? Wait)
 
That's it you ignore the data... and create your own dimension or reality.
The numbers are not from any vendor, they are independent of that.

Also if you looked you will see only 158 of the 335 vulnerabilities are DoS, 147 are code execution vs 24 for windows.

On OS X some of the others are 138 for overflow, 119 memory corruption. Then you have 41 bypass and 49 gain info. Windows 8.1 by contrast has 40 code exe, 9 over, 7 memory 26 bypass info 21 gain info..

Opps! So despite Apples BS... they are even worse.

Kudos for being willfully daft. If there are a million vulnerabilities but very few working attacks, is that less secure than something with 10 vulnerabilities but a million known working attacks using them?

In any case, your initial comparison makes little sense anyway, since the nature of iOS and iOS hardware makes it quite different from a security perspective than Mac OS X.
 
I call BS on their claim. They won't disclose it publicly, so, their claim can't be verified. It's possible that they're doing this just for publicity.
Hell, I can break into any Android phone via sound, but I can't share the details. Just trust me.
 
Well it seems that this one can install/do something while you simply visit a web site. So, while technically speaking it requires the action of you actually visiting a web site, given that plenty of sites can be hacked directly or indirectly (though some ad network script or something like that) to serve something up without you even knowing when you visit the site, it seems like it's not all that clearcut.
I'm pretty sure ios and safari is robust enough that it will not allow things to be downloaded without user knowledge. The vulnerabilty is that once the hack is on the phone, that robustness is compromised.
edit. I'm on android, and I've been directed to phishing site that pops a fake os message asking for a yes, so thats a real issue, but ultimately, its the user that downloads the exploits.
 
Last edited:
I still find it a bit amazing Apple does not participate in a bounty program.

Hubris. Pure hubris. :cool:
You mean have its own bounty program? There is some risk in doing so (besides the optics that Apple might not like). Zerodium and Co. won't fold gracefully they would simply try to outbid Apple (not on every exploit, just the occasional one), meaning an Apple bounty program would generally increase prices for exploits, which in turn attracts more people.
 
There are two possible (but quite different) interpretations of the phrase "... via Chrome or Safari on an iOS device".

#1: The exploit must be installed independent of whether the user is accessing the web via Chrome or Safari (i.e it must work in both cases)

#2: The exploit must be installed via web access utilizing either Chrome or Safari (i.e. requirements are met if either one is achieved)

F**ked or double f**ked. Which is it?
Maybe this is general phrase that applies to exploits for Android as well as iOS, where for Android it would be Chrome and for iOS it would be Safari.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.