Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Great news. More freedom for iOS users who wish to downgrade. Tethered most likely, unfortunately, but still useful progress in this regards.
 
MR should update their article as more details have come out via an interview done by Ars with the developer who discovered this.
  • We already knew that you need physical access to the device to perform this. It can’t be done remotely.
  • It lacks persistence. This is a biggie. Once the device is rebooted it returns to its original state. Nobody is going to sneak your device away from you, jailbreak it, and hand you back a permanently jail broken device. This is what’s known as a “tethered” jailbreak.
  • To expand further, if you used this exploit to install malware on the device, that malware only functions until a reboot. Once the phone reboots you’re back with a secure version of iOS just as when you got your iPhone from Apple. There’s no persistence for any software you might try to install on the device.
  • It doesn’t give you access to the Secure Enclave or your PIN.
  • It doesn’t give you access to data stored in the phone.

To sum up, this poses no real security risk to users. It’s really more of a research tool people might use to try and find other possible exploits (or test out their exploits).
Does this allow for a bypass of the time lockout when trying to brute-force the passcode?
 
Last edited:
Why? I thought the problem of NAND mirroring was the AES keys stored within the A CPU. Now that we have full control over this and can extract decryption keys we should be able to dump the NAND and use the keys to brute force the passcode without restriction.
 
Why? I thought the problem of NAND mirroring was the AES keys stored within the A CPU. Now that we have full control over this and can extract decryption keys we should be able to dump the NAND and use the keys to brute force the passcode without restriction.
On older devices without a Secure Enclave (iPhone 5 and 5C) you could likely do a brute force of the PIN. But you can’t on any device with an A7 processor and up since this exploit has no ability to access the Secure Enclave.
 
Sweet! So maybe someone will come out with an untethered downgrade for my 1st gen iPad mini? That thing is practically useless on iOS 9. I can get the apps I want on it for iOS 6. But right now, I cannot get that performance back. I don’t really care about jail breaking, but I do care about downgrading!
Sadly, while many iOS6 apps still run, the servers they connect to (eBay etc) aren't happy with the vintage software and don't play nicely.
 
Uh, they sure can fix it so it can’t work in the future. They can’t patch a device that’s already been broken. Huge difference.

How? “The reason that bootrom is special is part of the chip Apple made for the phone. So whatever code is put there in the factory, it will be there for the rest of your life. So if there is any vulnerability inside the bootrom, it cannot be patched.”

 
Yay! Now, everyone with an iPhone 6 can have an overheating iPhone that glitches, crashes, and runs through battery life like crazy!

Jailbreaking was useful when the App Store and iOS were in their infancy. But now I can think of nothing I would need that jailbreaking would provide. And I won't have to deal with instability, battery drain, and possibility of infection.
 
How? “The reason that bootrom is special is part of the chip Apple made for the phone. So whatever code is put there in the factory, it will be there for the rest of your life. So if there is any vulnerability inside the bootrom, it cannot be patched.”
I never claimed the bootrom itself could be patched.

In the past Apple has placed restrictions on the Lightning (USB) connection to stop certain types of hacks. So Apple may again change how USB connections are made.There’s no need to patch the bootrom if the access is denied through another method.

I don’t know if this is possible - I’m making an educated guess based on previous fixes Apple has done. It could turn out Apple can’t mitigate this due to hardware design. We’ll have to wait and see.

Regardless, this isn’t the doom & gloom security risk people make it out to be.
 
I never claimed the bootrom itself could be patched.

In the past Apple has placed restrictions on the Lightning (USB) connection to stop certain types of hacks. So Apple may again change how USB connections are made.There’s no need to patch the bootrom if the access is denied through another method.
The boot ROM works below the level of the OS. There's nothing Apple can do to block it.
 
This will be handy for our IT department. They have a stack of old iPads which were never under device management, and are locked with ex-employee's pins. Now they can wipe them.

if your company owns the iPads then they can have Apple unlock them couldn't they? perhaps they have a corporate sales rep at Apple that can arrange this.
 
I don't really understand why people would still jailbreak iPhones today. It seems enticing years ago but there really isn't much you get out of it nowadays. Also, doesn't jailbreaking an iPhone void Apple's one year warranty?

Before iOS 13 was released I had the latest JB which covered up to iOS 12.1.2 Other than the dark mode, volume HUD tweaks which I was using (these are now in iOS 13 of course) these are a few things I used JB for:

-Always on display with time and notifications - worked great and did not drain battery on my XS Max OLED display

-Going straight to lock screen when there are no notifications and unlocking with face ID (no need to swipe up)

-Multi-tasking - ability to run 2 apps on the screen at the same time (worked wonderfully on XS Max screen size)

- Picture in Picture for videos (like youtube, safari videos etc) worked the same as iPad

-Use any app in Carplay. so I was able to watch netflix, stream my live tv PS Vue and use full apps like the full version of spotify, waze, etc... and not the watered down carplay version

-Able to set seperate volume for my alarms so it wasnt dependent on the ringer volume

- A few aesthetics like change the layout of homescreen, including resize icons, move icons anywhere, add widgets like weather and calendar to the home screen

- Change the look of the lock screen, add widgets, clock style, etc...

- change shortcut buttons on the lock screen

- Change the dock so I can add as many apps as I want, by making the icons smaller or making it a scrolling a dock

That's only a few of the things I can remember right now, but there were definitely more.
 
Jailbreaking never affected warranty.
It did actually. I took my iPhone 4 in for service and they turned me away at the Apple store. I had to do a restore and come back, which was an easy fix, but I had to jailbreak again after the screen was fixed.
 
Great so now we can use the 4 apps left on the jailbreak scene which are actively supported and updated! I got a very bad taste in my mouth last time I did a jailbreak, and that was 2-3 years ago. Zero support from Cydia for apps purchased from them, and the vast majority of apps I wanted hadn't been updated in years and years and didn't work.
 
It did actually. I took my iPhone 4 in for service and they turned me away at the Apple store. I had to do a restore and come back, which was an easy fix, but I had to jailbreak again after the screen was fixed.
But you were still able to get it fixed under warranty. They didn't permanently deny you warranty over it. That was my point.
 
All the cool kids violate their warranty. Didn't you know?

lol
okey-dokey.

Once the data is copied off the phone can't you brute force it without fear of being locked out? What's the encryption like?




"The device’s unique IDs (UIDs) and group IDs (GIDs) are AES-256 bit keys fused (UID) or compiled (GID) into the application processor and Secure Enclave during manufacturing. No software or firmware can read them directly; they can see only the results of encryption or decryption operations performed by dedicated AES engines implemented in silicon using the UID or GID as a key. The application processor and Secure Enclave each have their own UID and GID. The Secure Enclave UID and GID can only be used by the AESengine dedicated to the Secure Enclave. "

Beginning of Page 15

..plus allot of other goodies.
 
Last edited:
Before iOS 13 was released I had the latest JB which covered up to iOS 12.1.2 Other than the dark mode, volume HUD tweaks which I was using (these are now in iOS 13 of course) these are a few things I used JB for:

-Always on display with time and notifications - worked great and did not drain battery on my XS Max OLED display

-Going straight to lock screen when there are no notifications and unlocking with face ID (no need to swipe up)

-Multi-tasking - ability to run 2 apps on the screen at the same time (worked wonderfully on XS Max screen size)

- Picture in Picture for videos (like youtube, safari videos etc) worked the same as iPad

-Use any app in Carplay. so I was able to watch netflix, stream my live tv PS Vue and use full apps like the full version of spotify, waze, etc... and not the watered down carplay version

-Able to set seperate volume for my alarms so it wasnt dependent on the ringer volume

- A few aesthetics like change the layout of homescreen, including resize icons, move icons anywhere, add widgets like weather and calendar to the home screen

- Change the look of the lock screen, add widgets, clock style, etc...

- change shortcut buttons on the lock screen

- Change the dock so I can add as many apps as I want, by making the icons smaller or making it a scrolling a dock

That's only a few of the things I can remember right now, but there were definitely more.
Wow!
How much have you paid for all of those, if anything?
Can you list all the apps you need to download for all those tweaks?
 
Interesting that this exploit doesn't work on A12 and A13 devices. Makes you wonder if they knew about the flaw, and patched it intentionally, or they patched the flaw unintentionally/accidentally?
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.