Great news. More freedom for iOS users who wish to downgrade. Tethered most likely, unfortunately, but still useful progress in this regards.
6 number passcode is only 1000000 different combinations so that should be relatively quick? The hard part is if someone is using many character text passcode.Sure it could take years, but it could be done.
Does this allow for a bypass of the time lockout when trying to brute-force the passcode?MR should update their article as more details have come out via an interview done by Ars with the developer who discovered this.
- We already knew that you need physical access to the device to perform this. It can’t be done remotely.
- It lacks persistence. This is a biggie. Once the device is rebooted it returns to its original state. Nobody is going to sneak your device away from you, jailbreak it, and hand you back a permanently jail broken device. This is what’s known as a “tethered” jailbreak.
- To expand further, if you used this exploit to install malware on the device, that malware only functions until a reboot. Once the phone reboots you’re back with a secure version of iOS just as when you got your iPhone from Apple. There’s no persistence for any software you might try to install on the device.
- It doesn’t give you access to the Secure Enclave or your PIN.
- It doesn’t give you access to data stored in the phone.
To sum up, this poses no real security risk to users. It’s really more of a research tool people might use to try and find other possible exploits (or test out their exploits).
Does this allow for a bypass of time lockout when trying to brute-force the passcode?
Why? I thought the problem of NAND mirroring was the AES keys stored within the A CPU. Now that we have full control over this and can extract decryption keys we should be able to dump the NAND and use the keys to brute force the passcode without restriction.Also no.
Yes, I personally use a mixture of numbers, alpha, lower and upper case.6 number passcode is only 1000000 different combinations so that should be relatively quick? The hard part is if someone is using many character text passcode.
Nice you're pretty safe from bruteforce then.Yes, I personally use a mixture of numbers, alpha, lower and upper case.
They can’t fix this though. Lol It’s an exploit that can’t be fixed.And have malware installed or spying on you. No thanks. Apple should have gotten their sh** together and not have had the exploit open for nearly a week.
On older devices without a Secure Enclave (iPhone 5 and 5C) you could likely do a brute force of the PIN. But you can’t on any device with an A7 processor and up since this exploit has no ability to access the Secure Enclave.Why? I thought the problem of NAND mirroring was the AES keys stored within the A CPU. Now that we have full control over this and can extract decryption keys we should be able to dump the NAND and use the keys to brute force the passcode without restriction.
Sadly, while many iOS6 apps still run, the servers they connect to (eBay etc) aren't happy with the vintage software and don't play nicely.Sweet! So maybe someone will come out with an untethered downgrade for my 1st gen iPad mini? That thing is practically useless on iOS 9. I can get the apps I want on it for iOS 6. But right now, I cannot get that performance back. I don’t really care about jail breaking, but I do care about downgrading!
Uh, they sure can fix it so it can’t work in the future. They can’t patch a device that’s already been broken. Huge difference.
It doesn’t void your warranty, this is a myth.
I never claimed the bootrom itself could be patched.How? “The reason that bootrom is special is part of the chip Apple made for the phone. So whatever code is put there in the factory, it will be there for the rest of your life. So if there is any vulnerability inside the bootrom, it cannot be patched.”
The boot ROM works below the level of the OS. There's nothing Apple can do to block it.I never claimed the bootrom itself could be patched.
In the past Apple has placed restrictions on the Lightning (USB) connection to stop certain types of hacks. So Apple may again change how USB connections are made.There’s no need to patch the bootrom if the access is denied through another method.
This will be handy for our IT department. They have a stack of old iPads which were never under device management, and are locked with ex-employee's pins. Now they can wipe them.
I don't really understand why people would still jailbreak iPhones today. It seems enticing years ago but there really isn't much you get out of it nowadays. Also, doesn't jailbreaking an iPhone void Apple's one year warranty?
It did actually. I took my iPhone 4 in for service and they turned me away at the Apple store. I had to do a restore and come back, which was an easy fix, but I had to jailbreak again after the screen was fixed.Jailbreaking never affected warranty.
But you were still able to get it fixed under warranty. They didn't permanently deny you warranty over it. That was my point.It did actually. I took my iPhone 4 in for service and they turned me away at the Apple store. I had to do a restore and come back, which was an easy fix, but I had to jailbreak again after the screen was fixed.
All the cool kids violate their warranty. Didn't you know?
Once the data is copied off the phone can't you brute force it without fear of being locked out? What's the encryption like?
Wow!Before iOS 13 was released I had the latest JB which covered up to iOS 12.1.2 Other than the dark mode, volume HUD tweaks which I was using (these are now in iOS 13 of course) these are a few things I used JB for:
-Always on display with time and notifications - worked great and did not drain battery on my XS Max OLED display
-Going straight to lock screen when there are no notifications and unlocking with face ID (no need to swipe up)
-Multi-tasking - ability to run 2 apps on the screen at the same time (worked wonderfully on XS Max screen size)
- Picture in Picture for videos (like youtube, safari videos etc) worked the same as iPad
-Use any app in Carplay. so I was able to watch netflix, stream my live tv PS Vue and use full apps like the full version of spotify, waze, etc... and not the watered down carplay version
-Able to set seperate volume for my alarms so it wasnt dependent on the ringer volume
- A few aesthetics like change the layout of homescreen, including resize icons, move icons anywhere, add widgets like weather and calendar to the home screen
- Change the look of the lock screen, add widgets, clock style, etc...
- change shortcut buttons on the lock screen
- Change the dock so I can add as many apps as I want, by making the icons smaller or making it a scrolling a dock
That's only a few of the things I can remember right now, but there were definitely more.