My company uses Good for Enterprise which i believe uses iOS 4's built in jailbreak detection. Is there a plist i can edit to make it appear to not be jailbroken.
My company uses Good for Enterprise which i believe uses iOS 4's built in jailbreak detection. Is there a plist i can edit to make it appear to not be jailbroken.
What is this iOS4 built-in jailbreak detection you speak of?
Do you have a link for this? I don't recall this ever being a feature and I can't seem to find anything when I google for it.One of the features of iOS 4 is the ability to detect jailbreak's. This was added in to make it a more enterprise friendly device.
where you got the info from about Good..I use it everyday...works fine on my JB ip4.
Perhaps you shouldn't be jailbreaking your company's phone anyway. Some companies do fire people for hacking their work phones as they assume they're trying to breach contract, release company secrets, etc.
Yes, I know that barely even makes sense, but this is how companies think.
where you got the info from about Good..I use it everyday...works fine on my JB ip4.
It's actually my phone that i am adding good to in order to get my email.
bump..
my company is also offering the good software pilot for our personal phones, but their condition is also that you msut not use it on jailbroken devices.. i don't want to get added to the pilot (there's a lot of demand in my company) only to be kicked out because my phone is jailbroken.. my plan was to restore my phone, get them to install the software, then jb it so i can have my phone back to how it normally is (jb'd).. but hence we need to figure out how good does this (i know the api for it was removed in 4.2.1 but id ont' know if that's what they are using).
Maybe your IT department did not implement JB detection policy. The IT guys at my company mentioned they tested the JB detection in Good for Enterprise on a phone that was not JB and then later JB and Good app stopped working as advertised. I don't think the detection comes from iOS 4+ but it is coded into the Good app.
More info from the web:
http://news.cnet.com/8301-27080_3-20008232-245.html
I am the lead network engineer for a large firm. My entire I.T. staff has jailbroken iPhones. We wouldn't have it any other way.
That could be a reason why your I.T. department didn't enable JB protection.![]()
From the developer standpoint, the quickest way is to just try to write a file outside of your application sandbox. If you can, the device is jailbroken. Any app developer (Good Software or whatever) can do this in about 5 lines of code.
Good has a lot of negative reviews...
What don't people like about it?
From the developer standpoint, the quickest way is to just try to write a file outside of your application sandbox. If you can, the device is jailbroken. Any app developer (Good Software or whatever) can do this in about 5 lines of code.
As Ulbador mentioned, this is not really an iOS thing but a developer thing, that API was remove from the SDK long ago, however you cannot hide Jailbreak, there are close to infinite ways to detect it, being the easiest one just to root access.
I'm jailbroken on 4.0.1 and use Good for Enterprise for my work emails. Never had one problem and was never questioned by anybody in my company's IT department.
It's definitely policy based. So has anybody been able to circumvent the jailbreak detection? - Specifically for IOS 4.2.1 and Good v1.8.1.x....???
It's definitely policy based. So has anybody been able to circumvent the jailbreak detection? - Specifically for IOS 4.2.1 and Good v1.8.1.x....???
It's probably stored within the Good app itself and since that's encrypted you probably are not going to find it.I wonder if we can prevent it from executing it's test for jailbreak, the way Comex dis for the IBook app... I can't figure out where the policy is stored.