Showing posts with label Unlock. Show all posts
Tuesday, 14 June 2016
Apple Announces macOS Sierra with Auto Unlock, Universal Clipboard, Siri and More
Apple introduced a new version of OS X, which is now called macOS Sierra. The new version of macOS includes new features that Apple says make your Mac "smarter" and more "helpful" than ever. Siri is finally headed to the Mac, letting users easily find documents are look up information. A new Universal Clipboard allows you to copy content from one Apple device and paste it in another. Apple Pay is also coming to the Mac so that you can easily hope online with Touch ID authentication. Finally, Photos has been improved with new ways to rediscover your favorite memories.
“macOS Sierra is a major update that makes your Mac smarter and more helpful than ever with improvements to the apps you know and love and great new features throughout,” said Craig Federighi, Apple’s senior vice president of Software Engineering. “With macOS Sierra, you can get information, find files and multitask using Siri, access your Desktop and Documents from anywhere, copy and paste between Macs and iOS devices, and rediscover precious memories in Photos.”
Thursday, 14 February 2013
Fix iOS 6.1 Passcode Security Flaw in a Future Software Update
iDevicei |
It would make this the second bug that Apple plans to fix in the next software update. Earlier today, we reported that the iOS 6.1 Exchange bug will be fixed soon.
Apple issued the following statement to AllThings.
Apple takes user security very seriously. We are aware of this issue, and will deliver a fix in a future software update.
Apple takes user security very seriously. We are aware of this issue, and will deliver a fix in a future software update.
As we reported earlier, the security flaw in iOS 6.1 allows anyone to bypass the passcode lock on the iPhone and gain access to the Phone app. This meant that someone can easily gain access to your Contacts, check your voicemail, send text messages, make FaceTime calls and even access your photos.
You can follow these simple steps to reproduce the bug:
- Press the Sleep/Wake (Power) button to lock your iPhone
- Now press the home button and slide to unlock.
- Tap on the Emergency Call key
- Now hold the Sleep/Wake button until the “slide to power off” slider appears
- Tap on the Cancel button
- Then enter the emergency number like ’112′
- Tap the Call button and then immediately end the call by tapping on the End button
- Hit the Sleep/Wake button to lock your iPhone and press the Home button
- Now slide to unlock again
- Hold the Sleep/Wake button and after 3-4 seconds tap the Emergency Call button
- A new iOS software update is not ideal for jailbreakers, but lets hope that Apple only fixes this exchange bug and the passcode security flaw and not the evasi0n jailbreak.
Monday, 11 February 2013
evasi0n 1.3 To Jailbreak iPhone 4S on iOS 6.1.1 Released
As expected, evad3rs dev team has released evasi0n 1.3 to allow iPhone 4S users to jailbreak iOS 6.1.1.
Apple had surprised everyone by releasing iOS 6.1.1 for iPhone 4S to fix 3G connectivity related issues earlier today.
Here’s the complete change log for the four versions of evasi0n released by the evad3rs tem this week:
Download evasion from here
Download evasion from here
Version 1.3:
- Support for 6.1.1 on the iphone 4S.
Version 1.2
- Disable OTA updates.
- Correct timezone issue in evasi0n binary if client fails to correct it.
Version 1.1
- prevent Weather app from appearing on iPads.
- mitigated the long reboot issue.
- fix issue with not working after connecting multiple ios devices
- fix blinking of the jailbreak instructions on OS X.
- codesigned Mac app.
Version 1.0
- first public release
evad3rs dev team has also mentioned that evasi0n 1.3 should now correctly support OSX 10.5. They’ve also lowered the linux glibc requirement to 2.3
evad3rs dev team is recommending users to update to iOS 6.1.1 by doing a full restore using itunes However, I’ve noticed that updating your iOS device to iOS 6.1.1 using iTunes should also work as long as you’ve manually taken a backup of your iOS device using iTunes before using the evasi0n tool.
Sunday, 10 February 2013
How evasi0n Jailbreak Works
he evad3rs team released evasi0n close to a week back. Now that we’ve all jailbroken our ios devices and installed the best tweaks, let’s take a look at how the unbelievably simple on the outside, yet incredibly complicated on the inside evasi0n jailbreak works.

As Apple strengthens security in iOS, hackers can no longer simply find a single exploit like earlier days and use it to gain root access to a device. evasi0n is a combination of five different bugs, most of them harmless individually, but together capable enough to crack open iOS.
evasi0n begins by exploiting in iOS’ iTunesback-up system, called the “MobileBackup” daemon. It does this by running “libmobiledevice,” a program on your PC/Mac that communicates with iOS devices using the iTunes protocol.
evasi0n restores a backup that contains a few files needed for the jailbreak. Since MobileBackup can’t storage filoe outside
/var/Mobile/Media
, evasi0n works around this by creating a “symlink” or a shortcut in /var/Mobile/Media
named .haxx that points to/var/Media
. MobileBackup is now able to write files to /var/mobile
through the .haxx
symlink. The copied files collectively form the app that you’re told to launch in the middle of thejailbreakprocess.Using the symlink trick, evasi0n also gains access to a timezone file, which is again symlinked to point to launchd, a daemon that runs processes with “root” privileges. The access to launchd is now exploited and the timezone file is made accessible to all users (not just root) by changing its permissions. A similar trick is employed to make a socket, which handles communications between launchd and other processes, accessible to mobile user under which all apps on iOS are run.
Now the user is told to launch the app that had been copied to the iOS filesystem in an earlier step. This app, using the exposed launchd socket, makes the read-only system partition writeable.
Now that the system partition has become writeable, evasi0n again fires up MobileBackup, and writes a bunch of files, one of which is launchd.conf that contains a bunch of commands constituting the exploit. This file runs on boot each time, thus making the jailbreak persistent.
One of the commands in launchd.conf is responsible for evading AppleMobileFileIntegrity’s check code signing check by loading a dynamic library, which replaces the built in checking function with one that always returns true.
evasi0n also has another roadblock ahead of it — Address Space Layout Randomisation, or ASLR, that introduces randomness into flash memory addresses, making it difficult to predict. However, there still is a location on ARM chips that’s easy to locate, and using this evasi0n can map the entire memory. From here, evasi0n, exploiting a bug in iOS’ USB interface, finally gets into the kernel of device, which is where everything opens up.
How evasi0n Jailbreak Works
he evad3rs team released evasi0n close to a week back. Now that we’ve all jailbroken our ios devices and installed the best tweaks, let’s take a look at how the unbelievably simple on the outside, yet incredibly complicated on the inside evasi0n jailbreak works.
As Apple strengthens security in iOS, hackers can no longer simply find a single exploit like earlier days and use it to gain root access to a device. evasi0n is a combination of five different bugs, most of them harmless individually, but together capable enough to crack open iOS.
evasi0n begins by exploiting in iOS’ iTunesback-up system, called the “MobileBackup” daemon. It does this by running “libmobiledevice,” a program on your PC/Mac that communicates with iOS devices using the iTunes protocol.
evasi0n restores a backup that contains a few files needed for the jailbreak. Since MobileBackup can’t storage filoe outside
/var/Mobile/Media
, evasi0n works around this by creating a “symlink” or a shortcut in /var/Mobile/Media
named .haxx that points to/var/Media
. MobileBackup is now able to write files to /var/mobile
through the .haxx
symlink. The copied files collectively form the app that you’re told to launch in the middle of thejailbreakprocess.
Using the symlink trick, evasi0n also gains access to a timezone file, which is again symlinked to point to launchd, a daemon that runs processes with “root” privileges. The access to launchd is now exploited and the timezone file is made accessible to all users (not just root) by changing its permissions. A similar trick is employed to make a socket, which handles communications between launchd and other processes, accessible to mobile user under which all apps on iOS are run.
Now the user is told to launch the app that had been copied to the iOS filesystem in an earlier step. This app, using the exposed launchd socket, makes the read-only system partition writeable.
Now that the system partition has become writeable, evasi0n again fires up MobileBackup, and writes a bunch of files, one of which is launchd.conf that contains a bunch of commands constituting the exploit. This file runs on boot each time, thus making the jailbreak persistent.
One of the commands in launchd.conf is responsible for evading AppleMobileFileIntegrity’s check code signing check by loading a dynamic library, which replaces the built in checking function with one that always returns true.
evasi0n also has another roadblock ahead of it — Address Space Layout Randomisation, or ASLR, that introduces randomness into flash memory addresses, making it difficult to predict. However, there still is a location on ARM chips that’s easy to locate, and using this evasi0n can map the entire memory. From here, evasi0n, exploiting a bug in iOS’ USB interface, finally gets into the kernel of device, which is where everything opens up.
Saturday, 9 February 2013
Download Evasi0n 1.2 And evasi0n 6.0-6.1 Untether Cydia Package Released To Disable OTA Updates And Fix Timezone Bug
Hii guys it's a good news for apple users that dev team has released evasi0n 1.2 to disable OTA updates and to fix a timezone bug.
They have also released an update for the evasi0n 6.0-6.1 Untether package on Cydia for users who have already jailbroken their iOS devices using evasi0n.
Disabling OTA update will ensure that you don’t accidentally upgrade your jailbroken iOS device to iOS 6.1.1 when it is released.
Here’s the complete change log for the three versions of evasi0n released by the evad3rs tem this week:
Version 1.2
- Disable OTA updates.
- Correct timezone issue in evasi0n binary if client fails to correct it.
Version 1.1
- prevent Weather app from appearing oniPads.
- mitigated the long reboot issue.
- fix issue with not working after connecting multiple iOS devices
- fix blinking of the jailbreak instructions on OS X.
- codesigned Mac app.
Version 1.0
- first public release
Please note evasi0n 1.2 is meant for new users who want to jailbreak their iOS 6.x device. If you’ve already jailbroken your iOS device, then launch Cydia and install the update evasi0n 6.0-6.1 Untether (v0.3-1) from Cydia.
iDevices News |
Subscribe to:
Posts
(
Atom
)