Difference between revisions of "Talk:S5L8930"

From The iPhone Wiki
Jump to: navigation, search
(Merge?: Yes)
(Is there an iBoot exploit?)
Line 14: Line 14:
   
 
Are we sure that geohot even had an untethered bootrom exploit? He had denied that "pwned4life" or whatever it was was real. [[User:LiNK|LiNK]] 02:07, 20 September 2010 (UTC)
 
Are we sure that geohot even had an untethered bootrom exploit? He had denied that "pwned4life" or whatever it was was real. [[User:LiNK|LiNK]] 02:07, 20 September 2010 (UTC)
  +
  +
There /is/ a bootrom exploit. It's probably tethered (for now). It's a code-execution exploit, as you can't get keys without executing code. Nor can you boot verbosely without an untethered bootrom exploit. Hope this helps. ~Drake

Revision as of 02:27, 20 September 2010

Merge?

Should this and the A4 page be merged? They're practically the same in content. --Dialexio 17:18, 6 April 2010 (UTC) A4 is just the public name for the s5l8930, no? I say we merge it and make A4 redirect to this page, with a /very minor/ explanation on why it redirects you to this page. ~Drake

Is there an iBoot exploit?

Geohot got the iPad to boot verbosely, and the VFDecrypt and other fun keys.

This almost certainly means there is an iboot/llb exploit out there, no? Can the keys be gotten with just a tethered bootrom exploits?

Iemit737 21:39, 25 August 2010 (UTC)

it could be possible he found a bootrom exploit that was pwnage 2 like however the real pwnage exploits the unchecked LLB but apple could have made a mistake with the new shsh check --liamchat 19:20, 29 August 2010 (UTC)

Are we sure that geohot even had an untethered bootrom exploit? He had denied that "pwned4life" or whatever it was was real. LiNK 02:07, 20 September 2010 (UTC)

There /is/ a bootrom exploit. It's probably tethered (for now). It's a code-execution exploit, as you can't get keys without executing code. Nor can you boot verbosely without an untethered bootrom exploit. Hope this helps. ~Drake