The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Talk:S5L8930"
Dra1nerdrake (talk | contribs) (→Is there an iBoot exploit?) |
(New kernel exploit for untetheredness?) |
||
Line 18: | Line 18: | ||
UPDATED:There /is/ a bootrom exploit. It's probably tethered (for now). It's a code-execution exploit, as you can't get keys without executing code. Hope this helps. ~Drake |
UPDATED:There /is/ a bootrom exploit. It's probably tethered (for now). It's a code-execution exploit, as you can't get keys without executing code. Hope this helps. ~Drake |
||
::A bootrom exploit tethered or untethered can be used to boot verbosely, SIDEBAR: people take tethered/untethered as meaning far too much, all tethered/untethered means is you need to plug in to something to boot, it has absolutely NO bearing on any other capability --[[User:Lilstevie|Lilstevie]] 14:26, 20 September 2010 (UTC) |
::A bootrom exploit tethered or untethered can be used to boot verbosely, SIDEBAR: people take tethered/untethered as meaning far too much, all tethered/untethered means is you need to plug in to something to boot, it has absolutely NO bearing on any other capability --[[User:Lilstevie|Lilstevie]] 14:26, 20 September 2010 (UTC) |
||
+ | |||
+ | ==New Untethered Kernel Exploit?== |
||
+ | http://blog.iphone-dev.org/post/1197198297/shattered-ipod-touch-4g |
||
+ | If you look closely in this video, upon respring there is some distortion in the top left corner. I'm guessing there is another one of those Spirit/Star type exploits in one of the frameworks that allows some shellcode to get stuck into the framebuffer to provide an untethered jailbreak... Which is awesome... |
Revision as of 22:59, 27 September 2010
Merge?
Should this and the A4 page be merged? They're practically the same in content. --Dialexio 17:18, 6 April 2010 (UTC)
- A4 is just the public name for the s5l8930, no? I say we merge it and make A4 redirect to this page, with a /very minor/ explanation on why it redirects you to this page. ~Drake
- This was from when the pages were separate entities. The problem has since been resolved. :) --Dialexio 04:13, 20 September 2010 (UTC)
Is there an iBoot exploit?
Geohot got the iPad to boot verbosely, and the VFDecrypt and other fun keys.
This almost certainly means there is an iboot/llb exploit out there, no? Can the keys be gotten with just a tethered bootrom exploits?
Iemit737 21:39, 25 August 2010 (UTC)
it could be possible he found a bootrom exploit that was pwnage 2 like however the real pwnage exploits the unchecked LLB but apple could have made a mistake with the new shsh check --liamchat 19:20, 29 August 2010 (UTC)
Are we sure that geohot even had an untethered bootrom exploit? He had denied that "pwned4life" or whatever it was was real. LiNK 02:07, 20 September 2010 (UTC)
UPDATED:There /is/ a bootrom exploit. It's probably tethered (for now). It's a code-execution exploit, as you can't get keys without executing code. Hope this helps. ~Drake
- A bootrom exploit tethered or untethered can be used to boot verbosely, SIDEBAR: people take tethered/untethered as meaning far too much, all tethered/untethered means is you need to plug in to something to boot, it has absolutely NO bearing on any other capability --Lilstevie 14:26, 20 September 2010 (UTC)
New Untethered Kernel Exploit?
http://blog.iphone-dev.org/post/1197198297/shattered-ipod-touch-4g If you look closely in this video, upon respring there is some distortion in the top left corner. I'm guessing there is another one of those Spirit/Star type exploits in one of the frameworks that allows some shellcode to get stuck into the framebuffer to provide an untethered jailbreak... Which is awesome...