The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "User:Pod2g"
m |
|||
Line 2: | Line 2: | ||
He was the first to [https://twitter.com/pod2g/status/23932796062 tweet the IMG3 keys] for [[iBSS]] for iOS 4.0.1 on the [[N90ap|iPhone 4]], as proof of unsigned code running on the device. |
He was the first to [https://twitter.com/pod2g/status/23932796062 tweet the IMG3 keys] for [[iBSS]] for iOS 4.0.1 on the [[N90ap|iPhone 4]], as proof of unsigned code running on the device. |
||
+ | |||
+ | As of 1/29/2011, pod2g, has revealed to have two untether exploits. News of release have not been released. |
||
[https://twitter.com/pod2g pod2g on Twitter] |
[https://twitter.com/pod2g pod2g on Twitter] |
Revision as of 17:51, 29 January 2011
pod2g is an iPhone hacker who has discovered several bootrom exploits, including the 0x24000 Segment Overflow and the usb_control_msg(0xA1, 1) Exploit. He was formerly part of the Chronic Dev Team, but left for personal reasons.
He was the first to tweet the IMG3 keys for iBSS for iOS 4.0.1 on the iPhone 4, as proof of unsigned code running on the device.
As of 1/29/2011, pod2g, has revealed to have two untether exploits. News of release have not been released.