The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "User:Pod2g"
m |
(real name added with his permission) |
||
Line 1: | Line 1: | ||
{{lowercase}} |
{{lowercase}} |
||
− | '''pod2g''' is an iPhone hacker who has discovered several [[bootrom]] exploits |
+ | '''pod2g''', with real name '''Cyril Cattiaux''', is an iPhone hacker living in France, who has discovered several [[bootrom]] exploits. He was formerly part of the [[Chronic Dev (team)|Chronic Dev Team]], but left for personal reasons. Later he was part of the [[Dream Team]] when it emerged. |
+ | When asked about how he finds all these vulnerabilities, he always answers "by luck" and even explains the Racoon config file as an example, but having so much luck seems to be impossible. He is considered as one of the most talented iOS hackers ever. |
||
− | He was the first to [https://twitter.com/pod2g/status/23932796062 tweet the IMG3 keys] for [[iBSS]] for [[iOS]] 4.0.1 on the [[n90ap|iPhone 4]], as proof of unsigned code running on the device. |
||
+ | In January 2013 he released his first app (podDJ) officially on the AppStore, although he did not leave the hacking scene. |
||
− | As of [[Timeline|January 29, 2011]], he revealed to have two [[Untethered jailbreak|untether exploits]]. News of release have not been revealed. On December 27, 2011 he released an untether for iOS 5.0.1 for [[S5L8940|A4]] devices. His untether is now built into [[redsn0w]], [[PwnageTool]] and a Cydia package called [[corona]]. |
||
+ | |||
+ | == Credits == |
||
+ | * [[0x24000 Segment Overflow]] |
||
+ | * [[usb_control_msg(0xA1, 1) Exploit]] |
||
+ | * [[Corona]] |
||
+ | * [[Racoon]] |
||
+ | * He was the first to [https://twitter.com/pod2g/status/23932796062 tweet the IMG3 keys] for [[iBSS]] for [[iOS]] 4.0.1 on the [[n90ap|iPhone 4]]. (exploit??) |
||
+ | * As of [[Timeline|January 29, 2011]], he revealed to have two [[Untethered jailbreak|untether exploits]]. News of release have not been revealed. On December 27, 2011 he released an untether for iOS 5.0.1 for [[S5L8940|A4]] devices. His untether is now built into [[redsn0w]], [[PwnageTool]] and a Cydia package called [[corona]]. (to be replaced with exploits) |
||
+ | * ...to be completed... |
||
+ | |||
+ | == Appearances and Presentations == |
||
+ | * HiTB Amsterdam 2012 |
||
+ | * HiTB Malaysia 2012 |
||
+ | * WWJC 2013 |
||
+ | |||
+ | == Publications == |
||
+ | * magazine (french, will be added) |
||
== External Links == |
== External Links == |
Revision as of 17:42, 19 January 2013
pod2g, with real name Cyril Cattiaux, is an iPhone hacker living in France, who has discovered several bootrom exploits. He was formerly part of the Chronic Dev Team, but left for personal reasons. Later he was part of the Dream Team when it emerged.
When asked about how he finds all these vulnerabilities, he always answers "by luck" and even explains the Racoon config file as an example, but having so much luck seems to be impossible. He is considered as one of the most talented iOS hackers ever.
In January 2013 he released his first app (podDJ) officially on the AppStore, although he did not leave the hacking scene.
Credits
- 0x24000 Segment Overflow
- usb_control_msg(0xA1, 1) Exploit
- Corona
- Racoon
- He was the first to tweet the IMG3 keys for iBSS for iOS 4.0.1 on the iPhone 4. (exploit??)
- As of January 29, 2011, he revealed to have two untether exploits. News of release have not been revealed. On December 27, 2011 he released an untether for iOS 5.0.1 for A4 devices. His untether is now built into redsn0w, PwnageTool and a Cydia package called corona. (to be replaced with exploits)
- ...to be completed...
Appearances and Presentations
- HiTB Amsterdam 2012
- HiTB Malaysia 2012
- WWJC 2013
Publications
- magazine (french, will be added)