Comex – developer of JailbreakMe – the popular web-based method to jailbreak iOS 4.0.x has just updated the JailbreakMe website, indicating that he may release an updated version of JailbreakMe (probably JailbreakMe 3.0) – the popular browser-based jailbreak tool.
0n1c has demonstrated a working untethered jailbreak for iOS 4.3.1. Previously, i0n1c also demonstrated the same untether working on iOS 4.3. Below you can read his description of the video and his plans for release.
In the video you can see how I switch off the iPod, then restart it, show the version, show that it is tethered and has the multitasking gestures, i show that you can buy ringtones and then I show cydia and the ninja jump game from last time.
You knew this was coming — it was only a matter of time — and here it is, Apple’s latest creation sans the iOS 4.3 chains. The development community credits @comex with installing Cydia on this white iPad 2, and he’s apparently already hard at work on a public jailbreak. According to his Twitter feed, the hack required a brand new exploit, as previous bugs were squashed in iOS 4.3. We’ll keep you posted on when the hack’s ready for you to use, too.
If you accidentally upgraded your unlocked iPhone to iPhone OS 3.1.3 that was released two weeks back then we have another good news.
Geohot, the iPhone hacking expert who had released popular jailbreaking and unlocking tools like blackra1n, blacksn0w and more has discovered a working exploit for baseband 05.12.01 that was bundled with iPhone OS 3.1.3.
Geohot has tweeted the hash tag of the baseband crash for safekeeping:
d8b50dc95d7906e3ff6155331a534b55d0f6cac1=good. And motorama this weekend!
You might remember that Sherif Hashim had also discovered an exploit for iPhone OS 3.1.3 baseband last week and MuscleNerd of the iPhone Dev Team had confirmed that it is working.
iHackintosh has also published the conversation between Visnet (iHackintosh reader), Geohot and MuscleNerd:
<visnet_> What does geohot tweet mean?
<%geohot> its my bb exploit for safekeeping
<%Par4doX> geohot: did you turn that over to the dev team or are you doing something with it?
<%geohot> my days of turning things over are done
<%geohot> i hope its different from the one they have
<%geohot> but they prob already have it
<%geohot> its the one i orig wanted to release blacksn0w with
<%Par4doX> it’s still there in the new bb
<%geohot> yep, just checked
<%geohot> but then opted to use xemn since it was public
<Evan> Oo, it carries over from 05.11 to 05.12?
<%geohot> why wouldn’t it, apple doesn’t fix things proactivly
<@MuscleNerd> geohot we prob should figure out a way to know if we have same exploit double blind, otherwise we may release 2 different ones at same time
<%geohot> any suggestions?
<@MuscleNerd> not sure how to do that without making it easy to brute force though
<%geohot> yea, i salted the hash
<@MuscleNerd> hmm maybe if we both hash the stack dump
<@Confucious> Can you two take this out of public sight?
<@MuscleNerd> the stack itself, not the header before it or the registers after it
<Her> muscle: any notice about the exploits are the same ?
<%geohot> we are working on it
<%geohot> cryptography, perfect for people who don’t trust each other
The conversation indicates that both the iPhone Dev Team and Geohot have a working exploit for the latest baseband and could release tools to jailbreak and unlock iPhone OS 3.1.3.
[via iHackintosh, Geohot’s Twitter page]