Tuesday, January 3, 2012

Pod2G Explains How His A4 Untethered JB Works

Pod2G has released a take a break post on his blog after the horrendous release of the A4 untethered jb on iOS 5.0.1 and waiting for the A5 JB to come.

The post is explaining the strings of technical steps he took to make the A4 untethered jailbreak became possible, and then the "Corona 5.0.1 untethered JB" was produced based on it. He posted a lengthy article and almost went into details about how.

Hmm unfortunately no mention of A5 Untethered Jailbreak on that post, let alone its ETA. But you will get a fruitful knowledge by reading it if you have interest in jailbreak activity, who knows you will be getting an inspiration or material to make your own JB tool in the future.

This is a quoation I took from Pod2G post:

And he managed to find a trick to get unsigned code at boot without using the Mach-O loader. This is the path he took to find vulnerabilities on Apple binaries that he could call using standard launchd plist mechanisms.

And of course it is useful post however from the most comments I red on that post, I feel a blatant disappointing and dissatisfaction from the people who are expecting the release of A5 untether Jb.


Post a Comment