-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
0x06b - Upgrade Jailbreak section #1943
Conversation
cpholguera
commented
Oct 15, 2021
- update basic testing setup
- upgrade the jailbreak section to make it more up-to-date and at the same time timeless (include most complete sources for jailbreakable devices/versions)
- include links to other relevant chapters
…it more up-to-date and at the same time timeless. Include links to other relevant chapters.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A few small changes and it's good to go :)
@@ -103,31 +66,77 @@ There are *tethered*, *semi-tethered*, *semi-untethered*, and *untethered* jailb | |||
|
|||
- Semi-untethered jailbreaks allow the device to boot on its own, but the kernel patches (or user-land modifications) for disabling code signing aren't applied automatically. The user must re-jailbreak the device by starting an app or visiting a website (not requiring a connection to a computer, hence the term untethered). | |||
|
|||
- Untethered jailbreaks are the most popular choice for end users because they need to be applied only once, after which the device will be permanently jailbroken. | |||
- Untethered jailbreaks are the most popular choice for end users because they need to be applied only once, after which the device will be permanently jailbroken. They are very rare and usually benefit from hardware-based vulnerabilities, such as the [limera1n exploit](https://www.theiphonewiki.com/wiki/Limera1n "limera1n exploit") which directly affected the BootROM of the iPhone 4 and iPad 1. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Isn't the fact that it's untethered because there are additional vulnerabilities that allow you to write persistent code somewhere that is not part of the secure boot chain? (rather than the fact that the vulnerability itself is in HW, because Checkra1n is also in bootrom, but non persistent)
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! 🍀