Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The installer works by exploiting a bug in the way Safari handles PDF files.

A couple years ago, jailbreakme.com was also live but used a TIFF exploit.

If you want to see the actual exploit files, go to: http://jailbreakme.modmyi.com/_/ and you will see a list of PDF files by device and OS version.



Thank you for providing this, I love this stuff. What site do you read to keep up to date with these things?


I have found the Dev-Team blog to post authoritative information about each iPhone jailbreak.

http://blog.iphone-dev.org/


Alright so using a pdf analysis tool, here is what it spits out:

http://pastebin.com/hCKtL8qC

Some of that looks like Obj-C to me, what's the other stuff?


Out of curiosity...does this information make it easy for apple to stop this method of jb-ing? If so, why publicize details?


The information is very useful for education, and Apple really should fix this, since it's a way to root the device by viewing a PDF.


Using this exploit is it possible to install any app ? I mean by passing the app-store ?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: