Feeds

Jailbreak hole in iOS 4.1 will be hard to close

All Steve Jobs's horses and all Steve Jobs's men ...

Secure remote control for conventional and virtual desktops

Just hours after Apple released iOS 4.1 to great fanfare, hardware hackers found a way to jailbreak devices that run the new operating system. More surprising still, there doesn't appear to be anything Steve Jobs can do to stop them in the near future.

The exploit in the boot ROM of iOS devices was first announced by iPhone Dev-Team member pod2g. It was soon confirmed by other hackers, who said that because the exploit targets such a low-level part of the operating system, Apple won't be able to stop jailbreakers without making significant hardware changes.

That's in stark contrast to previous jailbreak holes, such as the one exploited for weeks on a site called Jailbreakme.com. That hack relied on two software bugs in iOS, allowing Apple engineers to stop the jailbreaking with a simple update. Ironically, an even earlier jailbreak known as the 24kpwn exploit was eliminated by tweaking iPhone 3GS phones to add — you guessed it — the vulnerable boot ROM.

All iPhones, iPod touches, and iPads that have shipped since November contain the same component.

Dev-Team members say there is still work to be done to fine-tune the exploit technique and that would-be jailbreakers are best served by forgoing the update to 4.1 for now. The admonition comes after they called iOS 4.1 a trap designed to prevent future jailbreaking and unlocks. ®

Build a business case: developing custom apps

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?