Last month, popular jailbreaker MuscleNerd had announced on Twitter that RedSn0w could be made open source soon. This was followed by another announcement by the Chronic Dev Team that Greenpois0n too was being made available as an open source script. The team in fact went ahead to release the open source script for download earlier this month.
Following these developments, we now have Sn0wbreeze 2.1 for iOS 4.1 jailbreak too available for download. You may be aware that Sn0wbreeze is the Windows equivalent of PwnageTool that lets you jailbreak your iDevice. With this download, enthusiasts can now download, modify and rebuild new jailbreaking applications using the available source code. Of course, you will have to subscribe to the terms and conditions set forth by the General Public License.
The source code for Sn0wbreeze 2.1 can be downloaded from Github by clicking here.
Last month the Chronic Dev Team announced that they shall soon be making the code of the popular Greenpois0n jailbreak application public. The jailbreak code was being made open source under terms and conditions laid down by the GNU General Public License.
The jailbreak team have lived by their promise. The Greenpois0n jailbreak code for iOS 4.1 is now public and is available for download. In case you were not aware, Greenpois0n makes use of an exploit that was first discovered by George Hotz aka GeoHot for his Limera1n release. With this new release, you may download, modify or enhance the application that may bring more improved jailbreak tools to the hands of users.
Check out this link to download the open source code. In case, you are here to simply get started on the iOS 4.1 jailbreak process, you can read our related articles in our web slideshow by clicking here.
The iPhone Dev Team have released an enhanced version of the Redsn0w software that was released last month that let users of iPhone 3G and iPod Touch 2G to jailbreak iOS 4.1 on their devices. The new Redsn0w 0.9.6b2 is capable of jailbreak all the iOS devices including iPhone 4, iPod Touch 4G and the iPad. The Dev team writes,
In the meantime, we’ve also incorporated the limera1n exploit into redsn0w. But we’ve added a few extras:
- custom bootlogos for iPhone3G/iPhone3GS/iPod2G users (with qualifying bootroms)
- an option that implements the “DFU” button in PwnageTool. This button (which you can use from Windows) lets you prepare your device for a custom DFU. Even if you’re purely a Windows user, you can get a trusted friend to run PwnageTool over your IPSW to create a custom IPSW. You can now install that custom IPSW on your own Windows box, after you run this redsn0w version.
The latest release is available for both the Windows and Mac platforms and makes use of the very same Limera1n exploit that was used by George Hotz as well as the Chronic Dev team in their jailbreak releases. You can hit this link to read more about the latest update as well as on other important instructions.
In late September, iPhone users in New Zealand were awakened an hour earlier than scheduled due to a bug in the iPhone alarm. The bug apparently hit the users after the country switched to Daylight Savings Time. A week later, users in Australia too reported the issue. Now, as Europe and large parts of Northern Hemisphere made their shift from DST to Standard Time, the iOS bug has hit once again. But unlike the issue faced by the users down under, European users have been complaining that the alarm seems to be going off an hour late – if you are late to work or school, show the authorities this news piece for excuse!
Interestingly, it is not just Europe. Users in North America; particularly USA are also complaining about starting to notice the bug. This is despite the fact that Standard Time does not begin at least a week from now. The reason is because the iPhone is apparently hardcoded with the DST switchover dates which were apparently pushed back by a week a few years back in some places. As a result, the American users are seeing the bug ahead of schedule.
If you are “bugged” by this issue, there are two alternatives – Either schedule your alarm an hour earlier or move away from recurring alarms for the time being. Setting the clock manually everyday does not cause this problem. Eitherway, the issue is only a short term inconvenience since the bug shall be fixed with the upcoming version of iOS that is expected to be released in the next week.
Yet another security flaw on the iOS 4.1 has been discovered. And this time it will let users bypass the mandatory input of passcode to let users access private details like contacts list, recent calls, voicemails,etc. The security bug will also let users send emails and MMS messages without having to know the passcode.
How do you do this? Simple. Users simply have to tap on the ‘Emergency call‘ option in the Passcode window and once here, dial a non-emergency number like #### followed by a tap on ‘Send‘ and quickly followed by pressing the iPhone lock key. This will force the user on to the iPhone’s phone application from where all these private details can be accessed.
Check out a video demonstration of the bug.
Do not expect an immediate resolution of this bug though. Apple is expected to release the new iOS 4.2 early next month and it is possible that the bug is attended to only in this update. Or probably later.
George Hotz, known as GeoHot to the jailbreaking community, has announced that a Mac compatible version of the iOS 4.1 jailbreak tool, the Limera1n is now available for download. With this, users of PC as well as Mac computers can now connect their iDevices to a computer to jailbreak the iOS platform.
The past one week has been extremely eventful for the iPhone jailbreakers. Posixninja, another popular jailbreak team was all set to bring their SHAtter exploit based jailbreaking solution to the iPhone before GeoHot one-upped them by launching his own version of jailbreaking software. This has forced the Dev Team to save the exploit for a later date and have modified their jailbreak solution to make use of GeoHot’s exploit. A Mac solution from Posixninja is still awaited.
Nevertheless, if you are a Mac user waiting to jailbreak your iPhone 4 immediately, hit this link to proceed to the Limera1n website. Jailbreaking is dangerous and you know it. So you proceed at your own risk.
The title says it all, doesn’t it. Just days after the Chronic Dev Team announced a modified version of their Windows-only GreenPois0n jailbreak tool that will break into the iOS 4.1 platform on iPhones and other iDevices, they have announced that the jailbreak application variant for the Linux platform too is now available. This makes the OS X as the only platform that is yet to get a solution from the Chronic Dev Team. However, the team of jailbreakers have assured their users that the OS X version too shall be releasing soon. The exact date was not revealed,
“Mac release is being worked on. Some technical difficulties must be resolved. We have no ETA for the Mac release besides “soon”. Bad things seem to happen when we give ETAs.”
We will let you know when that happens.
You must be aware that the new Apple TV runs on the new iOS 4.1 that makes it technically jailbreakable. In fact, the iPhone Dev Team, whose Greenpois0n jailbreak tool with SHAtter exploit was supposed to release yesterday (and whose release has now been postponed) had revealed that their upcoming Greenpois0n tool should be capable of jailbreaking the Apple TV as well.
Well, it looks like GeoHot had overtaken the Dev Team on this one as well. In a recent blog post, George Hotz has noted that his newly released Limera1n application should be able to jailbreak the new Apple TV. Hotz wrote,
“AppleTV is technically supported, but there’s no apps yet”
Interestingly, Erica Sadun from TUAW has also confirmed that she was able to use the Limera1n exploit to get her Apple TV into DFU mode. She writes,
” I can confirm that I put my ATV2 into DFU mode and was able to “jailbreak” it. But since no AFC services or OpenSSH were installed (let alone APT), there’s nothing that really can be done with it at this time.”