0:00
what's going on youtube gsn right here
0:02
so in today's video we have some good
0:03
news for the jailbreak community
0:05
especially for those of you on 14.7 and
0:07
lower on all devices this video is
0:09
brought to you by any trans a software
0:11
that allows you to drag and drop files
0:13
directly to your phone from your
0:14
computer you can also manage the photos
0:16
music videos and apps in one single
0:18
application check it out in the links
0:20
below so just a couple of hours ago
0:22
justin sherman posted quote this
0:24
semester i decided to do an independent
0:26
study which is a semester-long project
0:28
that counts for credits like a clasp
0:30
would my project is a kernel exploit for
0:35
plus a write-up i just finished the
0:37
exploit and popped 14.6 and 14.7 on my
0:40
phones right up ata soon and they posted
0:42
a couple of pictures showing basically a
0:44
connection via ssh and the exploit
0:47
running on their devices and apparently
0:49
succeeding to get rude so this seems to
0:51
be interesting it seems to work on 14.7
0:53
14.6 and lower and this has made some
0:56
headlines on i download blog and so on
0:59
but there are some issues with it but
1:00
first can this be used for jailbreak
1:02
purposes the answer is yes it can
1:05
however there are drawbacks as always so
1:08
the first drawback is that you need a
1:09
special entitlement in order to be able
1:11
to basically get code execution with
1:14
this in here so you need a special
1:15
entitlement which only webkit has now
1:18
this has been discussed by xero's design
1:20
here one of the developers in our
1:21
community so they said quote so cool
1:23
does your exploit still require
1:25
injection into web content or is it
1:27
usable as it is talking in terms of this
1:29
being used for a public jailbreak and
1:31
they have replied with this quote yeah
1:33
it still needs the entitlement to access
1:35
the vulnerable code path but then xero's
1:37
design says in here quote ah i see still
1:39
super cool your exploit could still be
1:41
very useful for jailbreaking 14.6 and
1:43
14.7 semi untethered when linus hands it
1:46
drops the mtether project in a few days
1:48
and for those of you who do not remember
1:50
linus hensey has demonstrated an
1:52
untethered jailbreak a couple of weeks
1:54
ago and they said that they're going to
1:56
open source this on october 21. that's
1:58
basically in a couple of days so we're
2:00
going to get a massive exploit from here
2:04
that we can definitely use for jailbreak
2:05
purposes and we can chain with other
2:07
things with this we might even be able
2:09
to get taurine or uncover as untethered
2:12
which means no retail breaks no signing
2:15
no resigning and stuff like that no
2:17
expiration you just jailbreak once and
2:19
your device keeps re-jailbreaking itself
2:21
every time you reboot it with no user
2:23
intervention that kind of an exploit is
2:25
actually pretty rare nowadays but this
2:27
one is going to work only on ios 14.5.1
2:30
14.5 14.4.2 14.4.1 14.4 and according to
2:35
linus hansey some bhs of 14.6 will also
2:39
be supported but the final version will
2:42
not so only the early betas it has been
2:44
patched after that so this in
2:46
combination with the exploit by justin
2:48
shearman can actually yield a proper
2:50
jailbreak however they mention in here
2:52
that there are some drawbacks to that as
2:54
well the fact that we would have to fine
2:56
tune for each device because this was
2:58
more intended for research than a public
3:00
jailbreak from my understanding they
3:02
mean that the express requires specific
3:04
offsets for specific devices or
3:06
different combinations of devices but
3:08
that's fine we did that for most of the
3:10
exploits we had you need to find the
3:12
offsets for each device or create an
3:14
offset finder that would do that for you
3:16
so that's not really a problem for the
3:18
jailbreak community and at the end of
3:20
course xero says quote understandable it
3:22
seems like this might still be the best
3:24
we've got since the newer io mfb bug is
3:26
apparently problematic the exploit on
3:28
a14 and a15 for those of you unaware the
3:31
a15 and a14 are basically the iphone 13
3:34
and the iphone 12. the previous exploit
3:36
we discussed in another video has
3:38
problems being exploited on those
3:40
devices while this one by justin
3:42
shearman would not so yeah even though
3:44
this requires some offset and some
3:46
maneuvers to be made in order to use it
3:48
for a jailbreak it's still usable it's
3:50
still something good and it's still
3:52
valuable for the jailbreak community and
3:53
i'm glad that they will be releasing
3:55
this kernel exploit because it's still
3:57
better than nothing so once released
3:59
this would actually target all devices
4:02
including the iphone 13 13 pro 13 mini
4:05
12 12 pro sc 2020 11 and so on so not
4:08
only older devices which is great
4:10
especially for the ios 14.6 beta and
4:13
14.5.1 14.5 14.4 and so on now for the
4:17
rest of the devices this would work up
4:19
to 14.7 and we might be able to use it
4:22
there but it needs chaining so i'm going
4:24
to keep you posted on that thank you for
4:25
watching ings now till the next time
4:27
subscribe to stay updated and peace out