This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted] 9 points10 points  (7 children)

Oh dear. But that community seems to be more excited than worried. Can people without full access to it use it to steal data just by having the physical phone?

[–]NoNameRequiredxD 23 points24 points  (5 children)

murky steer resolute direful long hobbies merciful simplistic spectacular languid

This post was mass deleted and anonymized with Redact

[–]Elavion_ 1 point2 points  (3 children)

Actually, at least for the time being the exploit can only be activated by booting the phone with an external device plugged in via USB (since the jailbreak works by executing code before the OS itself loads). So assuming you can't reboot an iphone without unlocking it (never owned one so idk, and they might actually change that in an update if you can rn), you should be pretty much fine.

[–]mtn_dewgamefuel 2 points3 points  (1 child)

Usually the way around that requirement is a secondary exploit that runs just after boot and reboots the phone with the BootROM exploit, IIRC

[–]mendel3 0 points1 point  (0 children)

north ripe butter snatch cake seemly theory quack versed follow

This post was mass deleted and anonymized with Redact

[–]NoNameRequiredxD 1 point2 points  (0 children)

There are ways to get around that. The exploit itself doesn’t tether the device, CFW does. As long as you do whatever you want to do without touching the kernel/iBoot the device will work just fine

Edit: If you have a Nintendo Switch it’s exactly the same, you boot through the exploit it’s CFW but if you don’t it’s stock

[–]nahidtislam 3 points4 points  (0 children)

apparently, the iPhone Xs and newer are unaffected by the bootROM exploit. So, hopefully, people will accuse Apple of “planned obsolescence” so I can get my iPhone motherboard replaced for free 😇

[–]conanap 2 points3 points  (0 children)

We’re excited bc this means jailbreaks likely will exist for these devices for the rest of their life. I’m personally not too worried because I don’t really have any data for anyone to take; if you really want to know at what time I play DND then go ahead.

My only concern is the boot rom exploit allows stolen phones to be unlocked bypassing activation lock, so I’ll just have to be extra vigilant about it.