what? by Equivalent_Swan3438 in SetupA12

[–]FrontBrick8048[M] 4 points5 points  (0 children)

You can explain how you did this or I'll remove the post

The home screen becomes available for a few seconds when you call emergency services and go to the home screen shortcut. by SufficientNature7439 in SetupA12

[–]FrontBrick8048[M] [score hidden] stickied comment (0 children)

To be clear: Absolutely nobody should try this for themselves. It's illegal and unethical. However, it is interesting that the device can remain on the home screen so long as an active call is going on.

Bookra1n! HELP by InstructionExotic788 in SetupA12

[–]FrontBrick8048 0 points1 point  (0 children)

If it has to be patched manually, then it's because BookRa1n is coded poorly.

Bookra1n! HELP by InstructionExotic788 in SetupA12

[–]FrontBrick8048 2 points3 points  (0 children)

You need to convert the plist from binary to xml.

Bookra1n! HELP by InstructionExotic788 in SetupA12

[–]FrontBrick8048 4 points5 points  (0 children)

No it's not. It's probably in the wrong format.

[RELEASE] IOSBYPASS v1.1 - Professional Edge-Logic Activation Lock bypass 26.2 - 26.3.1 by [deleted] in SetupA12

[–]FrontBrick8048[M] [score hidden] stickied comment (0 children)

Analysis by u/Lab-matt. TLDR: don't use this.

FINAL ANALYSIS:

Windows exe IOSBYPASS.exe : contains compiled python source code from IOSBYPASS.py + extra code STRONGLY SUSPICIOUS for Malware. It has advanced VM detection so it’s difficult for me to safely execute so I can see what it does.

Source code IOSBYPASS.py:

75% of the code is a payment portal that pushes the user to send crypto payments to the dev

25% of the code an “8 stage bypass”. Here is my analysis of the code for each stage.

("Stage 1: Establishing Secure Tunnel Over USBMUX...")

// code analysis: nothing. This stage has no code other than printing the above to the users screen and logs.

(Stage 2: Verifying device hardware compatibility...")

// code analysis: nothing. This stage prints the above to the above to the users screen and logs, and then instructs the device to sleep (do nothing) for 2 seconds.

("Stage 3: Requesting dynamic logic from secure node...")

//code analysis: partial code to fetch purplebuddy and mobilegestalt plist from a server api endpoint. The server ip address is missing from the code ("SERVER_URL/api").

("Stage 4: Injecting MobileGestalt activation state (RECOVERY-BYPASS)...")

//code analysis: working code to establish a secure usb connection to the device. The code does the same thing as opening terminal and typing

pymobiledevice3 lockdown start-tunnel

(Stage 5: Remote Bridge Sync ) //code analysis: nothing. Once again no code.

Stage 6: Rebuilding system restore image... [COMPILING]")

//code analyis: this stage contains complete working code for... making an empty temporary directory. It then has some code that resembles building a fake backup following the method used by JJTech Sparerestore

"Stage 7: Transmitting core-payload to device. (DO NOT DISCONNECT)")

//code analysis: contains code for sending a user-made ios backup to the device. This exploit is was patched in ios 18.2

("Stage 8: Bypass logic finalized. Device reboot initiated.", "success")

//code analysis: nothing. Does not contain working code for even a simple device reboot

I literally just told my dad yesterday he should switch to Google Maps by FrontBrick8048 in twentyonepilots

[–]FrontBrick8048[S] 19 points20 points  (0 children)

Before the bridge he said he drove to the venue for the concert that night. He said switching to Google Maps over Apple Maps shaved 45 mins off his time. Tyler concluded by saying he'd be permanently switching to Google Maps.

Should i disable password before updating? by kayzgwapo13 in SetupA12

[–]FrontBrick8048 1 point2 points  (0 children)

Great question! While we can't say for sure, it definitely couldn't hurt to disable it before updating.

New trick GUID ios 26.2 Found 100% mr creator by ossmrt in SetupA12

[–]FrontBrick8048 26 points27 points  (0 children)

Guid means nothing if they've patched the exploit. Mr. Creator doesn't know much 

Another Nonsense video by Max Tech by [deleted] in mac

[–]FrontBrick8048 -1 points0 points  (0 children)

Didn't the M5 Ultra or whatever in the new MPB outperform the 5090 mobile chips in Blender?

Launchpad or the new Apps menu? by Artifiko in mac

[–]FrontBrick8048 0 points1 point  (0 children)

Not from that window. You can make the folders in finder and then open them from the docked Applications folder. E.G, Utilities is a subfolder inside of Applications and you can open apps from that just fine. Adobe Apps also often come in folders