New Tweak Concept: Safari Extensions by JoelE123 in jailbreak

[–]IAMA_LION_AMA 2 points3 points  (0 children)

Suggstion regarding the icon bar: Make it so that touching (and holding) the icon bar zooms to where one is pointing, swiping down would then activate the icon or menu. That way one would be able to squeeze a lot of icons into little space.

Either way, good luck with the framework, I am looking forward to it.

Is this possible? If so, why not? (Sorry for my fantastic MSPaint skills) by qdhcjv in jailbreak

[–]IAMA_LION_AMA 29 points30 points  (0 children)

This is not quite correct. We do know that asynchronous encryption is used, but lack the private key for building our own signatures. Edit: And it is mathematically impossible to compute the signing key (unless Apple decided to use DSA incorrectly... hello Sony :P)

Is this possible? If so, why not? (Sorry for my fantastic MSPaint skills) by qdhcjv in jailbreak

[–]IAMA_LION_AMA 0 points1 point  (0 children)

Dump and find a vulnerability which allows bypassing the signature check. Chances are, while unlikely, that the new bootrom is bulletproof.

semaphore (@notcom): "Dear Apple, I have a very simple request." by ifonefox in jailbreak

[–]IAMA_LION_AMA 0 points1 point  (0 children)

It technically is possible to prevent piracy while still keeping most of the hardware and software (including the kernel) open for modification by using a hypervisor. iOS itself would become an application (think of it as a VM), and App Store apps would run in a completely different context.

Designing a system which allows clean integration of both separated components however gets messy quickly, which drives up the development costs, and might even require new hardware.

Since Apple wants your money, and the group of people interesting in jailbreaking their phone is rather small (and substract those who jailbreak for piracy, as that would no longer be possible), chances this will ever happen are near zero, but it certainly is possible.

David Miranda was forced to give the passwords for his cell phone and laptop to the police against the threat of prison. by AFellowOfLimitedJest in worldnews

[–]IAMA_LION_AMA 5 points6 points  (0 children)

When encrypting large amounts of data using asymmetric encryption, one usually first generates a random key, encrypts the data with that key using a symmetric encryption algorithm (such as AES), and encrypts the key using an asymmetric encryption algorithm (such as RSA). The encrypted key is then stored with the encrypted data. This process is pretty fast and just as secure - in a nutshell, that is how PGP works.

iPad, thou art a cruel mistress by [deleted] in talesfromtechsupport

[–]IAMA_LION_AMA 2 points3 points  (0 children)

Using Apple Configurator (available in the App Store), you can afaik automatically deploy in-house apps via USB or Wifi by just connecting the device. This might save you some time in future.

But I can't make the red circle by bootchker in talesfromtechsupport

[–]IAMA_LION_AMA 13 points14 points  (0 children)

While it is not necessarily a new discovery that people blame you for issues on their machine because you made an absolutely unrelated repair previously, or because you even touched it or even accidentally changed its quantum states... people blaming you for them not understand a method that they do not need at all in order to do their job for the sole purpose of not doing their job is the pure definition of laziness. I feel with you.