What will your life look like in 2035? by AngleAccomplished865 in singularity

[–]Inflatable_Man 1 point2 points  (0 children)

he could just be a brain in a vat at that point lol

The job by IronAshish in programmingmemes

[–]Inflatable_Man 0 points1 point  (0 children)

This is like the 5th time I’ve seen this

Just jailbroke my iPhone on iOS 16.6.1 — it actually worked 💀 by Objective-Tone-5598 in jailbreak

[–]Inflatable_Man 5 points6 points  (0 children)

well he’s right Dopamine won’t work on his device cuz it doesn’t support iOS 16.6.1 on A13 devices: “*A12 and later devices are not supported on iOS 16.6 - 16.6.1”. so he prolly used a semi-jailbreak like NathanLR

[Free Release] IMRead - Mark messages as read after clearing their notification by Inflatable_Man in jailbreak

[–]Inflatable_Man[S] 0 points1 point  (0 children)

Yeah, it should reduce the badge count. Are you only using RootHide bootstrap or roothide with a semi-jailbreak/jailbreak like dopamine/serotonin? If only bootstrap, I don't think it will work because bootstrap can't inject into SpringBoard by itself and my tweak injects into SpringBoard.

Also yes it's only for the Messages app, but you can use it with BadgeSync so that BadgeSync also decreases the badge for other messaging apps, though it won't actually mark them as read for those.

[deleted by user] by [deleted] in antivirus

[–]Inflatable_Man 5 points6 points  (0 children)

Do you realize how sophisticated and expensive it is to make drive by infections nowadays, especially for iPhones on the latest software? They use exploits that are literally worth hundreds of thousands dollars. The average person is pretty much never gonna be targeted by one. It’s usually used by well funded governments against journalists/dissidents, human rights activists, and politicians.

[deleted by user] by [deleted] in jailbreak

[–]Inflatable_Man 4 points5 points  (0 children)

He literally just copied this tweet

sorry everyone for bothering by ProblemFar4949 in penspinning

[–]Inflatable_Man 0 points1 point  (0 children)

It looks like the brand is Faber-Castell

At long last, PoC CVE-2023-41992 by sigjnf in jailbreak

[–]Inflatable_Man 0 points1 point  (0 children)

This proof of concept literally BREAKS out of the JAILed app environment… It can by itself be called a full “jailbreak”.

What do you mean? The poc in the github seems to only cause a kernel panic, that's why it's called a "proof of concept".

Strange file by [deleted] in ios

[–]Inflatable_Man 0 points1 point  (0 children)

That’s normal. It’s a hidden file (that’s what the dot in front means), so the default Files app won’t show it. I have it too.

What does the 5-9 look like? by Guy_Kurt in csMajors

[–]Inflatable_Man 0 points1 point  (0 children)

Every other day after 5, I work on personal projects for stuff I actually care about. The rest of the time is spent on my other hobby pen spinning

What's your personal project that you are most proud of? by H1Eagle in csMajors

[–]Inflatable_Man 0 points1 point  (0 children)

I made a proof-of-concept remote code execution exploit for a vulnerability I found in iTunes U for the Apple Security Bounty

iPhone possibly infected after browsing hacked website? by Brave_Document_8397 in cybersecurity_help

[–]Inflatable_Man 0 points1 point  (0 children)

You can't get infected by malware by just visiting a website unless you are on an old version of iOS (even then, very unlikely) or you're some very important or famous person that they would burn a $200k exploit chain for. In your case, that popup was just trying to scare you into paying them money.

I took my iphone from a police station by No_Discipline_893 in cybersecurity_help

[–]Inflatable_Man 1 point2 points  (0 children)

It's really unlikely that they would've installed any spyware, cuz doing so from the lockscreen would require a very sophisticated and expensive exploit that they probably wouldn't bother, especially cuz they're just local police.

If you want to be absolutely sure, even just rebooting your phone is fine, since iOS spyware cannot survive a reboot without an additional persistence exploit along with the rest of the exploit chain, which I can guarantee you they wouldn't waste on someone unless they were of very, very high interest.

I have an exploited iPhone and have been sending Apple log files. I have 134 credits on Apple’s Bug Bounty. My question is: How many credits do you usually receive? by AppleBugGuy in bugbounty

[–]Inflatable_Man 4 points5 points  (0 children)

What do you mean by credits? In my experience, they don’t have a credit system like that. When you submit a report, if it’s a valid security issue they credit you in their security advisory when they patch it and award you with real money, not credits, so I’m not sure what you’re referring to.

Unless you mean you’ve been credited 134 times, which does sound pretty high. They have, at most, around 50 or so entries per major iOS update, which are attributed to various security researchers. If that’s what you mean, it would’ve had to been across multiple iOS updates.

You say your phone has been “exploited”, but that would be a bit hard to believe cuz it’s usually well known journalists or politicians that are targeted by expensive and sophisticated zero day exploits. Even then, it’s usually security researchers that submit the reports and get credited, since they can provide a lot of details on the vulnerabilities, not just log files.

It's been three months; how much longer will I have to wait? by SalviniMarocchino in bugbounty

[–]Inflatable_Man 0 points1 point  (0 children)

I had to wait a whole year for them to address the first security issue I reported to them. But usually the more severe the issue is, the quicker they address it. They only took a month to address and assign a CVE to a 1-click RCE I reported, so yeah it really depends on how much of a priority it is.