TE
TechEcho
StartseiteTop 24hNeuesteBesteFragenZeigenJobs
GitHubTwitter
Startseite

TechEcho

Eine mit Next.js erstellte Technologie-Nachrichtenplattform, die globale Technologienachrichten und Diskussionen bietet.

GitHubTwitter

Startseite

StartseiteNeuesteBesteFragenZeigenJobs

Ressourcen

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. Alle Rechte vorbehalten.

Tachy0n: The Last 0day Jailbreak

262 Punktevon todsacerdotivor 4 Tagen

8 comments

yjftsjthsd-hvor 4 Tagen
&gt; The way he managed to beat a trillion dollar corporation was through the kind of simple but tedious and boring work that Apple sucks at: regression testing.<p>&gt; Because, you see: this has happened before. On iOS 12, SockPuppet was one of the big exploits used by jailbreaks. It was found and reported to Apple by Ned Williamson from Project Zero, patched by Apple in iOS 12.3, and subsequently unrestricted on the Project Zero bug tracker. But against all odds, it then resurfaced on iOS 12.4, as if it had never been patched. I can only speculate that this was because Apple likely forked XNU to a separate branch for that version and had failed to apply the patch there, but this made it evident that they had no regression tests for this kind of stuff. A gap that was both easy and potentially very rewarding to fill. And indeed, after implementing regression tests for just a few known 1days, Pwn got a hit.<p>And now I wonder how many other projects are doing this. Is anyone running a CI farm running historical vulnerabilities on new versions of Linux&#x2F;FreeBSD&#x2F;OpenWRT&#x2F;OpenSSH&#x2F;...? It would require that someone wrote up each vulnerability in automated form (a low bar, I think), have the CI resources to throw at it (higher bar, though you could save by running a random selection on each new version), care (hopefully easy), and think of it (surprisingly hard).
评论 #44085028 未加载
评论 #44084146 未加载
评论 #44084820 未加载
评论 #44085321 未加载
0x38Bvor 4 Tagen
&gt; forget everything you know about kheap separation, forget all the task port mitigations, forget SSV and SPTM<p>This is like when you’re speaking in a foreign language with a friend and getting along fine, but in the next sentence they begin describing brain surgery or nuclear physics, and your understanding falls off a cliff.<p>Or that time I tried to interpret a conversation about blast furnace renovations.<p>As far as jailbreaks go, I’m sad it’s not a thing anymore; I don’t think I ever did anything useful with my jailbroken iPad, but it was fun. Today I’d install a tethering app and UTM + a JIT solution (1).<p>1: SideStore looked promising, but my account was once a paid Apple Developer account and I have 10 app IDs that won’t expire, so I can’t install any apps like the aforementioned UTM, unless I make a new account or pay again.
评论 #44086627 未加载
weinzierlvor 4 Tagen
I&#x27;ve heard Apple pays a million for Jailbreaks now. That&#x27;s the lower bound for the price on the free market.
评论 #44084598 未加载
评论 #44084746 未加载
评论 #44084509 未加载
Tachyooonvor 4 Tagen
I&#x27;m no security researcher, but this hits close to home for me personally.
评论 #44091229 未加载
ivanjermakovvor 4 Tagen
If this is the case Apple employed an amazing strategy. By locking all ways to possibly root their devices they patch vulnerabilities discovered for free by jailbreak devs.
评论 #44083824 未加载
gregghvor 4 Tagen
My favorite line from the whole post &quot;I’d also like to thank whoever unpatched the bug in iOS 13.0. That was a very cool move too.&quot;
Hiliftvor 3 Tagen
&gt; I can’t possibly imagine where we’ll be in 5 years from now.<p>I can. iMessage still allows device, account, and data takeovers.
peterburkimshervor 3 Tagen
Tethered or untethered? The article didn’t say.
评论 #44091154 未加载