It's kinda neat how they are sending disk/block-level reads and writes, probably using a user-space/local HFS file system implementation, to inject the exploit, since the mounted file system is read-only.
Something looks a bit off with that photo [1]. The screen size is wrong. It has the aspect ratio of a pre-5 iPhone (notice the extra-large gap between the bottom of the screen and the home button compared to [2]). It also appears to be running iOS 6, which I'm pretty sure isn't possible on a 5s.<p>[1]: <a href="http://geohot.com/mt.jpg" rel="nofollow">http://geohot.com/mt.jpg</a>
[2]: <a href="http://images.apple.com/iphone/compare/images/compare_iphone5s_2x.jpg" rel="nofollow">http://images.apple.com/iphone/compare/images/compare_iphone...</a>