TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Geohot presents an evasi0n7 writeup

146 点作者 innoying超过 11 年前

7 条评论

innoying超过 11 年前
Additional&#x2F;Duplicate Information: <a href="http://pastebin.com/mT2n7uyj" rel="nofollow">http:&#x2F;&#x2F;pastebin.com&#x2F;mT2n7uyj</a>
评论 #6957904 未加载
sheetjs超过 11 年前
most interesting part:<p>&gt; I found nothing sketchy in my reversing, your phones most likely aren&#x27;t being backdoored by Chinese.
评论 #6957313 未加载
评论 #6957258 未加载
0x0超过 11 年前
It&#x27;s kinda neat how they are sending disk&#x2F;block-level reads and writes, probably using a user-space&#x2F;local HFS file system implementation, to inject the exploit, since the mounted file system is read-only.
评论 #6957413 未加载
gluxon超过 11 年前
How does reverse engineering binaries like this work? Did geohot really go through the entire disassemble during the time of a plane ride?
评论 #6957936 未加载
quarterto超过 11 年前
Something looks a bit off with that photo [1]. The screen size is wrong. It has the aspect ratio of a pre-5 iPhone (notice the extra-large gap between the bottom of the screen and the home button compared to [2]). It also appears to be running iOS 6, which I&#x27;m pretty sure isn&#x27;t possible on a 5s.<p>[1]: <a href="http://geohot.com/mt.jpg" rel="nofollow">http:&#x2F;&#x2F;geohot.com&#x2F;mt.jpg</a> [2]: <a href="http://images.apple.com/iphone/compare/images/compare_iphone5s_2x.jpg" rel="nofollow">http:&#x2F;&#x2F;images.apple.com&#x2F;iphone&#x2F;compare&#x2F;images&#x2F;compare_iphone...</a>
评论 #6959228 未加载
评论 #6959160 未加载
评论 #6960488 未加载
tomphoolery超过 11 年前
george, you are amazing.
innoying超过 11 年前
Mods, please don&#x27;t remove the title as the original page does not have a title.
评论 #6957337 未加载