Nancy the Moderator
VWA, Game Master, News Hound
Only site donators may send a PM to WiiHacks Staff
Comex Releases Source Code Of JailbreakMe 3.0
As promised previously, iOS hacker comex has released the source code of his jailbreaking tool JailbreakMe 3.0. The code allows capable people to look through it and understand how JBme casts it spell on unassuming iOS devices.
Comex is a hacker who is very well-known among the iPhone/iPad jailbreaking community. He is amongst the most accomplished of iOS hackers; especially known for his JailbreakMe series of jailbreaking tools. JailbreakMeís first version worked on iOS 1.1.1 for iPhone/iPod touch. Its second version worked with iOS 4.0.1 on all iOS devices and its latest version, version 3, was released a couple of weeks ago.
The latest version which is codenamed Saffron works on all iOS devices running iOS 4.3.3. It makes use of a PDF-exploit found in Mobile Safari along with other magical techniques that make it the fastest jailbreaking tool ever. It was also the first tool to jailbreak the iPad 2.
Comex previously released the source code for JailbreakMe Star back in August and, as promised, he has also released the source code for Saffron. The code allows other able hackers to go through Comexís code to create their own tools.
One must keep in mind that, in its current state, JBme doesnít work on iOS 4.3.4. Apple updated iOS firmware to plug the hole which Comex used in JailbreakMe. The hole in question, as we talked about here, is a PDF-based Mobile Safari exploit. Apple not only plugged the PDF-exploit, but also i0n1cís exploit which was used to perform untethered jailbreaks on iOS 4.3.x.
Jailbreaking enthusiasts are, of course, suggested to stay away from iOS 4.3.4, lest they want their untethered jailbreaking freedom taken away. For safety purposes, it is highly recommended you install PDF Patcher 2 which provides the same advantage as iOS 4.3.4 without being locked out of a untethered jailbreak.
The source code is available for everyone at GitHub. You may go though it here