If you’re into the iOS hacking and development scene, then you’ve probably heard of Comex, a prominent member of the iOS jailbreaking community. While he enjoys keeping his identity at a low profile online, he agreed to be interviewed by Forbes, where he revealed his real name and current life situation. Curious? Read on.
As promised previously, iOS hacker comex has released the source code of his jailbreaking tool JailbreakMe 3.0. The code allows capable people to look through it and understand how JBme casts it spell on unassuming iOS devices.
Apple has just released iOS 4.3.4 which patches the PDF vulnerability exposed by Comex’s JailbreakMe 3.0 tool which was used to jailbreak iPhone, iPad (and iPad 2) or iPod touch on iOS 4.3.3.
Many iPhone users are familiar with BiteSMS, a replacement for iOS' built-in SMS app with many extra features. If you've jailbroken your iPhone with JailbreakMe 3.0, you're probably aware that this app was broken on devices that were jailbroken using the tool, and actually had the capability to render those useless, until now. BiteSMS 5.5 Beta 1, which has now reached Cydia, is said to work on devices jailbroken with JailbreakMe 3.0 perfectly.
JailbreakMe 3.0 has received an "essential upgrade" via Cydia today, allegedly fixing previous issues that caused Apple's Camera Connection Kit accessory, BiteSMS, and sometimes Cydia (disappearing problem) to stop working altogether. Every iOS user who has jailbroken their device with JailbreakMe 3.0 is encouraged to apply this update via Cydia as soon as possible.
If you thought people jailbreaking on-display iPod touches and iPads at Apple Stores was cool, this you’ll find even more cooler.
JailbreakMe 3.0 has now been used over 1 million times since it came out only 2 short days ago, according to Grant Paul (known as @chpwn on Twitter), one of the project's contributors. Since its inception back in 2007, JailbreakMe has allowed users to jailbreak their iOS devices by simply pointing Mobile Safari to a crafted web page.
It has now been confirmed that Apple is planning to release iOS 4.3.4 to fix a PDF Exploit that allowed JailbreakMe 3.0 to be applied. This vulnerability in Mobile Safari requires users to open a malicious PDF file before having the device taken over and ultimately jailbroken in JailbreakMe 3.0’s case.
If you've been trying to figure out a way to jailbreak your iPhone 4 or 3GS running iOS 4.3.3 and none of the existing methods seem to be working for you, try JailbreakMe 3.0. This new method allows you to jailbreak your device by simply navigating over to a webpage.
If you've been paying attention to the tech news over the weekend, you're probably aware that the first untethered jailbreak for the iPad 2, dubbed JailbreakMe 3.0, was leaked to the public. While at first we speculated that one of the testers had leaked it, it turned out that it was spotted by accident, before it was sent to tech sites all over the Internet. In an e-mail exchange between the leaker and Comex himself, the official version of JailbreakMe will be released either today or tomorrow.