Side

CSS

G

o

o

g

l

e


Back

Welcome to 僕等のPSP

Google.org CrisisResponse

Googleでは、東日本大震災に関する災害関連情報を集めた特設サイトを提供しています。特設サイトでは、安否情報を検索・確認できるパーソンファインダー、被災地向けに提供している生活情報、交通実績情報、その他にも、義援金受付や、震災関連の情報を提供しています。
東日本大震災(東北地方太平洋沖地震)》

Notification

News・info
01/27 Siteのfontを見やすいのに変更
カラーピッカー実装ライブラリ「JSColor」
Link先に飛びます

DHTMLSnowstorm!

Change Wind
Stop


He is ignorant of the world. He is too young to know the truth.'
by bokuranopsp

スポンサーサイト

上記の広告は1ヶ月以上更新のないブログに表示されています。
新しい記事を書く事で広告が消せます。

GreenPois0n Creators, Chronic Dev untethered jailbreak for iOS5 CDevReporter

これはiPhone,iPodをPCに繋いで、下記のURLからDLしたツールを使用して、
iOS5をuntethered jailbreakするときの為に、それぞれどんなbugがあるのか、
わざとクラッシュさせてBugの情報を収集するものであり、Jailbreaktoolではありません

僕等がいた
Greenpois0n.com
Weapons of Mass Exploitation
Greetings, friends & jailbreakers!
It has now been several months since OPK and I (posixninja) took the stage at JailbreakCon (fka MyGreatFest) in London. Since then, I & other members of the Chronic Dev team have been keeping quietly busy on many fronts, so I thought it was about time to give you all a brief update.
Update on iOS5 Jailbreak
First & foremost: during my JailbreakCon talk in September, I was excited to announce that the Chronic Dev team had already discovered 5 different exploits for use in our upcoming jailbreak. Unfortunately, that announcement was a bit premature, because in the subsequent weeks, Apple found & patched a (critical) few of those exploits, between the beta versions we used for testing and the final release of iOS5 on October 12.

Sadly (and trust us, we are much more sad about this than any of you could possibly be), this has prevented us from being able to release a new jailbreak as quickly as we wanted to. As I hinted at earlier this week on Twitter, I was initially disheartened to think that so many of the countless hours we’ve worked on this jailbreak seemingly went right down the drain.

Not to mention, these are by no means the first exploits that have been “lost” by Chronic Dev (or any other iOS hacking teams) in this manner. In fact, these are just a few in a long-running series of exploits that were patched by Apple before we hackers could make use of them in a free jailbreak for you, our loyal fans.

Well, to be frank… this is bullshit!!! And now, Chronic Dev is ready to turn this little information battle into an all-out, no-holds-barred information WAR. So we want to use this experience as an opportunity to explain the method Apple uses to find potential vulnerabilities, as well as to unveil our new master plan, which should not only prevent this from happening to us again in the future, but also allow us to use all of you to find more exploits, so we can ultimately get an untethered jailbreak into your hands as quickly as possible.
Thank You!
Many thanks in advance for your prompt response & help in this effort, your continued support of GreenPois0n & the Chronic Dev team, and your patience while we continue our never-ending, diligent work on your (free!! coming soon!) untethered jailbreak for iOS5 and/or iPhone 4S.

One final THANKS! While I have spent many of my own hours on the development, design & programming of this tool, especially the back-end, I also owe a great debt of gratitude to:

・C-Dev hacker Nikias & his lovely wife Hanene – for the many tedious hours they spent programming the front-end & user-friendly interface;
・C-Dev member OPK – for his graphic design work & the brilliant logo for this app; and
・Chronic-Dev, LLC – for graciously hosting the servers where we will store the (fingers crossed) millions of crash reports and other data that you all are going to send us momentarily, via this link…
[CDevReporter_mac.zip]
[CDevReporter_win.zip]
How Apple Finds Exploits
One of the primary challenges in working with userland exploits is that, every time any program crashes on your iPhone, a “crash report” is generated and instantly sent back to Apple. As you can imagine, while we’re working out all the kinks in the exploitation of a vulnerability, we may need to crash any particular program thousands & thousands of times.

It’s possible to change your iTunes settings to stop sending this diagnostic information back to Apple, and of course everyone in Chronic Dev has made this change on all our development machines. However, even this is not always 100% effective at preventing Apple from obtaining our data. For instance, if one of us is at a friend’s house and plugs our iPhone up to his or her computer (even just to charge it), it’s very likely that computer is set up to send all our valuable data & crash reports right back to Apple.

As a side note, this is also the primary reason we’re unable to perform or allow any public beta testing of our software before it’s released. Any potential beta tester could be unknowingly sending crash reports back to Apple, which would prematurely alert the company to our exploits & the discovery of their vulnerabilities before we even have the chance to release.
Help Us Help You: Send Us Your Crash Reports
Instead of allowing this vicious cycle to continue, we decided to write a new program to turn Apple’s own beast against its master, per se. All this program requires from you is to attach your iOS device to your computer and click a single button!

At this point, the program copies all the crash reports off your device (which, under normal circumstances, would be sent right back to Apple), and instead sends this data to a secure, private server hosted by your friendly Chronic Dev team. Next, our program proceeds to neuter your copy of iTunes, simply by changing your settings to prevent your computer from sending any further diagnostic information from your device to Apple.

Using this agglomeration of your crash reports and our ninja skills, Chronic Dev will be able to quickly pinpoint vulnerabilities in various programs by using the same techniques Apple currently employs. At the very least, your data will help point us in the direction of which applications are the most vulnerable, so we can focus our time & energy on these with laser-like intensity. And, of course, this will also prevent Apple from accessing all your valuable data, just so they can then turn around and use it against you.
関連記事
スポンサーサイト

この記事へのコメント

トラックバック

URL :

≪PREVHOMENEXT≫
2017 031234567891011121314151617181920212223242526272829302017 05
プロフィール

Crystal

Author:Crystal


日頃から皆さん訪問頂いて
ありがとうございます。
このサイトは
管理人・副管理人
の二人で更新しています。
Borussia Dortmund
Manchester United
大好きです

■OS
Windows8 PRO
Ubuntu 12.10
■My Computers
・Main Machine
DELL Dimension 9200
FMV NF D70R
・Mobile Machine
Acer Aspire one 532h SERIES
HP ProBook4515s CT NotebookPC
■Gadgets
・Mobile Phone
Galaxy Nexus
006sh
iPhone4
iPod touch4G
■Creative Tool
Adobe Photoshop CS6
Adobe Bridge CS6
Adobe Muse βテスター参加

最新記事
最新コメント
訪問者カウンター

現在の閲覧者数:

カテゴリ
リンク
QRコード
QRコード
iPhone*jailbreak


■TinyUmbrella 5.10.09
SHSH保存方法
Downgrade方法
■i-FunBox
iPhoneとPC間でdata・file転送
Macintosh版
■Download iOS Firmware
getiOS
Web&Other
FW・CFW
NewTopic
Notification
FreeArea
上記広告は1ヶ月以上更新のないブログに表示されています。新しい記事を書くことで広告を消せます。