Article 53YS0 Meet unc0ver, the new jailbreak that pops shell—and much more—on any iPhone

Meet unc0ver, the new jailbreak that pops shell—and much more—on any iPhone

by
Dan Goodin
from Ars Technica - All content on (#53YS0)
iphones-800x449.jpg

Enlarge (credit: Maurizio Pesce / Flickr)

Hackers have released a new jailbreak that any user can employ to gain root access on any iPhone, regardless of the hardware as long as it runs iOS 11 or later.

Dubbed unc0ver, the exploit works only when someone has physical access to an unlocked device and connects it to a computer. Those requirements mean that the jailbreak is unlikely to be used in most malicious scenarios, such as through malware that surreptitiously gains unfettered system rights to an iPhone or iPad. The inability for unc0ver to survive a reboot also makes it less likely it will be used in hostile situations.

Rather, unc0ver is more of a tool that allows users to break locks Apple developers put in place to limit key capabilities such as what apps can be installed, the monitoring of OS functions, and various other tweaks that are standard on most other OSes. The jailbreak, for instance, allows users to gain a UNIX shell that has root privileges to the iPhone. From there, users can use UNIX commands to do whatever they'd like.

Read 6 remaining paragraphs | Comments

index?i=xRMNov28pZM:MB8TuUYtxIc:V_sGLiPB index?i=xRMNov28pZM:MB8TuUYtxIc:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments