- People on Twitter ask whose ancestors would’ve passed immigrant ‘wealth test’ Monday 6:54 PM
- Kobe Bryant helicopter crash mocked in teen’s TikTok video Monday 6:38 PM
- Chiefs, Bears, Packers have Twitter accounts hacked Monday 3:48 PM
- Washington Post reporter suspended amid backlash over Kobe Bryant tweet Monday 3:08 PM
- America is united in hating Ken Starr’s impeachment hat Monday 3:01 PM
- In ‘Cuties,’ the contradictions of growing up come to a head Monday 1:55 PM
- Racist tweets blame fruit bat soup for coronavirus Monday 1:25 PM
- What is the #ILeftTheGOP movement? Monday 1:21 PM
- The Grammys were weird and sad—but the Billy Porter hat memes offered some levity Monday 12:36 PM
- Auschwitz Museum calls on Facebook to ban Holocaust denialism Monday 11:59 AM
- YouTuber who said his girlfriend was dead now says he faked it Monday 11:42 AM
- Review: Kentucky Route Zero is one of the most magical games ever made Monday 11:00 AM
- Backlash grows against Clearview as lawsuit looms Monday 10:58 AM
- Tyler the Creator calls out the Grammys for racism over ‘Rap Album’ win Monday 10:25 AM
- Democrats call on John Bolton to testify after book bombshell Monday 9:56 AM
Security researchers have uncovered a new iOS jailbreak. The tactic, called Checkm8, works on devices ranging from the iPhone 4s to the iPhone 8 and X, and cannot be reversed with a software patch.
Security researcher Axi0mX published the Checkm8 jailbreak earlier today. It exploits a vulnerability in the software used to boot the iOS operating system, called SecureROM.
SecureROM is the first significant piece of software executed when an iPhone or iPad is turned on. Due to the nature of its design, any vulnerability found within SecureROM can only be resolved with a hardware revision. This makes it almost impossible for Apple to mitigate against it, save for issuing a recall of devices.
According to ZDNet, the vulnerability impacts devices running Apple’s A5 to A11 chips.
Devices that use the A12 and A13 chipsets, like last year’s iPhone XR and the recently-released iPhone 11, are not believed to be affected.
IPhone Jailbreaks that exploit this element of iOS are extremely rare. The last example was released in 2009. This scarcity is primarily a result of a determined effort by Apple to eliminate any possible security holes. The discovery of Checkm8 is therefore hugely embarrassing for Cupertino.
Apple is notorious for its locked-down approach to its devices. It deliberately limits what software can run on iPhones and iPads, restricting owners as to what can be sourced from the App Store. But by “jailbreaking” a device, it becomes possible to run unauthorized code. This can include apps that were rejected from the App Store due to its stringent policies, to more specialized software, like the hacking tool Metasploit.
Despite that, it’s probably not a good idea to install this iPhone jailbreak, which is currently available to download from the researcher’s GitHub page. For starters, Checkm8 makes some significant changes to the underlying software of your device. If you make a mistake, there’s the potential to irreversibly “brick” your phone, turning your shiny iPhone X into little more than a fancy paperweight.
Jailbreaking also introduces an element of security risk. In the past, we’ve seen examples of malware that targets explicitly jailbroken phones. One specimen discovered in 2014, Unflod, harvested Apple ID credentials, which it then uploaded to a server with a Chinese IP address.