iOS 6.1.3/6.1.4 Untethered Jailbreak Update: Dev Lowers the Priority for A5+ Devices!
Developer of Sn0wbreeze, iH8sn0w, who has been working on the untethered jailbreak for iOS 6.1.3 and iOS 6.1.4 has just given an update. Bad news for the users with A5+ device - launched after iPhone 4 - who have been waiting for the iOS 6.1.3 untethered jailbreak. Developer has announced that he has lowered the priority for the untethered jailbreak for A5+ devices as they have planned to use the vulnerabilities for the jailbreak for iOS 7. Using them for untethered jailbreak for A5+ devices would expose them.
For now, they are working on the untethered jailbreak for the iPhone 4, iPhone 3GS, and the iPod Touch 4G. They might release a Cydia package that would convert the already available tethered jailbreak to an untethered one. It seems like the iOS 6.1.3 untethered jailbreak and the iOS 6.1.4 might be released for the rest of the devices when they release one for iOS 7 in order to prevent disclosing the vulnerabilities.
People are probably wondering why focus on A5+ devices is being lowered in priority. This is not because of difficulties, it is actually because it turns out a few of the vulns we were planning on using still work on iOS 7 (kind of exciting [yes and no]). We do not want to publish these vulns as they have the potential of being used in a future iOS 7.x A5+ jailbreak. With that being said, we are not removing our focus on an A5+ 6.1.3/6.1.4 jailbreak completely. We are looking for some vulns that exist in 6.1.3/6.1.4 but not iOS 7. The problem is… in terms of security iOS 7 looks likes an iOS 6.2 . This wouldn’t be a problem if Apple did not silently kill the lockdown socket bug. We were initially planning on using that vuln to recycle the shebang attack used in evasi0n to remount the rootfs, but when I found out it was patched, I initially said it wouldn’t halt the progress of the jb. This was before we found out the other vuln we had to get root and remount the rootfs as r/w still works in iOS 7.