No pasó mucho tiempo para que la comunidad jailbreak lanzara un jailbreak para el iOS 8.4. Poco después de iOS 8.4 fue lanzado, se creó un jailbreak funcional, pero pronto podría verse amenazado, según Gizmodo.
Apple ya está trabajando en iOS 8.4.1. La versión beta ha salido y la versión final llegará pronto. Con iOS 8.4.1, Apple podría arreglar el jailbreak creado para iOS 8.4 y rápidamente apagar la fiesta de la comunidad jailbreak.
La versión beta de iOS 8.4.1 fue lanzada apenas dos semanas después de que iOS 8.4 salió. iOS 8.4 abordó algunos errores e hizo algunas mejoras en el rendimiento del sistema operativo, pero también presentó el nuevo servicio de streaming Apple Music para los usuarios de iOS por primera vez.
Intercepter-NG es una de las herramientas más poderosas para Espiar conversaciones de Mensajería Instantánea Microsoft Windows Live Messenger (MSN chat). Es de origen Ruso, totalmente gratuita, sin restricciones de funcionalidad y bastante universal: existen versiones para Windows, Linux, Mac OSX, iPhone, iPad y Android (muy pocas herramientas en el mundo pueden presumir este nivel de soporte).
Puede espiar conversaciones de Microsoft Windows Live Messenger / MSN, JABBER (Google Talk, Facebook Chat), YAHOO, ICQ, AIM, IRC y MRA.
En este tutorial explicaré la instalación y uso de Intercepter-NG en un iPhone. El procedimiento para instalarlo en iPad es exactamente igual.
El enorme beneficio de emplear un dispositivo móvil para efectuar el monitoreo, es que obtenemos una gran portabilidad y discreción durante las actividades de Espionaje. Por supuesto, este tipo de técnicas sofisticadas requieren que su dispositivo móvil ya tenga aplicado el “jailbreak“.
PROCEDIMIENTO DE INSTALACIÓN
1. Abra Cydia. Busque e instale las aplicaciones libpcap, OpenSSH, wget y unzip.
TaiG 2.1.3 para el Jailbreak iOS 8.3
Hace un par de dias TaiG ha puesto a disposición de todos los que quieren JailBreak, la versión 2.1.3 de su herremienta para hacer JailBreak a iOS 8.3. Con esta nueva versión han corregido problemas, el principal es el problema que muchos tenian bastabtes usuarios, que se quedaba atascado el proceso de instalar el jailbreak en el 20% o el 60% dependiendo la versión de iTunes que estuviera instalada en vuestro ordenador.
Esta nueva versión ademas es compatible con la actualización de Cydia substrate, así que ya tendrás menos problemas a la hora de instalar Tweaks en tu dispositivo y tendrás un Jailbreak mucho más estable, cosa que se agradece.
Haciendo un pequeño resumen estas serian todas las mejoras introducidas en esta actualización:
– Soluciona los errores de atasque en el 20% o 60% del proceso de instalación del Jailbreak en las versiones más modernas de iTunes.
– Compatible con la actualización de Cydia Substrate
– Corrige el problema del menú en blanco si emparejabas un Apple Watch con el iPhone
– Solucionas los problemas con la caché
Descargar TaiG 2.1.3 AQUÍ
iOS 9 vs iOS 8: What’s new?
iOS 8’s Search feature is one that we find ourselves using quite often, and has come a long way since the pre-iOS 7 days. In iOS 8, you can use Search to search Wikipedia, find the latest news, nearby places, apps from the App Store, songs from the iTunes Store and suggested websites, as well as your contacts, messages, emails and notes. Siri and Search are about to get a lot better in iOS 9.
The company apparently wants to offer a range of additional information and features based on the users habits and an understanding of context, making your iPhone a “proactive assistant”. Search will also display categories of nearby places including food, drink, shopping and fun. You’ll also be served with trending news story based on your current location so you’re always in the loop.
A few days ago, Stefan Esser, better known in jailbreak circles as i0n1c, revealed that he’d successfully performed an iOS 7.1.1 untethered jailbreak on his very yellow iPhone 5c. Following this exciting inroad, he then went on to explain how the single kernel exploit was achieved, and now, finally, he’s shown off a demo clip of his device booting up and running Cydia on iOS 7.1.1.
i0n1c’s revelation over the weekend served as the latest in a line of encouraging post-iOS 7.1 jailbreak progress. Winocm, who will be joining Apple later on this year in a move that will probably see the hacker retire from the Cydia community for good, demonstrated that a jailbreak on an iPhone 4 was possible.
But i0n1c certainly raised the bar by showcasing an iPhone 5c jailbreak, especially given that newer processors are almost always more difficult to hack, and did so by effectively re-implementing a single kernel exploit found inside many iOS apps.
Given that i0n1c is a veteran of the scene and one of the most talented security experts around, we never doubted the legitimacy of his claims, but to dispel any misconceptions or ambiguity, the hacker has thrown out a video of the jailbreak in action. He’s calling it Cyberelevat0r. Embedded at the bottom of this post, you see the iPhone 5c run through the Settings to reveal the version number, fire up Cydia, and then finally reboot, to prove its untethered nature.
About two months ago, Apple released iOS 7.1 with some new features and to patch the famous Evasi0n 7 jailbreak vulnerability. Ever since of the release iOS 7.1 we haven’t seen any public release of iOS 7.1 jailbreak. But we have seen some videos of Jailbreaking an iPhone 4 on iOS 7.1. Earlier today, a famous hacker i0n1c has posted a picture of Jailbroken iPhone 5C running Cydia and iOS 7.1.1.
Before you get excited, please stay calm because it is just an image of iPhone 5C jailbroken iOS 7.1.1 (showed above) and not the public release of the iOS 7.1 jailbreak and I think that the public version of iOS 7.1 Jailbreak will not be out until the release of the next big iOS 8.
I0n1c has been out of the jailbreak since the release of the iOS 4.3, he worked for the iOS 4.1.3 but after that he has only been criticizing the jailbreak hackers specially the Evad3rs team. So, you should not expect too much from this developer. So, this photo will probably be just a teaser from the hacker. On the other hand, he may release the public jailbreak for iOS 7.1.1 but it is highly unlikely. What do you think about this photo? Let me know in the comments section below.
Avid fans of iOS jailbreaking have been eagerly anticipating the release of iOS 7.1/7.1.1 jailbreak, as the advent of iOS 7.1 update killed all existing exploits used in evasi0n7 jailbreak and thereby rendering it useless.
Those who have already updated their devices to iOS 7.1 can no longer enjoy the privilege of installing jailbreak tweaks and apps, as they lose jailbreak status soon after installing this update.
Furthermore, Apple has stopped signing firmware older than iOS 7.0 as it intends to withdraw all technical support for jailbroken iOS devices. As a result, you will no longer be able to downgrade your device from iOS 7.1 to iOS 7 or earlier iOS 6 firmware builds.
If there’s one thing that we have learned over the last few years, it’s that, rightly or wrongly, the jailbreak community expects a lot. The majority of the complexities involved in researching vulnerabilities, exploiting those bugs and then tying it all nicely together into a jailbreak package capable of mass distribution are abstracted away from the end-user. This is undoubtedly how it should be, but the trade-off is that users become impatient and irritable due to a lack of understanding of the process and how much work is actually involved in effectively producing a jailbreak from scratch once Apple have slammed the security door in our faces.
First and foremost we expect to see a first glimpse of iOS 8 at this year’s Worldwide Developer Conference (WWDC) in June. We also expect to see a first developer seed going live to registered developers during the course of WWDC week. A public version of iOS 8 will likely ship with the iPhone 6 sometime in September or October. That’s approximately six or seven months in the future, so we of course expect to see an untethered 7.1 solution made available before then – all going well. However, if the first seed of iOS 8 is found to have exploitable vulnerabilities in then the Evad3rs could potentially make the call to hold off on iOS 7 and focus attention on liberating iOS 8 with the hope that any vulnerabilities are not patched as part of the process of going from beta to public.
iOS 7.1 Jailbreak with Evasi0n?
If the Evad3rs team are involved in the research or production of an iOS 7.1 untether, which we expect them to be, then it’s highly likely that we will see an updated version of Evasi0n7 shipping. The distributed tools and software that makes jailbreaking possible on a mass scale has improved exponentially over the years. What used to be a laborious and overly technical process has now been condensed into a single one click solution (where possible).
New UnTethered iOS 7.1.1 Jailbreak Scams Propagate, How to Spot Them – Ensuing Apple’s somewhat recent release of the UnTethered evasion jailbreak-patching 7.1 firmware, and especially the company’s infinitely more recent 7.1.1 update, a countless number of jailbreakers have become stuck. Frantically scouring for an UnTethered 7.1.1 jailbreak solution, a sizable portion of these jailbreakers have regrettably fallen victim of despicable jailbreak scams that now clutter the web. Today, a new set of fraudulent sites claiming to jailbreak 7.1.1 Untethered on devices like the iPhone 5s, iPad mini, Air, and even the iPhone 4s caught the attention of Jailbreak Evasion Info’s staff members.
UnTethered Jailbreak 7.1.1 Scams Propagate
First, before delving into the dangers shrouding falsified jailbreak utilities, it’s important to realize that the tool capable of Jailbreaking iOS 7.1.1 exclusively supports the iPhone 4 (due to the 4 year old exploit it implements)
Users on a jailbreak subreddit have discovered a new kind of malicious software on iOS phones. The malware, which comes as a library called unfold.dylib, was uncovered after a Reddit user complained of crashes in Google Hangout and Snapchat.
The threat, which has been nicknamed “unflod baby panda,” is rumored to be of Chinese origin. There are several factors that support this theory. According to German mobile security firm SektionEins, the infection is digitally signed with an iPhone developer certificate under the name Wang Xin. Also, the malware, which steals the Apple ID and password of users, sends the information in plain text to 184.108.40.206, which appears to be a Chinese website from the error message it displays. However, these could all be fake. SektionEins even raised the possibility of certificate theft. So for now, no one knows where the malware came from and how it got into iOS devices.