In today’s video, we have massive news to discuss some very valuable research released by the Pangu Jailbreak Team and security researcher Siguza in the past couple of days. Pangu Team was at BlackHat 2019 and they had two different talks, one about Remote Code Execution in FaceTime, and another one about exploiting the iPhone XS MAX (Basically A12 devices) in which they also covered very important aspects of PAC, XNU, and other security mechanisms. Also, at the same time, security researcher Siguza has published a very detailed article about APRR, KTRR and other hardware-based security mechanisms Apple uses in their devices, previously unknown details and vulnerabilities, all of which help the Jailbreak community enormously.
Of course, these may not be very useful right away for the end-user, but for the Jailbreak developers who build these tools, these research slides are extremely valuable because they were produced after long hours of independent research, trial and error and a lot of reverse engineering. This is not random info you get from the internet, it takes literally days of digging and poking around to understand these mechanisms Apple would like you to not even know they exist. Of course, for the jailbreak community, the better we understand these mechanisms, the better we can keep up with Apple’s new mitigations and we can continue to build reliable jailbreak tools.
As always, do not forget to SUBSCRIBE to stay updated with the latest iOS and Jailbreak news!
▽ Resources ▽
▶ Our Jailbreak Forum
▶ iOS 12.3.1 / 12.3 / iOS 12.4 JAILBREAK: Current Exploits, Status, SHSH2 Blobs & What to Expect
▶ iOS 12.4 / 12.3.1 / 12.3 JAILBREAK Important News: iOS 12.3 B1 Jailbroken With Cydia & More
▶ iOS 12.2 / 12.1.4 / 12.1.3 FILZA No Jailbreak And NonceSetter For Downgrade RELEASED!