One of, if not THE most disruptive of iOS hacks…ever.
What was the hottest, sexiest, down right bestiest hack for iOS…ever? Some might say Installer. Some might say Cydia. Others might say shsh blobs and spoofing Apples code-signing server. But how do we even get to any of those without the Jailbreak?
5 years ago today, JailbreakMe 3 was released. You don’t have to be a hacker, developer…or even an iOS user to appreciate the simplicity of Comex’s slide to jailbreak remote exploit through-a-browser-to-catch-root-access-of-a-mobile-device…without the need for a computer…except the one in your hand.
Jailbreakme 3.0 was pure genius. Code named, “Saffron”, the hack used an exploit from a FreeType parser security flaw using the form of a PDF file rendered by Mobile Safari, which then utilized a kernel vulnerability to complete an untethered jailbreak. More simply put, users could jailbreak their device remotely, from a web browser, (mobile Safari), in just a few seconds. Without a computer. The developer and exploit founder, comex, then secured the exploit with a vulnerability patch that was available on Cydia…for the low, low price of free.
How easy was it?
Why Jailbreakme was disruptive
Because it was simple. So simple, kids could do it…and they did. The consequence for Apple in releasing firmware with a kernel exploit that could be achieved with mobile Safari, was kids jailbreaking all the devices in Apple’s own crib: The Apple Store.
It was so effective, that Apple had to block the domain at all of their stores, so employees wouldn’t have to restore every device that was jailbroken during the day.
Happy 5th Birthday, Jailbreakme 3.0!