Android, iOS, OS, Security

Crash reports to Apple to help hackers create an exploit to jailbreak

Jailbreaking an iPhone is a hot topic of the moment, as Apple has released the first device. According to the latest news, BBC, thousands of smartphone owners have joined forces with a team of hackers to help them find new ways jailbreaking smartphone software, and crackers use crash reports to Apple for unlocking devices.

The team of hackers known as the iPhone Dev-Team, published a simple to use cross-platform tools that allow you to install third-party applications on the iPhone, have not been allowed the company to the App Store. The latest version of the iPhone operating system is extremely difficult to crack, says Joshua Hill, a member of a team of hackers Chronic Dev. “Apple we all complicated. IPhone is now better protected than most of the facilities to run the nuclear missiles.”

Jailbreaking devices with iOS can not only change the behavior of the phone, but add fun extras. One such feature, which has been banned by Apple, FaceTime is in demand, or any problems with data transfer via 3G.

How hackers are developing applications for jailbreaking? Hackers like Mr. Hill seek out bugs in Apple software. Bugs may lead to disruptions and the closure of the program, and for the hackers, they are a sort of golden sand, because sometimes they can be used to create a jailbreak. Hackers may want to force the program to crash thousands of times until they find a way to successfuly exploit a bug, but this is Apple’s notification of the existence of the bug and that the hackers may study it.

Phone manufacturers do not want to have you worked on this, because in rare cases it leads to unstable operation of the device and puts the user in danger of getting hacked. Such incidents damage their reputation and introduce malware into your network.

But users hate all this even more, as they may be worth the money. Sometimes this also applies to functions that manufacturers build into phones to demand additional payment for the exact same service. One example – the ability of the organization of telephone access point Wi-Fi, for which the requested $ 30 a month, although you can do to doge most hacked phone using a free application or application for which you need to make a one-time small fee. Some manufacturers do not want users to use applications like Skype instead of an expensive cellular communication.

Chronic Dev is ready to turn this small battle in an all-out information in no way limited the information war. A program called CDevreporter available for users of iPhone. This program captures the crash reports that are intended for Apple, and sends their team Chronic Dev. “After a couple of days after release CDevreporter we got about 12 million records,” – said Hill. “I can open the report and say with certainty whether it will fit for a jailbreak or not. But the report so much that I started working on an automated system for analysis.”

Is jailbreaking legal ? In July 2010, the U.S. government announced that the jailbreak and unlock devices Apple, hacking smartphones with Android and rip DVD (for educational purposes) are legal actions, as long as they do not violate copyright law. In England jailbreaking, apparently, is not prohibited, although it will void the warranty of the product, as Simon said Halbertstam, an expert on law and technology partner of Kingsley Napley.

Apple is trying to prevent jailbreaking for safety, because after the user jailbreaks without knowing it, can install malware, which could not go through the approval process at Apple. Joshua Hill rejected this argument: “I’m trying to ascertain the safety of his and your phone. Apple cares only about money, not about your safety.”

Chronic Dev has not yet announced the discovery of any bugs that you can exploit, but a team member by the name pod2g claims that have already found a way to create or otherwise unattached jailbreak.

Hill confident that even if Apple will fix a bug that makes it possible to jailbreak hackers went out and brought new ways.

Tagged , , , , , , , , , , , , , , , , ,