StefanEsser

Latest

  • Untethered jailbreak for new iPad shown on YouTube, not quite ready for download

    by 
    Sharif Sakr
    Sharif Sakr
    03.17.2012

    Are we shocked to see an untethered iOS 5.1 jailbreak for the new iPad? Not so much. Are we surprised to see it arrive so quick? Hell, yes. The iPad 2's untethered jailbreak took an eternity, whereas this new tunnel seems to have been dug during one fleeting Friday night. The hacker to thank is i0n1c, aka Stefan Esser -- a man who moves so fast his YouTube clip reportedly had 28 likes before it had even finished uploading. Just leap that final fence, Stefan, by releasing your jailbreak to the public, and we shall re-christen you bi0n1c. (Unless you want to keep your current handle, which would also be fine.)[Thanks, Brad]

  • Address space randomization adds extra security for jailbroken iPhones

    by 
    Sam Abuelsamid
    Sam Abuelsamid
    12.13.2010

    Reduced security is among the top reasons given by Apple and enterprise information technology managers for their opposition to iPhone jailbreaking, but at least one white-hat hacker is out to prove them all wrong. German security consultant Stefan Esser of SektionEins will introduce a tool this week called antid0te at the Power of Community conference in Seoul, South Korea. Antid0te will combine the ability to jailbreak iOS devices and then automatically add a capability called Address Space Layout Randomization (ASLR). Since the earliest days of computing, basic system files have typically loaded to the specific addresses in memory, which makes it easier for attackers to directly change the data or code stored there. Randomizing the locations where that code resides adds an extra layer of security. That's why Microsoft has incorporated ASLR into its operating systems since Windows Vista debuted -- even Windows Phone 7 has this feature. Apple, on the other hand, has only done a limited ASLR implementation in OS X and none at all in iOS. The debut of antid0te comes on the heels of the news that Apple has removed a jailbreak detection API from iOS 4.2. This function was used by some corporate IT departments to ensure that company issued iOS devices were not jailbroken. Apple has not said why the API was removed, but at least IT departments can breathe a bit easier as long as employees stick to antid0te for their jailbreaking needs. [via Engadget]

  • Apple mysteriously kills jailbreak detection API while hacker boosts iOS security, irony restored

    by 
    Richard Lai
    Richard Lai
    12.12.2010

    It's no secret that Apple's been keen to monitor the lot of naughty jailbreakers, but it turns out the company has recently shelved iOS 4.0's jailbreak detection API with no explanation given. While this has little effect on the average user, Network World explains that this is bad news for enterprise IT and MDM (mobile device management) vendors, who will now have one fewer channel for checking whether a user's iOS device has been jailbroken and thus become vulnerable to attacks. That said, apparently this isn't a huge loss for the MDM vendors, anyway; but the real question is why drop the API now? Could its presence alone be a threat? We'll probably never know. Fear not, though, as some folks have put jailbreaking to good use. The Register reports that come Tuesday, Stefan Esser of Sektion Eins will demonstrate a tool called antid0te, which reportedly adds ASLR (address space layout randomization) onto jailbroken iOS devices. In a nutshell, ASLR randomizes key memory locations to make it more difficult for certain attacks to locate their target data. According to the famed white hat hacker Charlie Miller, this technique is already present on Windows Phone 7 and desktop Windows since Vista, but Apple's only dabbled with it on OS X and not on iOS. Now, this doesn't mean that jailbroken devices will be fully safeguarded, but some protection is better than no protection, right? [Thanks, wooba]