Having said that, unless there's something specific you're looking for, it's not really worth the effort these days and has potential downsides.
The biggest downside is that you might find some existing apps on your phone can detect that the phone is jailbroken and refuse to start. There are obvious security reasons for apps like banking apps to do this but also many online gaming apps won't run if they detect that the device is jailbroken in order to deter cheating.
There's an ongoing arms-race between app developers and jailbreakers where jailbreakers try to avoid detection and app developers find new ways to detect jailbreaks. So a new jailbreak will probably not be detected until a few weeks or months later when the app is updated.
Source: I used to work for a company that makes phone software that needs to be secure and so would attempt to detect jailbreaks.
This is obviously wrong. It's possible to do the same banking things using the bank's website both from general purpose PCs and browsers on phones for which jailbreak detection is not possible in the browser.
Jailbreak detection is done by testing for the presence of common things that allow the device owner to control the device. The device owner controlling the device is not a problem for banking. Meanwhile a malicious third party wouldn't inherently need to make use of any of those and would have strong incentives to avoid using any that trigger jailbreak detection, so it's no help there either.
And for the same reason it's basically useless for detecting cheating. Because if you jailbreak your phone so you can install some apps from outside the store and then it breaks your games, you might grumble and decide you want to play the game more. But if you jailbreak your phone because you want to cheat at games, your next step is to thwart the jailbreak detection, which is not that hard when you have the game software to inspect to see how it's doing jailbreak detection. And you can also tell when the app is updated and then run the new version on a test machine to see how the new version is doing jailbreak detection.
It's hostile and a waste of time to do this when you're going to lose anyway. You only inconvenience the people who jailbreak their phones for completely unrelated reasons.
Which isn't the case here. A device controlled by the owner isn't less secure than one that isn't. It's only a device controlled by an attacker that is. But "jailbreak detection" only detects the former (when it even detects that) and not the latter.
The fact that you can do banking on the web only proves that banks admit that you don't need a device the owner doesn't control in order to do banking.
The jailbreak community is usually quick in introducing patches for security vulnerabilities.
The most recent Mail bug  had a patch released 29 days ago . Apple only introduced a fix in a 13.4.5 beta, and it's unsure if the same fix was put into 13.5 .
Admittedly, it'll be even better if the community strongly encouraged the installation of such tweaks in Cydia et al.
From trying to roll their own crypto, to still using legacy ssl to support ie6...everything is shitty.
Even when they are forced by law  to integrate modern 2FA, they find ways to implement it in a shitty, proprietary way.
PSD2 is required since September 2019 and every single bank rolled it out in August and waited until the very last moment.
I mean, a photoTAN device with a 120x120 camera resolution? Seriously, what is this? 1999? Why not use RFC 4226 or RFC 6238  ?
Windows XP and IE6 have been out of support for quite a while. They've long been dropped in favor of windows 7 (LTS support until 2023) and 10 more recently, which comes with internet explorer 10 or 11.
SSL would be quite easier to keep up-to-date if Microsoft actually upgraded their operating system and applications to support TLS 1.2 by default, which they don't for retro compatibility reasons.
For reference, working at JP Morgan, I can tell you that the company has dropped support for Internet Explorer entirely. Half of the existing internal apps don't even load on IE. Would be nice of vendors to stop wasting their time praising IE support as a feature.
Windows 8.1 has support until 2023. Windows 7 support is over since January 14, 2020. https://support.microsoft.com/en-au/help/13853/windows-lifec...
TOTP (RFC 6238) or HOTP (RFC 4226) are less secure than photoTAN/chipTAN because they are phishable, as in you can think you authorize a 30€ transfer for an internet purchase while in reality it's a 30000€ transfer to some bad people. photoTAN/chipTAN on the other hand are challenge-response based and send data about the transaction to the second factor device so that you can verify it before confirming.
Actually, this statement is not true, as those transactions and their payloads are not cryptographically signed and neither are they verified anyhow  . Attackers or malicious activities on Android can easily modify the payload and still have a valid transaction for the end-user; showing up the wrong IBAN, wrong amount and wrong recipient. This applies to both the official banking apps and the photoTAN generator devices that Cronto is (re-)selling.
Note that the research was made public and reposted/printed in a _lot_ of newspapers in 2016. And of course, nothing got improved.
If you search the web for Uni Erlangen (FAU) and the "crypto" analysis, you'll find out that Cronto / CrontoSign is the software supplier for pretty much every major bank.
And yes, it's patented, and yes, other frameworks got taken down on GitHub for copyright infringements when they tried to reverse engineer it.
The only open implementation of the HBCI 2.2 / FinTS 3  standard that I personally know of that hasn't been taken down already is libfintx .
 (German) https://www.fau.de/2016/10/header/phototan-banking-nicht-sic...
Your linked sources  and  don't really cover that topic. They mainly cover the use of Android apps and highlight the danger that the Android devices might be hacked, recommending use of dedicated devices. From :
> Last but not least, please note that the photoTAN procedure is not only available as a smartphone app but also as dedicated hardware (Cronto, 2011). Naturally, our statements about the security features of app-based authentication cannot be transferred to thephotoTAN hardware device. Quite the contrary, a dedicated photoTAN device — available for all three analyzed banks — offers excellent security properties largely similar to those of chipTAN.
But this wasn't your point. It might very well be that the transaction data is not verified by the generator devices and only displayed, but your sources don't state it.
In my experience, this is not always the case. Some banks treat their mobile devices as more secure than website. For example, some actions would prompt an SMS MFA (I know, I know) if initiated from the website, but go right through if initiated from the app. It makes some sense, as on the app, they have access to things like location which they can use to make a better assessment on whether a request is fraudulent.
Neither of those are present when logging into your bank from its website, and I would also suspect that jailbreaking a phone significantly reduces the trust you can have in either.
Also, from a bank's perspective, all they care about is reducing their liability, without inconveniencing too many customers. In that context, it makes a lot of sense for banks to disallow their products from being used on jailbroken phones.
It implies they should at most only require SMS to use the app on a jailbroken phone. Or, you know, stop doing that entirely, since SMS-based authentication is horrifyingly insecure. It's literally less secure than email, and that's a pretty low bar. People should really stop using it.
Also, phones have no real way of authenticating their current location, so assuming that what the phone tells you is secure against intentional fraud is a pretty bad idea to begin with.
I'm pretty sure jailbreaking is bad for developers who want to sell nice, simple, pay up front no surveillance software, because that is primarily threatened by the very piracy jailbreaking enables.
You might imagine jailbreaking is all about giving people control or whatever. Ultimately it just means, due to piracy, that the only people that are allowed to make money off software is Google and Facebook, through ads, or other companies, which just routinely abuse the spirit of open source to monetize other people's work.
Unless you're of the frankly radical opinion that anything that costs money is bad, and everything that is free is automatically better, and that the whole app ecosystem, that pays out like billions a year to actual, bonafide human beings writing software, could be instead totally supplanted by free websites. Then of course what I'm saying makes no sense.
Yeah, whatever. Who wants to have control over their device anyway? Much better if Apple gets to decide what I do with my iDevice. Not sure why Microsoft hasn't started the same approach, at least Linux distributions discourage people from installing software outside of the repositories, but there is much work left to be done in actually making that impossible. At least the latest innovations in home computing, smart speakers, don't allow you to run anything at all other than what the makers intended. It's great for privacy if you can't do insecure things.
Privacy and control really are much more synonymous than at odds with each other. Sure, allowing someone to shoot themselves in the foot is something you'll want to minimize happening, but if they can't shoot themselves in the foot when they really try very hard, then how much control do they have over their private life really?
> jailbreaking is bad for developers who want to sell nice, simple, pay up front no surveillance software
I fail to see how this is explained by the "because" that comes after it. It just makes zero sense: why would a user taking control be bad for the developers if they don't want to surveil your device anyway? They already have the money up front, as you say. Wouldn't it make more sense to expect something to be mine after I paid for it up front?
> Unless you're of the frankly radical opinion that [something exaggerated to the point where it's clearly illogical]. Then of course what I'm saying makes no sense.
I'm not sure what you're trying to say here. Anyone who disagrees must be of this weird opinion and there can be no other viewpoints: either you're with you or you're illogical and "radical"?
Heh, I suppose you've got me there: I indeed don't buy devices that don't allow taking control by design. But I know there are a lot of people that like other parts of the iOS ecosystem (apps are often more polished; they might be more used to the OS; etc.) and would prefer to keep those while still having having their four freedoms on the device.
That's quite a bold statement, and also not correct in my experience. Take for example NFC payments. Both Apple and Google will disable the mobile wallet if they detect that the phone has been rooted / jailbroken.
Both Apple and Google have a conflict of interest there, so that proves nothing about the security and everything about their perverse incentives.
How does it even make sense? It's safe for me to use the website from a jailbroken phone to transfer thousands of dollars to the account of a foreign national but not safe to use a jailbroken phone to pay $3 for a cup of coffee in a restaurant I'm physically standing in?
According to reddit, Apple Pay works on jailbroken devices, but still, something like this might be at play in all the other similar scenarios.
I can confirm that Apple Pay works on my jailbroken devices, and as far as I can tell, no jailbreak has managed to affect the Secure Enclave.
> And iirc Apple managed to convince the banking sector that Apple Pay is equivalent to chip card security, so that they get better rates.
It's not possible right now AFAIK but that doesn't mean it might not be possible later.
The main point I'm trying to make though is that mobile devices support NFC payments with virtual cards in wallets that are protected by Apple/Google. That's not a use case that is supported on regular PCs, so it's not unreasonable that the security requirements are different.
Any reasonable system (i.e. one using public key cryptography) does not allow the attacker to "clone" your virtual cards at all, because they don't have your private key, which never leaves your device. And if they've compromised your device (not their own) sufficiently to extract your private key then the game is over and you've already lost.
Once they have the private key they don't need a jailbroken phone running the official app, they can just speak the NFC protocol directly to the reader and sign with the victim's private key.
> The main point I'm trying to make though is that mobile devices support NFC payments with virtual cards in wallets that are protected by Apple/Google. That's not a use case that is supported on regular PCs, so it's not unreasonable that the security requirements are different.
The difference is that the security requirements should be lower, since it's only used for in-person purchases. Even if the attacker somehow has your private key, to use NFC they would have to show up in person, smile for all the surveillance cameras and risk getting arrested on the spot if the card has already been reported stolen.
I don't see the argument for why security requirements should be lower in that case. Security cameras are not always present and getting arrested "on the spot" for a virtual card theft seems unlikely given the nature of the crime (it seems doubtful police forces would have officers standing by for this purpose that are able to both detect and react quickly enough).
(something not done with a laptop)
There is no spending limit. Protection is important.
You're making a poor argument based on nothing more than a loose generalization.
A jail broken/rooted device may not have the same protections since jail breaking is typically circumventing that sort of threat protection.
So your argument is that walled garden devices are less secure assuming there exist methods to convert it into a general purpose computer, which they empirically do.
Shouldn't this be an argument for such devices to be less trusted? After all, you can't always tell when this has happened (so you better assume it has), whereas as you say the devices designed to be operated under that threat model would then be more secure.
I absolute agree that a user, as the owner of the phone, should be able to do this, especially in a safe and official manner. Right now it’s an all or nothing and that is a problem.
If it was jail-breakable, that security was never there in the first place.
Heh this was actually the case for a couple of Safari-based jailbreaks, all the way up to 9.3.4: https://en.wikipedia.org/wiki/JailbreakMe
Would you do banking on a random computer?
The three largest ransomware vectors are people leaving RDP exposed to the internet, phishing emails to get login credentials that are then used to gain access to internal systems, and vulnerabilities in existing software. None of those requires the user to install third party malicious software.
> Would you do banking on a random computer?
Would you do banking on a random iPhone? I wouldn't. There have been more than enough vulnerabilities that you have no way to know if it has already been compromised.
I just searched for “ransomware” on Google.
“One of the most common methods today is through malicious spam, or malspam, which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites.”
PCs and Macs are “insecure by design”. Anything that the user runs has full access to the users files and applications - without administrator access. How could this possibly be more secure than your typical iOS device? We have over 30 years of evidence of what happens when the typical user is able to install software that has free reign on their computer.
“ Malvertising often uses an infected iframe, or invisible webpage element, to do its work. The iframe redirects to an exploit landing page, and malicious code attacks the system from the landing page via exploit kit. All this happens without the user’s knowledge, which is why it’s often referred to as a drive-by-download.”
The browser is also another application that is not sandboxed on personal computers. Any security vulnerability in the browser leaves the computer vulnerable.
Notice that most if not all mobile ransomware affects Android devices?
Ah, yes, the same kind of software that forbids pasting passwords, because, security.
Although, to be fair, I must admit, the comparison is not entirely accurate. It is true that it makes some sense. I don't know about iOS jailbreaks, but on Android an application may request superuser privileges. Given that a significant fraction of users do tend to grant arbitrary permissions to see the flying pigs (numerous Android flashlight apps are a good example), I can see how this could be a problem. I believe I've heard of malware that does this.
That's why my latest Android phones haven't had user-facing root access or Xposed. The idea was that there was nothing installable/programmable (that I could grant by fat-fingering or someone could borrow/steal my phone and exploit the elevated capabilities) - just a custom-built firmware with everything I needed. I haven't yet felt a particular necessity to jailbreak my iPhone (although apps get worse every year so I may eventually consider it), so no experience in that regard.
Wait, you're worried you'll give something root without noticing? I can understand if you're worried about your mom doing that if you rooted her phone, but yourself?
(About rooting one's mom's phone, anecdotally I wish I had done that. She keeps getting notifications from Sony, the manufacturer, and things are just not customizable to suit her. When my grandma got a new smartphone a bit more recently, I rooted hers and then just set the supersu default to deny so she'd never get the prompt, and she's much happier with her phone. I've been considering rooting my mom's but the device wipe is such a pain, especially since you can't do app data backups without root (another reason to root: make actual backups). Android really needs an Apple iTunes-like backup system.)
TBH, I just didn’t need root access “on the go” - so, when I’ve decided I wanted to build my own image, I just haven’t found a reason/use case to include it. I had the full flash backups, an adblocker, a patch for clipboard read permission and a few UI customizations. And ability to add more stuff. That was all I needed.
A shame I had no control over bootloader and wasn’t able to truly lock down the device to my own signing keys.
Detecting root and jailbreaks isn't something developers do just to prevent power-users from using their devices, or because they think power-users are shooting their security in the foot, it's about stopping malicious actors from attacking regular users.
For example a piece of malware could achieve root and use it to read sensitive data from memory and log the user's inputs, including passwords and PIN codes. Malware has achieved root in the past, see the CopyCat malware on Android from a few years ago.
This also applies to features like Secure Boot. It's not just there to make power-users' lives harder. Without it, a malicious party could, for example, buy a bunch of smartphones retail, flash them with a malicious ROM, sell them at a loss, then recover the loss by stealing money using the victims' information.
These things also just break the security model of the platform they're on. It's hard to write a secure application when all the building blocks you're using could collapse at any time. Imagine writing a secure messaging app where someone could just replace all your crypto primitives. Wouldn't be easy, would it?
But we do have to wonder if the upsides outweigh the downsides. Someone surreptitiously stealing and replacing a smartphone to install malware on it can happen, but will that ever be common? Someone could also surreptitiously install malware on a laptop, but I don't hear of that happening a lot. I don't know of any banking trojan that is typically installed via physical access.
Do we want a world where people have no real ownership over their device anymore for this attack vector that has existed since day one but is rarely abused in the sort of attack that we're trying to prevent, or do we prefer a maker community to be able to exist? For example, F-Droid could not exist without Android allowing people to install software without needing Google's approval. A large part of the open source Android software is there and it's already fairly small due to the limitations that Android already put in place (F-Droid is large enough that I can replace nearly any apps with an open source alternative, but it's nothing like the community behind a Linux distribution).
It's also not just banks. Indeed, banks might not care about restricting users other than as a means to minimize risk, but Google certainly has an advantage if everything has to go through them. And I understand the developers agreeing to code it up: they're not evil people, they are themselves and they know they and their colleagues aren't evil. Of course they would allow any reasonable app in the app/play/whatever store and people can enjoy the platform without worry. I see their perspective, but there's a bit more to it than that ideal.
It’s kind of impossible, is it not? Why try futile efforts to “detect” this?
Practically though, it's exactly as we see here: a kind of arms race or cat and mouse game where the attackers circumvent the detection and the detection evades the circumvention.
So no, I don't think it's futile.
So all they're doing is detecting false positives from innocent people and zero instances of real malware.
(If there's an app that's truly essential for you, I'm sorry, that's a shame. But I haven't encountered that in my many years of using Jailbroken iPhones.)
And since these are all tethered jailbreaks, I don't want to completely re-install a banking app that locks itself up after I open it in unjailbroken mode (so the hider isn't working, but their jailbreak detection still does) after my phone dies and I forgot to re-jailbreak it.
They aren’t tethered completely. More semi tethered. I haven’t reconnected any device to a computer to re-jailbreak in many months. Most devices can use unc0ver. In which case you have to be Un-jailbroken for close to 7 days in a row for ReProvision to not renew unc0ver.
So that issue is a pretty big rarity.
If you are truly root, and the apps are not, then it's theoretically always possible to give them "the reality they want to see".
> The biggest downside is that you might find some existing apps on your phone can detect that the phone is jailbroken and refuse to start.
So the biggest downside is a problem completely caused by humans on purpose?
> There are obvious security reasons for apps like banking apps to do this but also many online gaming apps won't run if they detect that the device is jailbroken in order to deter cheating.
The gaming thing is irrelevant to me. I'm not going to sacrifice actually owning my device so that I can play games. As for banking it only matters if you lose your phone (if it's not encrypted) or if you give root access to a malicious piece of software. But even then, why should it matter? Your banking app should still be secure, but it allows the developers to be lazier. You can also log into your banking site through a web portal on your phone anyway even if you have root access so it's completely arbitrary to disallow access to an app on your phone. And the fact that it's checking for that anyway creeps me out.
Why is that everyone has has root/administrator access to their PCs but they are perfectly with using another computer that happens to be portable and not have root access. You supposedly own your phone, but if you don't have root access to it, I don't consider that as ownership. Whoever has root access to your phone owns it.
> There's an ongoing arms-race between app developers and jailbreakers where jailbreakers try to avoid detection and app developers find new ways to detect jailbreaks. So a new jailbreak will probably not be detected until a few weeks or months later when the app is updated.
That's great. A pointless arms race that's a waste of people's time. I'm glad the developments in a real Linux phone are picking up. I'd rather be in full control of the software that runs on my device instead of relying some corporate overlords babysitting me.
How has that been working out for the last 20+ years for the average consumer? How much more careful are you about installing random crap on your computer compared to your typical iOS device?
There are exactly zero reasons why a bank should be doing this and I would be quite pleased if Apple instituted rules against doing this kind of fingerprinting.
I don’t blame them, they’re mitigating another potential risk. Malware that’s essentially a rootkit could send your bank login details to a malicious third party in realtime, for example. 2FA codes and all.
Also remember there are lots of people out there that aren’t as tech savvy as the HN readership. A random person that just wants some springboard tweaks or similar may not verify where these tweaks came from & not understand the consequences of installing essentially untrusted software.
This is 100x worse in browsers on desktops, where the percentage of people who install things like browser extensions or persistent malware is non-neglible. Yet banks largely accept that as OK, and if someone’s bank’s website decided to probe the filesystem for “evidence” of malware would 1. cause a huge scandal and 2. immediately cause malware to hide itself from the detection.
I haven't used it myself, but two very similar kernel-level jailbreak detection bypasses were just released for unc0ver 13.x, FlyJB and KernBypass: https://github.com/akusio/KernBypass-Public
A couple of my banking apps detect my jailbreak but allow me to continue after hitting "Okay". The only app I ever wanted to use that refused to let me in was the Nintendo Switch Online app. Steam works fine. If you don't play games on your phone it isn't really a big deal imo.
One of those cases where a bug really is a feature
regarding the detection and added security - this is security through obscurity which has more downsides than protection it provides. not discussing the loss of privileges for device owner
But it allows you to do something magical—permanently hide just about any icon, button, or other UI element in just about any iOS app, all on your phone and without writing code. There are some caveats you should read about at the link below, but overall it works well!
I'm an interface minimalist. Mobile apps are so cluttered these days, and it feels so good to hide all the random crap I don't need.
I'll look into this. Thanks!
It's a nice idea though and I hope someone with experience in it will take an interest in writing this.
Also theming icons is lots of fun. A fresh coat of paint can make iOS feel exciting and new again.
The animations are a clever way to hide loading delay from the enduser.
There’s a paid app called iMazing (look for sales before buying) that allows downloading apps from the App Store to a computer and also installing apps from the IPA files to the device. There may be some other paid apps too for this.
This wouldn't require a jailbreak. There's nothing stopping anyone from making a no-compromises X11 server as a fully-sandboxed iOS App Store app.
> SSH server (i.e. POSIX environment)
There's technically no reason that this should require a jailbreak, either, though an implementation of this that conforms to App Store policies would work a bit differently than people would intuitively expect from e.g. Linux. Rather than going in and installing packages through a package-manager, any additional executable binaries you wanted would have to ship embedded into some code-signed App Store app, (i.e. put Apple's auditors in the path those binaries take to client devices.)
The obvious way to structure it would be to have one "base" app that sets up the skeleton of the POSIX environment and which also acts as a terminal emulator; and then have other apps that are installed to serve as "plugins" for the environment, adding their embedded binaries into the "base" environment (similar to how XCode.app and Server.app integrate their utilities into macOS's $PATH—but in a Shared Container rather than in the host filesystem.)
Compiling things and running them doesn't seem to be restricted completely any more, either, given that Swift Playgrounds exists. (I think it's just custom runtime JITs that are disallowed. Seemingly, if you have a compiler that writes an executable to storage and then fork(2)+exec(2)s it into a new process running under your app, that's fine.)
You can either join their Test Flight to install (until Apple takes it down), build and install yourself (good for 90 days and then you have to rebuild), or Jailbreak and install with no hassle.
So, jailbreaking is definitely not necessary, but would be easier due to Apples code signing policies.
s/90 days/1 year/ per:
There are terminal emulators and X servers on the app store now, but the problem is the limitations of the sandbox and performance. Alpine and an X server can be run on Qemu, but performance is far better with the native server.
And, Swift Playgrounds is an Apple product. They don't hold themselves to the same limitations as 3rd party app developers.
If this is allowed then anybody could blow a hole through the "walled garden" the size of an interstate highway just by providing a compiler that does this, which would allow arbitrary third parties to distribute their apps as source code anybody could compile and run. Somehow I suspect if you actually did this they would shut it down, otherwise why isn't everybody already doing it?
But if you can't then you hardly have anything like a POSIX environment, which is all about creating and running your own scripts and other code.
In jailbroken you don’t need the app open (or even the sreen unlocked) in order to connect to it.
- "powerlogHelperdFix": Listing this first because it's the only workaround I needed for a bug in the jailbreak, to fix the Battery stats Settings pane.
- "AlarmVolume": Custom (read: very loud) volume for my wake-up alarm, separate from the normal volume setting that I like to leave low or muted. Similar to how Android allows separate volume settings for calls / notifs / alarms: https://i.imgur.com/dV4URQT.jpg
- "Mega-Untrusted-Hosts-Blocker IPv4+IPv6": Adblocking hosts file for web content in all apps that works on mobile data or any random Wi-Fi network where you don't have an adblocking DNS server.
- "TwitterNoAds" + "AlwaysLatestTimelineTwitter": Blocking promoted tweets and forcing reverse-chronological feed (as opposed to algorithmically-sorted-feed) in the Twitter app.
- "AlwaysLow": Make my phone willing to always stay in Low Power Mode instead of turning LPM off once charged past 80%: https://i.imgur.com/wgn7Lj9.jpg
- "A-Font", "Noctis Neo", "ColorBadges", "iPadStatusBar13", "Cuboid": System UI customization. No real need; just to keep things fresh by changing up every once in a while. https://i.imgur.com/7Iy0gUs.jpg
- "Jellyfish": Customizable replacement for the standard lock screen. https://i.imgur.com/oQSaSl9.jpg
- "Clean Home Screen" + "FDots": Hide tiny UI annoyances like the blue Recently-updated-app dots, the text reminding me that I have to unlock my phone to use it, the text reminding me of what the Notification Center is, etc: https://i.imgur.com/x34If3d.jpg
- "StopPlayin12'": Stops the Apple Music app from auto-playing any time a bluetooth device (like my car) reconnects to my phone. I usually use a third-party music app, but iOS only ever wants to start the built in player. I still have to go manually start the app I want, but at least I get to do it in silence: https://i.imgur.com/90JPuqa.jpg
- "System Sound Disabler": Truly disable excessive UI sound effects so I can leave my volume up and not have to hear them: https://i.imgur.com/nTOrgH1.jpg
- "AskBeforeCalling Too 13": Prevent accidental pocket-dials by adding a confirmation dialog to any action that would initiate a call/text/whatever: https://i.imgur.com/3vw5fkw.jpg
- "NoAutoStraighten", "NoDNDBanner", "NoLowPowerAlert", "NoMoreSuggestions", "NoMoreSkinToneSuggestions", "NoNCHeaderView", "NoYellowBattery", "AppStoreUpdatesTab13", "Ultrasound", etc: Lots of small single-purpose UI tweaks that often don't even need settings panes.
- "NoYTNo" + "Youtube Tools": Automatically dismiss the constant Youtube Premium upsells when you open the app, re-enable background playback support, block ads in Youtube videos, etc.
- "NXBoot": Jailbreak my exploitable Nintendo Switch with any boot code using Apple's USB3 Lightning Camera Adapter: https://i.imgur.com/pySTOVO.jpg
- "RealCC": Reverts the Control Center Wi-Fi/BT toggles to their pre-iOS-11 functionality of fully disabling the associated radios instead of merely disconnecting your WiFi until 3AM the next morning like it does now.
- "DNDMyRecording": Automatically enables Do Not Disturb mode when taking a screen recording so unwanted notifications don't end up in your video.
- "GoodWifi": Display saved passwords for known Wi-Fi networks, display base station MAC, display true signal values, etc: https://i.imgur.com/xSVLhFU.jpg
- "DLEasy": Video downloader for all social media apps, including Reddit-style DASH/HLS segmented videos: https://i.imgur.com/IU1ZFWf.jpg
- "CopyLyrics" + "YTCopyDescription": Allows you to copy the plain text from the lyrics pane in Apple Music or the description of a video in the YouTube app.
- "Keyboard Accio": Makes the 'Globe' button on the keyboard only switch between the first two keyboards in my list of enabled keyboards, so I can leave several enabled without making it a tedious process to get through them all back to QWERTY. The full list is still available via a long press.
- "iKeyWi 4": Total layout customization for the standard keyboard without having to replace it with a third-party keyboard. I keep the layout pretty much the same aside from adding a fifth row of keys up top for a permanent number row: https://i.imgur.com/OQ0ITve.jpg https://i.imgur.com/Nj2UMQ7.jpg
- "Filza" + "Safari Plus": A fully-fledged graphical file manager that makes a great pairing with a tweak that gives Safari a native download manager: https://i.imgur.com/IoWrHKn.jpg
I'm sure most (if not all) of these probably sound unnecessary to many people, but I love feeling in control of my own phone instead of the other way around :)
Another great one is Flex 3, which allows you to sort of disassemble functions of installed apps and patch the functionality. It even has a simple community sharing/cloud aspect to find cool patches for a selected installed app.
Old repo, but has description:
- Youtube Tools from this repo: https://jpet26.yourepo.com/pack/youtubetools1
- Cercube from this repo: https://apt.alfhaily.me/depiction/FDXO5R
You will have to manually add either of these repos to your Sources list in Cydia. Try Youtube Tools first since it's free. I use Cercube myself, but I have a grandfathered account from when it was significantly cheaper and that's why I don't recommend it by default any more: https://old.reddit.com/r/jailbreak/comments/bsd9cy/question_...
Cercube does support downloading videos where Youtube Tools does not, but you can pair YTT with DLEasy to get feature parity for just a couple dollars instead of the full price of Cercube.
- one-click open a goo.gl/maps link in google maps (right now I need to click the link, then click open)
- copying text auto-opens a google translate bubble on the side I can use to view the translation (does not appear to be possible on iphone)
- change the default browser that opens from safari to chrome (right now I need to open it in safari, click share, select chrome, then hit "open in chrome". Those 4 clicks could be reduced to 1)
Bookmarks, great, I was wondering how to do that. A bit strange that it needs to visibly flick open the shortcuts app first before proceeding to Chrome..
I don't think I ever encounter those in my world, and always end up in google maps exclusively. I'm not saying you should change your behavior, but I bet the conveniences you look for exist in a different funnel that you might find just as fun.
- copying text auto-opens a google translate bubble
thats kind of cool, there might be an additional keyboard you can install that gets you the same result? But yes to translate I typically just have the google translate app open in the background and quick swap over to it.
For the translate bubble, maybe there's a shortcut, I don't know. If anyone knows of a way to do this, please let me know.
I’d jailbreak my iPad Pro immediately if I could get multiuser support. I really hope the multiuser stuff from tvOS 13 or Apple’s implementation for education accounts make it into iPad OS.
It's a very different era for jailbreaking, these days. We don't actually need an ACE exploit as a bootstrap any more; we can just rely on various pseudo-officially-sanctioned methods of running arbitrary code (e.g. an XCode development provisioning profile.) A jailbreak is now just a privilege-escalation exploit. Interesting times.
AltStore and its mods seem to be one of the few sideloading methods left for people who aren't paying $99/year for the Apple Developer Program.
Will Apple delay the release of macOS 10.15.5, which is expected this week? (Curious to know if the same exploit applies to macOS).
Those were the days.
unc0ver is necessary for newer phones that need a software entry point to jailbreak. It should work just the same on your phone too, but the hardware exploit is way way easier and should automatically* work with any new iOS updates as they are released.
[*] Any tweaks you have installed may of course be incompatible with a major OS update
Well, aside from the early versions of Android that ran all your keyboard input through a root shell: https://web.archive.org/web/20081206090335/http://blogs.zdne...
This is not very clear to me. Does this only mean that other security protections remain for apps that respect the restrictions? After jailbreaking, any malicious apps (even the ones that get through App Store reviews, not just the apps from Cydia) can get wider access to resources, right?
1. Open file manager
2. Click a bookmark that points to "sftp://tel"
3. I can now browse my phone, e.g. to view pictures or copy a previously taken screenshot. No need to take the phone out of your pocket and connect it over USB or anything.
"tel" is configured in ~/.ssh/config to point to the static IP of my phone. I have another ssh host called "hotspot" which points to the IP it uses when it functions as hotspot.
(Of course, this occasional convenience and full backups aren't the only things I would want root for.)
One of the fun things about Android is the ease of decompiling and recompiling Java, but if you're used to RE'ing native code for Windows or Linux, then I don't think it would be all that different?
that's the one thing i'd love to jailbreak for. and a UI tweak or two can be nice too.
This device is my device. It needs to be trusted & manipulable by me. But these manufacturers, they look on users & what they would do as the enemy, as power they grant only to themselves. It's sad being in this post-general-purpose computing age, maligned by my own machines.
If you have the proof of purchase, an Apple Store should be able to unlock it for you.
Users only need to get Apple involved if they forget their iCloud credentials.
Users can choose to enable Activation Lock, which means that only the owner or Apple can allow someone else to erase the device and set it up from scratch. Users can disable Activation Lock at any time. The only time that users can't disable it is if they forget their iCloud credentials. That's when they have to go to an Apple store and prove that they own the device.
And you still hold the private key, from what parent said having the store unlock the phone means that it will be factory reset so they still can’t access the data on the phone.
The key needed to decrypt the phone contents is generated and stored in the Secure Enclave, a separate piece of hardware+firmware on the phone. When the user providers their password/pin, the Secure Enclave checks to make sure it's correct and then it will decrypt the phone contents and make them available but the actual decryption key never leaves the secure enclave and isn't accessible by the main OS.
I think by then macOS will need a jailbreak if you want to disable SIP and have genuine root access.
32 bit devices can use coolbooter: https://coolbooter.com/
And I've not used this tool but am aware of it: https://github.com/MatthewPierson/Vieux
To be honest, I still have the ability to roll back to anything from 11.4+, but I have not even used it once. Apple is putting a lot of effort in to pulling people forward. (Some compelling apps just don’t launch on older versions, for example)
And if you have an iPhone X or older (iPhone 8, 7, etc) you have a hardware exploit and can jailbreak using checkra1n with just a computer and a USB Lightning cable: https://checkra.in/
Here's a video demo (not mine) of how the AltServer method should work for you: https://twitter.com/InvoxiPlayGames/status/12129681066095656...
You can jailbreak with unc0ver in 3 different ways, one of which requires an Apple Developer account, yes.
Dan Pollock’s list
All the Fanboy blocking lists
Any “annoyances” list you’re interested in
It looks like I may have not had to jailbreak after all. I assumed it was a necessary prerequisite.
Otherwise it blocks all ads in every other app (especially free to play games that are unusable with ads)
Nextdns will also work on your tv and block all ads (hello Samsung) and telemetry too (there is a smarttv block list you can select at the end of the choices on nextdns)