Is there a fix for checkm8?
Apple has not only allowed this to continue, but apple owners find out about " unmatchable" HACK on PC Mag !?
****!
You can make a difference in the Apple Support Community!
When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.
When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.
Apple has not only allowed this to continue, but apple owners find out about " unmatchable" HACK on PC Mag !?
****!
Apple didn’t allow anything to continue, the flaw was just discovered.
It does not work on any devices recently released after the X, XS and 11 aren’t affected.
According to security researchers:
Apple didn’t allow anything to continue, the flaw was just discovered.
It does not work on any devices recently released after the X, XS and 11 aren’t affected.
According to security researchers:
Your mistaken it’s technically not a jailbreak although it could turn into one. Checkm8 is a hardware vulnerability in the read-only bootrom that was exploited; it compromises millions of iPhone’s from the iPhone 4s to the iPhoneX that cannot be patched by apple short from recalling phones under warranty.
The newer iPhones after the IPhoneX do not have this vulnerability meaning it was patched via new hardware and apple know’s about the issue, but decided not to publicly acknowledge it.
It’s tethered meaning in and of itself isn’t great for a jailbreak because it requires physical access and undoes itself upon reboot requiring the exploit to be initialized again to the device using USB, but it can allow someone to downgrade the phone to a less secure iOS version, install malware, install a tethered jailbreak, install a modified iOS firmware, install iCloud lock bypasses, and dump the secure rom which may possibly allow the encryption to be bruteforced on devices like the iPhone 4s & 5c that do not have Secure Enclave’s. All of the above have caveats but that’s what iOS security researchers are working on.
Help me understand why you are concerned about this? YOU would have to do this to your phone yourself. Are you planning to do this? If you aren't planning to do this, it can't happen by itself. And if someone wants to do this and bricks their phone, Apple won't help them at all.
To quote an expert on this subject: The exploit is certainly a big deal for the jailbreak community, apart from that it makes no difference to nearly every iPhone or iPad user outside of that community.
So I'm not sure what it is you're accusing Apple of here or why it's concerning to you?
Correct. That is currently what we know so far. Although their have been talks of ways to allow a semi-tether by chaining it with other exploits to allow persistence at some level eventually, but only time will tell if this happens or not and does not change the fact it would require physical access to the device.
Don't jailbreak your phone. If you don't jailbreak it, there is nothing to be 'fixed' on your phone.
Is there a fix for checkm8?