<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mikec</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mikec"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Mikec"/>
	<updated>2026-05-07T15:06:52Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IDecrypt&amp;diff=8668</id>
		<title>IDecrypt</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IDecrypt&amp;diff=8668"/>
		<updated>2010-08-23T22:59:24Z</updated>

		<summary type="html">&lt;p&gt;Mikec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iDecrypt is a GUI front-end for [[VFDecrypt Keys|VFDecrypt]] for Windows in development and private beta testing by the [[Maybach Dev Team]]. It is near completion and is expected to be released very soon.&lt;br /&gt;
&lt;br /&gt;
The tool is very simple to use - it requires you select the file you want to decrypt, enter the key, choose the output folder (or simply use the default one), then click &amp;quot;Decrypt&amp;quot;. It's a simple two-step process, which is considered much more convenient than using cmd by Windows users.&lt;/div&gt;</summary>
		<author><name>Mikec</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Star&amp;diff=8161</id>
		<title>Star</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Star&amp;diff=8161"/>
		<updated>2010-08-12T00:20:44Z</updated>

		<summary type="html">&lt;p&gt;Mikec: Fixed typo where 4.0.1 was listed as breaking Star&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Star.jpg|thumb|Star on an [[N72ap|iPod touch 2G]].]]&lt;br /&gt;
Star is a userland [[jailbreak]] from [[User:Comex|comex]] that utilizes 3 unknown exploits (2 new exploits, and 1 from [[Spirit]]) to jailbreak iOS 3.1.2, 3.1.3, 4.0 and 4.0.1. Star warns that 3.1.2 and 3.1.3 are known to fail though, and that performing a fresh restore to 4.0(.1) is recommended. It can be used via [[Jailbreakme]]. With the release of iOS 4.0.2 (and iOS 3.2.2 for iPads) on 11 August 2010 the vulnerabilities were fixed so that it doesn't work anymore.&lt;br /&gt;
&lt;br /&gt;
==Payloads==&lt;br /&gt;
The first payload is deployed via a http redirect to a prepared pdf file. The PDF contains a CFF font with a malformed type 2 charstring, which contains commands to repeatedly push and duplicate random numbers onto an &amp;quot;argument stack&amp;quot;. Presumably this crashes the font parser.&lt;br /&gt;
&lt;br /&gt;
The second payload use an exploit in the kernel to get root access and privileges in order to jailbreak.&lt;br /&gt;
&lt;br /&gt;
==PDF Warner==&lt;br /&gt;
Because this jailbreak revealed a new security hole, malicious people could also make use of this. Therefore it is recommended to install the PDF Warner from Cydia.&lt;br /&gt;
==Links==&lt;br /&gt;
*[http://github.com/comex/star Sourcecode for Star]&lt;/div&gt;</summary>
		<author><name>Mikec</name></author>
		
	</entry>
</feed>