<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=N00neimp0rtant</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=N00neimp0rtant"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/N00neimp0rtant"/>
	<updated>2026-05-08T20:40:47Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=26312</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=26312"/>
		<updated>2012-08-13T22:08:49Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
'''ATTENTION: If you are going to edit this chart, do NOT just put a question mark for or leave blank the Bundle Identifier. You can find the bundle ID of any app by looking in its Info.plist file. This saves us both time and effort, and it helps us filter patches on a per-app basis, making your phone or iPad run faster and more stable.'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! App Name&lt;br /&gt;
! Bundle Identifier&lt;br /&gt;
! Patched?&lt;br /&gt;
! Last Confirmed Working Version&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/airwatch-mdm-agent/id338761996?mt=8 Airwatch MDM]&lt;br /&gt;
| com.air-watch.agent&lt;br /&gt;
| {{partial|BETA}}&lt;br /&gt;
| {{partial|3.0.8}}&lt;br /&gt;
| Currently in beta. Details at https://github.com/n00neimp0rtant/xCon-Issues/issues/30&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/amazon-instant-video/id545519333?mt=8 Amazon Instant Video]&lt;br /&gt;
| ?&lt;br /&gt;
| {{Yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-mobile-banking/id536248734?mt=8 Barclays Mobile Banking]&lt;br /&gt;
| ?&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| App currently up to v1.0. Detects jailbreak with an RG22 error.&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.3.4-1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| 2.0.0 &amp;amp; 2.0.1 in beta - https://github.com/n00neimp0rtant/xCon-Issues/issues/34&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/entrust-identityguard-mobile/id384717687?mt=8 Entrust IdentityGuard Mobile]&lt;br /&gt;
| com.entrust.IdentityGuardSoftToken&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| Filed [https://github.com/n00neimp0rtant/xCon-Issues/issues/43 request 43] on the github page&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.22&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.10&lt;br /&gt;
| App works but admin console still reports jailbreak&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;!-- DO NOT REMOVE UNLESS YOU HAVE DONE A CLEAN JAILBREAK W/O SN0WBREEZE AND IT WORKS (sn0wbreeze patches iBooks) --&amp;gt;&lt;br /&gt;
| [http://itunes.apple.com/us/app/ibooks/id364709193?mt=8 iBooks]&lt;br /&gt;
| com.apple.iBooks&lt;br /&gt;
| {{no}}&lt;br /&gt;
| ?&lt;br /&gt;
| Patch(es) available in Cydia&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 2.2&lt;br /&gt;
| After update app is now saying &amp;quot;Streaming is unavailable on jailbroken devices&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/whatsapp-messenger/id310633997?mt=9 WhatsApp]&lt;br /&gt;
| net.whatsapp.WhatsApp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.10&lt;br /&gt;
| [http://pic.twitter.com/xEaFciOP Support button blocked]&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/bamboo-wallet/id492663955?mt=8 Bamboo Wallet]&lt;br /&gt;
| ?&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 7.5.4&lt;br /&gt;
| does not work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://github.com/n00neimp0rtant/xCon-Issues Issue list]&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=26311</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=26311"/>
		<updated>2012-08-13T22:07:58Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
'''ATTENTION: If you are going to edit this chart, do NOT just put a question mark for the Bundle Identifier or leave it blank. You can find the bundle ID of any app by looking in its Info.plist file. This saves us both time and effort, and it helps us filter patches on a per-app basis, making your phone or iPad run faster and more stable.'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! App Name&lt;br /&gt;
! Bundle Identifier&lt;br /&gt;
! Patched?&lt;br /&gt;
! Last Confirmed Working Version&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/airwatch-mdm-agent/id338761996?mt=8 Airwatch MDM]&lt;br /&gt;
| com.air-watch.agent&lt;br /&gt;
| {{partial|BETA}}&lt;br /&gt;
| {{partial|3.0.8}}&lt;br /&gt;
| Currently in beta. Details at https://github.com/n00neimp0rtant/xCon-Issues/issues/30&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/amazon-instant-video/id545519333?mt=8 Amazon Instant Video]&lt;br /&gt;
| ?&lt;br /&gt;
| {{Yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-mobile-banking/id536248734?mt=8 Barclays Mobile Banking]&lt;br /&gt;
| ?&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| App currently up to v1.0. Detects jailbreak with an RG22 error.&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.3.4-1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| 2.0.0 &amp;amp; 2.0.1 in beta - https://github.com/n00neimp0rtant/xCon-Issues/issues/34&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/entrust-identityguard-mobile/id384717687?mt=8 Entrust IdentityGuard Mobile]&lt;br /&gt;
| com.entrust.IdentityGuardSoftToken&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| Filed [https://github.com/n00neimp0rtant/xCon-Issues/issues/43 request 43] on the github page&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.22&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.10&lt;br /&gt;
| App works but admin console still reports jailbreak&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;!-- DO NOT REMOVE UNLESS YOU HAVE DONE A CLEAN JAILBREAK W/O SN0WBREEZE AND IT WORKS (sn0wbreeze patches iBooks) --&amp;gt;&lt;br /&gt;
| [http://itunes.apple.com/us/app/ibooks/id364709193?mt=8 iBooks]&lt;br /&gt;
| com.apple.iBooks&lt;br /&gt;
| {{no}}&lt;br /&gt;
| ?&lt;br /&gt;
| Patch(es) available in Cydia&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 2.2&lt;br /&gt;
| After update app is now saying &amp;quot;Streaming is unavailable on jailbroken devices&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/whatsapp-messenger/id310633997?mt=9 WhatsApp]&lt;br /&gt;
| net.whatsapp.WhatsApp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.10&lt;br /&gt;
| [http://pic.twitter.com/xEaFciOP Support button blocked]&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/bamboo-wallet/id492663955?mt=8 Bamboo Wallet]&lt;br /&gt;
| ?&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 7.5.4&lt;br /&gt;
| does not work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://github.com/n00neimp0rtant/xCon-Issues Issue list]&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=26310</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=26310"/>
		<updated>2012-08-13T22:07:46Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
'''ATTENTION: If you are going editing this chart, do NOT just put a question mark for the Bundle Identifier or leave it blank. You can find the bundle ID of any app by looking in its Info.plist file. This saves us both time and effort, and it helps us filter patches on a per-app basis, making your phone or iPad run faster and more stable.'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! App Name&lt;br /&gt;
! Bundle Identifier&lt;br /&gt;
! Patched?&lt;br /&gt;
! Last Confirmed Working Version&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/airwatch-mdm-agent/id338761996?mt=8 Airwatch MDM]&lt;br /&gt;
| com.air-watch.agent&lt;br /&gt;
| {{partial|BETA}}&lt;br /&gt;
| {{partial|3.0.8}}&lt;br /&gt;
| Currently in beta. Details at https://github.com/n00neimp0rtant/xCon-Issues/issues/30&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/amazon-instant-video/id545519333?mt=8 Amazon Instant Video]&lt;br /&gt;
| ?&lt;br /&gt;
| {{Yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-mobile-banking/id536248734?mt=8 Barclays Mobile Banking]&lt;br /&gt;
| ?&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| App currently up to v1.0. Detects jailbreak with an RG22 error.&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.3.4-1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| 2.0.0 &amp;amp; 2.0.1 in beta - https://github.com/n00neimp0rtant/xCon-Issues/issues/34&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/entrust-identityguard-mobile/id384717687?mt=8 Entrust IdentityGuard Mobile]&lt;br /&gt;
| com.entrust.IdentityGuardSoftToken&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| Filed [https://github.com/n00neimp0rtant/xCon-Issues/issues/43 request 43] on the github page&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.22&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.10&lt;br /&gt;
| App works but admin console still reports jailbreak&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;!-- DO NOT REMOVE UNLESS YOU HAVE DONE A CLEAN JAILBREAK W/O SN0WBREEZE AND IT WORKS (sn0wbreeze patches iBooks) --&amp;gt;&lt;br /&gt;
| [http://itunes.apple.com/us/app/ibooks/id364709193?mt=8 iBooks]&lt;br /&gt;
| com.apple.iBooks&lt;br /&gt;
| {{no}}&lt;br /&gt;
| ?&lt;br /&gt;
| Patch(es) available in Cydia&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 2.2&lt;br /&gt;
| After update app is now saying &amp;quot;Streaming is unavailable on jailbroken devices&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/whatsapp-messenger/id310633997?mt=9 WhatsApp]&lt;br /&gt;
| net.whatsapp.WhatsApp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.10&lt;br /&gt;
| [http://pic.twitter.com/xEaFciOP Support button blocked]&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/bamboo-wallet/id492663955?mt=8 Bamboo Wallet]&lt;br /&gt;
| ?&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 7.5.4&lt;br /&gt;
| does not work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://github.com/n00neimp0rtant/xCon-Issues Issue list]&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:XCon&amp;diff=25352</id>
		<title>Talk:XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:XCon&amp;diff=25352"/>
		<updated>2012-04-03T21:48:08Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* Skype */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
== Skype ==&lt;br /&gt;
Upon installing Skype on my unjailbroken device, it gave me the notification that it doesnt work. After jailbreaking, it still worked. --[[User:5urd|5urd]] 10:04, 21 March 2012 (MDT)&lt;br /&gt;
:Skype hasn't changed that warning since the 3.x days. It was probably back when Spirit did some serious kernel modding and Skype just knew it would work. Jailbreaks have changed since then. --[[User:Rdqronos|rdqronos]] 14:11, 21 March 2012 (MDT)&lt;br /&gt;
::Nope they check for Cycorder, MobileSubstrate, and I think one other thing. Not sure what the limitations are beyond the little notice at the beginning, but I patched over the checks anyway. (Someone told me they block video calling on jailbroken devices, confirm/deny?) --[[User:n00neimp0rtant|n00neimp0rtant]] 17:43, 3 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Action Movie FX ==&lt;br /&gt;
Exactly what does Action Movie FX do if it detects a jailbroken device? I use it a lot on my jailbroken devices and never get a warning, etc, though sometimes it crashes whenever you try and make a movie, though a reboot always fixes it.--[[User:JonathanSeals|JonathanSeals]] 14:00, 22 March 2012 (MDT)&lt;br /&gt;
: I haven't been having a good experience with the app, whenever i make a new movie it crashes. --[[User:Dylan Laws|Dylan Laws]] 23:40, 21 March 2012 (MDT)&lt;br /&gt;
:: It seems like more of a RAM issue than jailbreak detection. --[[User:JonathanSeals|JonathanSeals]] 14:00, 22 March 2012 (MDT)&lt;br /&gt;
::Yes --[[User:5urd|5urd]] 21:55, 24 March 2012 (MDT)&lt;br /&gt;
:I scoured the binary and there's absolutely no jailbreak detection anywhere in it. If all its doing is crashing, you've got yourself a memory issue. --[[User:n00neimp0rtnat|n00neimp0rtant]] 17:47, 3 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== New Column ==&lt;br /&gt;
Can we add a new column for xCon App list, that describes what the limitations are if not fixed? --[[User:Http|http]] 06:48, 22 March 2012 (MDT)&lt;br /&gt;
:I would like that --[[User:5urd|5urd]] 21:55, 24 March 2012 (MDT)&lt;br /&gt;
:That's exactly what the &amp;quot;Notes&amp;quot; column on the right is for. --[[User:n00neimp0rtant|n00neimp0rtant]] 17:41, 3 April 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:XCon&amp;diff=25351</id>
		<title>Talk:XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:XCon&amp;diff=25351"/>
		<updated>2012-04-03T21:47:47Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* Action Movie FX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
== Skype ==&lt;br /&gt;
Upon installing Skype on my unjailbroken device, it gave me the notification that it doesnt work. After jailbreaking, it still worked. --[[User:5urd|5urd]] 10:04, 21 March 2012 (MDT)&lt;br /&gt;
:Skype hasn't changed that warning since the 3.x days. It was probably back when Spirit did some serious kernel modding and Skype just knew it would work. Jailbreaks have changed since then. --[[User:Rdqronos|rdqronos]] 14:11, 21 March 2012 (MDT)&lt;br /&gt;
::Nope they check for Cycorder, MobileSubstrate, and I think one other thing. Not sure what the limitations are beyond the little notice at the beginning, but I patched over the checks anyway. (Someone told me they block video calling on jailbroken devices, confirm/deny?) --[[User:n00neimp0rtant|n00neimp0rtant]] 17:43, 3 April 2012&lt;br /&gt;
&lt;br /&gt;
== Action Movie FX ==&lt;br /&gt;
Exactly what does Action Movie FX do if it detects a jailbroken device? I use it a lot on my jailbroken devices and never get a warning, etc, though sometimes it crashes whenever you try and make a movie, though a reboot always fixes it.--[[User:JonathanSeals|JonathanSeals]] 14:00, 22 March 2012 (MDT)&lt;br /&gt;
: I haven't been having a good experience with the app, whenever i make a new movie it crashes. --[[User:Dylan Laws|Dylan Laws]] 23:40, 21 March 2012 (MDT)&lt;br /&gt;
:: It seems like more of a RAM issue than jailbreak detection. --[[User:JonathanSeals|JonathanSeals]] 14:00, 22 March 2012 (MDT)&lt;br /&gt;
::Yes --[[User:5urd|5urd]] 21:55, 24 March 2012 (MDT)&lt;br /&gt;
:I scoured the binary and there's absolutely no jailbreak detection anywhere in it. If all its doing is crashing, you've got yourself a memory issue. --[[User:n00neimp0rtnat|n00neimp0rtant]] 17:47, 3 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== New Column ==&lt;br /&gt;
Can we add a new column for xCon App list, that describes what the limitations are if not fixed? --[[User:Http|http]] 06:48, 22 March 2012 (MDT)&lt;br /&gt;
:I would like that --[[User:5urd|5urd]] 21:55, 24 March 2012 (MDT)&lt;br /&gt;
:That's exactly what the &amp;quot;Notes&amp;quot; column on the right is for. --[[User:n00neimp0rtant|n00neimp0rtant]] 17:41, 3 April 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:XCon&amp;diff=25349</id>
		<title>Talk:XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:XCon&amp;diff=25349"/>
		<updated>2012-04-03T21:43:34Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
== Skype ==&lt;br /&gt;
Upon installing Skype on my unjailbroken device, it gave me the notification that it doesnt work. After jailbreaking, it still worked. --[[User:5urd|5urd]] 10:04, 21 March 2012 (MDT)&lt;br /&gt;
:Skype hasn't changed that warning since the 3.x days. It was probably back when Spirit did some serious kernel modding and Skype just knew it would work. Jailbreaks have changed since then. --[[User:Rdqronos|rdqronos]] 14:11, 21 March 2012 (MDT)&lt;br /&gt;
::Nope they check for Cycorder, MobileSubstrate, and I think one other thing. Not sure what the limitations are beyond the little notice at the beginning, but I patched over the checks anyway. (Someone told me they block video calling on jailbroken devices, confirm/deny?) --[[User:n00neimp0rtant|n00neimp0rtant]] 17:43, 3 April 2012&lt;br /&gt;
&lt;br /&gt;
== Action Movie FX ==&lt;br /&gt;
Exactly what does Action Movie FX do if it detects a jailbroken device? I use it a lot on my jailbroken devices and never get a warning, etc, though sometimes it crashes whenever you try and make a movie, though a reboot always fixes it.--[[User:JonathanSeals|JonathanSeals]] 14:00, 22 March 2012 (MDT)&lt;br /&gt;
: I haven't been having a good experience with the app, whenever i make a new movie it crashes. --[[User:Dylan Laws|Dylan Laws]] 23:40, 21 March 2012 (MDT)&lt;br /&gt;
:: It seems like more of a RAM issue than jailbreak detection. --[[User:JonathanSeals|JonathanSeals]] 14:00, 22 March 2012 (MDT)&lt;br /&gt;
::Yes --[[User:5urd|5urd]] 21:55, 24 March 2012 (MDT)&lt;br /&gt;
&lt;br /&gt;
== New Column ==&lt;br /&gt;
Can we add a new column for xCon App list, that describes what the limitations are if not fixed? --[[User:Http|http]] 06:48, 22 March 2012 (MDT)&lt;br /&gt;
:I would like that --[[User:5urd|5urd]] 21:55, 24 March 2012 (MDT)&lt;br /&gt;
:That's exactly what the &amp;quot;Notes&amp;quot; column on the right is for. --[[User:n00neimp0rtant|n00neimp0rtant]] 17:41, 3 April 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25348</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25348"/>
		<updated>2012-04-03T21:38:13Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! App Name&lt;br /&gt;
! Bundle Identifier&lt;br /&gt;
! Patched?&lt;br /&gt;
! Last Confirmed Working Version&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.22&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/ibooks/id364709193?mt=8 iBooks]&lt;br /&gt;
| com.apple.ibooks(2?)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| ?&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25347</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25347"/>
		<updated>2012-04-03T21:35:32Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! App Name&lt;br /&gt;
! Bundle Identifier&lt;br /&gt;
! Patched?&lt;br /&gt;
! Last Confirmed Working Version&lt;br /&gt;
! Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/ibooks/id364709193?mt=8 iBooks]&lt;br /&gt;
| com.apple.ibooks(2?)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| ?&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25308</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25308"/>
		<updated>2012-03-24T05:24:24Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: Removed 2 apps determined to not actually have jailbreak detection.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!| App Name&lt;br /&gt;
!| Bundle Identifier&lt;br /&gt;
!| Patched?&lt;br /&gt;
!| Last Confirmed Working Version&lt;br /&gt;
!| Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25306</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25306"/>
		<updated>2012-03-24T00:53:06Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!| App Name&lt;br /&gt;
!| Bundle Identifier&lt;br /&gt;
!| Patched?&lt;br /&gt;
!| Last Confirmed Working Version&lt;br /&gt;
!| Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/action-movie-fx/id489321253?mt=8 Action Movie FX]&lt;br /&gt;
| com.badrobot.actionmoviefx&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/sentinel-3-homeworld/id396103539?mt=8 Sentinel 3: Homeworld]&lt;br /&gt;
| com.Origin8.Sentinel3&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot find any suspicious method/function calls at all.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25301</id>
		<title>XCon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=XCon&amp;diff=25301"/>
		<updated>2012-03-23T19:15:16Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
For general infos, see [[Bypassing Jailbreak Detection]].&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!| App Name&lt;br /&gt;
!| Bundle Identifier&lt;br /&gt;
!| Patched?&lt;br /&gt;
!| Last Confirmed Working Version&lt;br /&gt;
!| Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/action-movie-fx/id489321253?mt=8 Action Movie FX]&lt;br /&gt;
| com.badrobot.actionmoviefx&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.5.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/sentinel-3-homeworld/id396103539?mt=8 Sentinel 3: Homeworld]&lt;br /&gt;
| com.Origin8.Sentinel3&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot find any suspicious method/function calls at all.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25299</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25299"/>
		<updated>2012-03-23T12:47:46Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* How To Detect Jailbroken Devices */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
* '''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
* '''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
* '''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a rogue app can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
* '''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some rogue apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
* '''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
* '''dyld functions''' - By far the hardest to get around. Calling functions like _dyld_image_count() and _dyld_get_image_name() to see which dylibs are currently loaded. Very difficult to patch, as patches are themselves part of dylibs.&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
# In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
# Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
# Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
# If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
See [[xCon]] on its separate page.&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25264</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25264"/>
		<updated>2012-03-21T17:50:31Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* App Patching Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
* '''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
* '''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
* '''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a rogue app can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
* '''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some rogue apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
* '''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
# In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
# Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
# Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
# If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
=== App Patching Status ===&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!| App Name&lt;br /&gt;
!| Bundle Identifier&lt;br /&gt;
!| Patched?&lt;br /&gt;
!| Last Confirmed Working Version&lt;br /&gt;
!| Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/action-movie-fx/id489321253?mt=8 Action Movie FX]&lt;br /&gt;
| com.badrobot.actionmoviefx&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| Update 1.5.0 has new protection measures&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/sentinel-3-homeworld/id396103539?mt=8 Sentinel 3: Homeworld]&lt;br /&gt;
| com.Origin8.Sentinel3&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot find any suspicious method/function calls at all.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25258</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25258"/>
		<updated>2012-03-21T14:23:06Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
* '''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
* '''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
* '''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a rogue app can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
* '''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some rogue apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
* '''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
# In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
# Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
# Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
# If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
xCon is available free of charge in Cydia. No configuration is needed; just install and go.&lt;br /&gt;
&lt;br /&gt;
{{Heading|App Patching Status}}&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!| App Name&lt;br /&gt;
!| Bundle Identifier&lt;br /&gt;
!| Patched?&lt;br /&gt;
!| Last Confirmed Working Version&lt;br /&gt;
!| Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/action-movie-fx/id489321253?mt=8 Action Movie FX]&lt;br /&gt;
| com.badrobot.actionmoviefx&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it. Crackulous outputs &amp;quot;Cracking failed&amp;quot; error.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/sentinel-3-homeworld/id396103539?mt=8 Sentinel 3: Homeworld]&lt;br /&gt;
| com.Origin8.Sentinel3&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot find any suspicious method/function calls at all.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it. Crackulous outputs &amp;quot;Cracking failed&amp;quot; error.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25257</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25257"/>
		<updated>2012-03-21T14:18:08Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
* '''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
* '''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
* '''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a rogue app can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
* '''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some rogue apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
* '''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
# In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
# Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
# Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
# If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''You can find an app's current release version in its iTunes listing page, linked below in the app names. If an app's current release version is newer than the &amp;quot;Last Confirmed Working Version,&amp;quot; please help by testing it out yourself with the latest release of xCon and updating the table as necessary.''&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!| App Name&lt;br /&gt;
!| Bundle Identifier&lt;br /&gt;
!| Patched?&lt;br /&gt;
!| Last Confirmed Working Version&lt;br /&gt;
!| Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/action-movie-fx/id489321253?mt=8 Action Movie FX]&lt;br /&gt;
| com.badrobot.actionmoviefx&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it. Crackulous outputs &amp;quot;Cracking failed&amp;quot; error.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/barclays-pingit/id496552142?mt=8 Barclays PingIt]&lt;br /&gt;
| uk.co.barclays.PingIt&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum/id387231038?mt=8 Cablevision Optimum]&lt;br /&gt;
| com.cablevision.rDVR&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/optimum-for-ipad/id424612367?mt=8 Cablevision Optimum (iPad)]&lt;br /&gt;
| com.cablevision.iOTV&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/capital-one-uk/id481679012?mt=8 Capital One UK]&lt;br /&gt;
| com.ukcapitalone.capitalone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/au/app/commbank-kaching/id475728226?mt=8 Commbank Kaching]&lt;br /&gt;
| au.com.commbank.kaching&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/cox-tv-connect-for-ipad/id474096909?mt=8 Cox TV Connect]&lt;br /&gt;
| com.cox.ios.ipad.tvconnect&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-app-for-ipad/id421547368?mt=8 DirecTV for iPad]&lt;br /&gt;
| com.directv.mobile.ipad.navigator.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/directv-nomad/id448679509?mt=8 DirecTV Nomad]&lt;br /&gt;
| com.directv.mobile.iphone.nomad.production&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.8.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/za/app/dstv-mobile-decoder/id403946447?mt=8 DStv Mobile Decoder]&lt;br /&gt;
| com.multichoice.DStvMobileDVBH&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.01.07&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/movies-by-flixster-rotten/id284235722?mt=8 Flixster/Movies/Ultraviolet]&lt;br /&gt;
| com.jeffreygrossman.moviesapp&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 5.21&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/golden-screen-cinemas/id413024972?mt=8 Golden Screen Cinemas]&lt;br /&gt;
| com.sinodynamic.gsc&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/good-for-enterprise/id333202351?l=es&amp;amp;mt=8 Good For Enterprise]&lt;br /&gt;
| com.good.gmmiphone&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.9.7&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kbseutabaengking/id373742138?mt=8 KB star]&lt;br /&gt;
| com.kbstar.kbbank&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.14.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/kb-starplus/id381065734?mt=8 KB starPlus]&lt;br /&gt;
| com.kbstar.starplus&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/lovefilm-player-for-ipad/id454468674?mt=8 LOVEFiLM Player for iPad]&lt;br /&gt;
| com.lovefilm.watchnow.ipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies/id369867024?mt=8 Maxis Movies]&lt;br /&gt;
| com.maxis.moviebooking&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/maxis-movies-for-ipad/id418096484?mt=8 Maxis Movies (iPad)]&lt;br /&gt;
| com.maxis.moviebookingipad&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mcafee-enterprise-mobility/id322111072?mt=8 McAfee EMM]&lt;br /&gt;
| com.trustdigital.iTDClient&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.7.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/mobileiron-myphone-work-client/id320659794?mt=8 MobileIron MyPhone@Work]&lt;br /&gt;
| com.mobileiron.phoneatwork&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 4.5.12&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/sentinel-3-homeworld/id396103539?mt=8 Sentinel 3: Homeworld]&lt;br /&gt;
| com.Origin8.Sentinel3&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot find any suspicious method/function calls at all.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/skype/id304878510?mt=8 Skype]&lt;br /&gt;
| com.skype.skype&lt;br /&gt;
| {{no}}&lt;br /&gt;
| none&lt;br /&gt;
| Cannot even decrypt the binary, let alone class-dump or disassemble it. Crackulous outputs &amp;quot;Cracking failed&amp;quot; error.&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/gb/app/sky-go/id446086440?mt=8 Sky Go]&lt;br /&gt;
| com.bskyb.skygo&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/square/id335393788?mt=8 Square]&lt;br /&gt;
| com.squareup.square&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.2.5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/ca/app/telus-optik-tv-hd/id467260646?mt=8 Telus Optik TV]&lt;br /&gt;
| com.telus.nscreen&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/tv-live-de-la-orange/id390896393?mt=8 TV live de la Orange]&lt;br /&gt;
| com.orange.TVOrange&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.0&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/twc-tv/id420455839?mt=8 TWC TV]&lt;br /&gt;
| com.timewarnercable.simulcast&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.6.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/us/app/verizon-media-manager/id460536890?mt=8 Verizon Media Manager]&lt;br /&gt;
| com.verizon.ams.flexview&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 2.0.29.26&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://itunes.apple.com/no/app/voddler/id409806444?mt=8 Voddler]&lt;br /&gt;
| com.voddler.VoddlerHD&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25221</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25221"/>
		<updated>2012-03-19T23:20:21Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* How To Detect Jailbroken Devices */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
*'''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
*'''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
*'''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a rogue app can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
*'''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some rogue apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
*'''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
#In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
#Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
#Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
#If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''To-do''&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25220</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25220"/>
		<updated>2012-03-19T23:17:19Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: /* How To Detect Jailbroken Devices */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
*'''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
*'''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
*'''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a device can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
*'''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
*'''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
#In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
#Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
#Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
#If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''To-do''&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25219</id>
		<title>Bypassing Jailbreak Detection</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bypassing_Jailbreak_Detection&amp;diff=25219"/>
		<updated>2012-03-19T23:16:42Z</updated>

		<summary type="html">&lt;p&gt;N00neimp0rtant: Created page with &amp;quot;Recently, a sizable handful of applications in Apple's own App Store have been implementing procedures to check the authenticity of the device on which the app itself is runn...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recently, a sizable handful of applications in Apple's own [[App Store]] have been implementing procedures to check the authenticity of the device on which the app itself is running, forbidding or inhibiting usage of certain features or even the app altogether. Obvious reasons are about the innate security risks of [[jailbreak|jailbreaking]] your device (e.g. banking companies don't want the blame for some rogue keylogger disguised as a tweak snagging your account info). However, most of the time, it seems as if companies are worried about the possibility of tweaks bypassing certain restrictions implemented into their apps. Video streaming apps are notorious for this; the companies don't want users bypassing restrictions on when and where you can stream their content, so instead of doing the responsible thing and obfuscating their restriction attempts, they instead block all jailbroken devices, regardless of malicious intent or lack thereof.&lt;br /&gt;
&lt;br /&gt;
== How To Detect Jailbroken Devices ==&lt;br /&gt;
''For the sake of convenience within this article, a &amp;quot;rogue app&amp;quot; will refer to any app available in the App Store that actively implements jailbreak detection measures.''&lt;br /&gt;
&lt;br /&gt;
For the most part, jailbreak detection procedures are a lot less sophisticated that one might imagine. While there are countless ways apps can implement checks for jailbroken devices, they typically boil down to the following:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Existence of directories''' - Rogue apps love to check your file system for paths like [[Cydia.app|/Applications/Cydia.app/]] and [[/private/var/stash]], amongst a handful of others. Most often, these are checked using the -(BOOL)fileExistsAtPath:(NSString*)path method in NSFileManager, but more sneaky apps like to use lower-level C functions like fopen(), stat(), or access().&lt;br /&gt;
*'''Directory permissions''' - Similar to checking existence of directories, but checks the Unix file permissions of specific files and directories on the system using NSFileManager methods as well as C functions like statfs(). Far more directories have write access on a jailbroken device than on one still in jail.&lt;br /&gt;
*'''Process forking''' - sandboxd does not deny App Store applications the ability to use fork(), popen(), or any other C functions to create child processes on devices out of jail. sandboxd explicitly denies process forking on devices in jail. By checking the returned pid on fork(), a device can tell if it has successfully forked or not, at which point it can determine a device's jailbreak status.&lt;br /&gt;
*'''SSH loopback connections''' - Only a very small number of applications implement this (as it is not nearly as effective as the others). Due to the very large portion of jailbroken devices that have [[OpenSSH]] installed, some apps will attempt to make a connection to 127.0.0.1 on port 22. If the connection succeeds, it means OpenSSH is installed and running on the device, which obviously indicates that it is jailbroken.&lt;br /&gt;
*'''system()''' - Calling the system() function with no arguments on a device in jail will return 0; doing the same on a jailbroken device will return 1. Not sure why, but such is the case.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How To Reverse An App ==&lt;br /&gt;
#In order to dump or disassemble an app from the App Store, it must first be decrypted (often referred to as &amp;quot;[[Copy Protection Overview|cracking]]&amp;quot;), even if it is a free application.&lt;br /&gt;
#Using [[class-dump-z]] on the application's decrypted binary will dump all of the header files. Occasionally, these contain &amp;quot;giveaway&amp;quot; method names, like &amp;quot;deviceIsJailbroken&amp;quot; or &amp;quot;checkDeviceSecurity.&amp;quot; Typically, hooking these methods is enough to disable the jailbreak detection measures, but it nearly guarantees that the patch will not work on other apps.&lt;br /&gt;
#Tracing methods named like that in IDA using the Objective-C parsing feature can help pinpoint exactly which method is being used to detect the jailbreak.&lt;br /&gt;
#If the class-dumped headers don't give away anything, searching the binary for strings like &amp;quot;jail,&amp;quot; &amp;quot;cydia,&amp;quot; &amp;quot;apt,&amp;quot; etc. often lead to the breaking point.&lt;br /&gt;
&lt;br /&gt;
== xCon ==&lt;br /&gt;
xCon is a collaborative project by [http://twitter.com/unimp0rtanttech n00neimp0rtant] and [http://twitter.com/olunatiko Lunatik] that aims to be an all-in-one solution for hooking every known method and function responsible for informing an application of a jailbroken device. At first, the project aimed to patch applications on a per-app basis, but now it uses lower-level hooks to cover any apps that attempt to use the same procedure, even patching apps not explicitly reversed by the developers. Originally an open-source project, it remains closed-source now to discourage App Store developers from working around xCon's hooks.&lt;br /&gt;
&lt;br /&gt;
== App Patching Status ==&lt;br /&gt;
''To-do''&lt;/div&gt;</summary>
		<author><name>N00neimp0rtant</name></author>
		
	</entry>
</feed>