Difference between revisions of "User:Pod2g"

From The iPhone Wiki
Jump to: navigation, search
m
Line 4: Line 4:
 
He was the first to [https://twitter.com/pod2g/status/23932796062 tweet the IMG3 keys] for [[iBSS]] for [[iOS]] 4.0.1 on the [[n90ap|iPhone 4]], as proof of unsigned code running on the device.
 
He was the first to [https://twitter.com/pod2g/status/23932796062 tweet the IMG3 keys] for [[iBSS]] for [[iOS]] 4.0.1 on the [[n90ap|iPhone 4]], as proof of unsigned code running on the device.
   
As of [[Timelione|January 29, 2011]], he revealed to have two [[Untethered jailbreak|untether exploits]]. News of release have not been revealed. On December 27, 2011 he released an untether for iOS 5.0.1 for [[S5L8940|A4]] devices. His untether is now built into [[redsn0w]], [[PwnageTool]] and a Cydia package called [[corona]].
+
As of [[Timeline|January 29, 2011]], he revealed to have two [[Untethered jailbreak|untether exploits]]. News of release have not been revealed. On December 27, 2011 he released an untether for iOS 5.0.1 for [[S5L8940|A4]] devices. His untether is now built into [[redsn0w]], [[PwnageTool]] and a Cydia package called [[corona]].
   
 
== External Links ==
 
== External Links ==

Revision as of 18:07, 23 October 2012

pod2g is an iPhone hacker who has discovered several bootrom exploits, including the 0x24000 Segment Overflow and the usb_control_msg(0xA1, 1) Exploit. He was formerly part of the Chronic Dev Team, but left for personal reasons.

He was the first to tweet the IMG3 keys for iBSS for iOS 4.0.1 on the iPhone 4, as proof of unsigned code running on the device.

As of January 29, 2011, he revealed to have two untether exploits. News of release have not been revealed. On December 27, 2011 he released an untether for iOS 5.0.1 for A4 devices. His untether is now built into redsn0w, PwnageTool and a Cydia package called corona.

External Links