We finished our first show last night! Without further ado, you can listen to it here! Thank you to all our callers, listeners and friends on the chat. We had a great time with chpwn, comex and our other special guests. Congratulations once more to our MyWi winners. You can post your feedback on our forums or shoot us an email at firstname.lastname@example.org!
Edit: We now have an MP3 version available as well.
Don’t forget: our first show goes live tonight at 8:30 PM *EST*, and thanks to your submissions, we’ve got some great questions to ask chpwn and comex! We hope you tune in — if not, we’re planning on having a recorded version of our broadcast available.
Callers who are interested in a free MyWi license (only ten available!) should call in to the show with the number 1-860-GOT-WADE. We’ll let you know when lines are open.
Edit: 8:30 PM Eastern time. Sorry about that!
Good news, everyone. We’re going to be giving out 10 free MyWi licenses on our broadcast tomorrow — all you have to do is be one of our 10 lucky callers!
Here’s more info:
*** Easiest and Best performing iPhone® tethering app ***
Create an iPhone® WiFi HotSpot or iPad® WiFi HotSpot with a press of a finger! Wherever you are – you can connect your laptop or other mobile device to your iPhone®/iPad® easily to use your iPhone/iPad’s data connection. MyWi™ 4.0 has been rebuilt from scratch to bring iPhone WiFi tethering support to iOS 4! Will work with all jailbroken iPhones (including 2G/3G/3GS/4) and iPad on 3.1.2 or later.
- Create iPad or iPhone WiFi Hotspot to connect mutiple laptops or mobile devices to share your iPhone/iPad’s internet connection
- 40 bit and 104 bit WEP Security to prevent others from accessing your WiFi HotSpot
- Ability to enable USB and Bluetooth Tethering on your iPhone or iPad
- Broadcasts the Network Name (SSID) – no need to fuss with creating an adhoc network on your laptop
- Shows up and down bandwith usage for iPhone WiFi Tethering or iPhone USB Tethering
- Uses less battery and much faster then other tethering apps due to native routing
- Please check your contract/carrier agreement regarding WiFi tethering other devices to your iPhone/iPad. Additional charges may apply.
- 3-Day Free Trial via Jailbreak your iPhone and install via Cydia!
Don’t miss out! We hope to hear from you tomorrow, our show starts at 8:30 PM EST.
Now’s your chance to submit questions and feedback to the gentlemen behind JailbreakMe 3.0! We’re interviewing them tomorrow, so be sure to head on over to the forum! Alternatively, you can also participate in a live chat or give us a call.
We’ll also have a special giveaway on our program, so be sure to stay tuned for more details. Our show is tomorrow at 8:30 PM EST.
In an exclusive, chpwn gave us the latest stats for JailbreakMe.com. Check it out:
Statistics Summary for JailbreakMe.com
July 18, 2011
- 6,926,293 Visits
- 8,267,258 Pageviews
- 3+ Million Jailbreaks
Top 5 Browsers
- Safari — 5,737,585
- Firefox — 328,579
- Chrome — 309,632
- Internet Explorer — 296,083
- Mozilla Compatible Agent — 191,849
Top 10 Countries
- United States — 1,555,467
- China — 1,138,180
- France — 318,217
- Germany — 315,375
- United Kingdom — 274,448
- Canada — 192,164
- Spain — 180,911
- Saudi Arabia — 174,623
- Hong Kong — 168,346
- Italy — 166,385
Last Friday, Apple released an update to its PDF reader, patching the flaw exploited by JailbreakMe 3.0. This is the second jailbreak-related PDF vulnerability that Apple has been forced to address. Apple stated that “viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution” and that it is “available for iOS 3.0 through 4.3.3 for iPhone 3GS and iPhone 4 (GSM model), iOS 3.1 through 4.3.3 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.3 for iPad”.
However, comex already released a patch for jailbroken iDevices, called PDF Patcher 2. Already jailbroken users are advised by the iPhone Dev Team to install PDF Patcher 2 so that they may be protected from security vulnerabilities, and it works for any firmware version. (Instructions: load Cydia, search for PDF Patcher 2, tap INSTALL and CONFIRM.)
Many publications have reported that 4.3.4 is already jailbroken. To be more precise, although users can install a jailbroken version of iOS 4.3.4 on certain devices, those jailbreaks rely on vulnerabilities present in the hardware of certain devices. This is independent of the iOS version it is running on, and hence will not work on all iOS 4.3.4 devices. These jailbreaks often will require a special program to be used every time the device needs to be booted up (i.e. a “tethered” jailbreak).
For the iPad 2, no such hardware vulnerability has yet been discovered, so iOS 4.3.4 cannot be jailbroken at all for that device.
We’re happy to announce that we’ll have two very special guests on our inaugural Jailbreak Radio broadcast: the developers behind JailbreakMe, Grant “chpwn” Paul and comex! We’ll talk about their latest release and take your questions and comments. You can submit them in advance at our forum, participate in a live chat, or give us a call. Be sure to tune in next Tuesday (the 19th) at 8:30 PM EST.
Verizon (CDMA) iPhone users reported an issue with JailbreakMe 3.0 which caused their devices to be stuck on the Apple logo at startup. Luckily, @comex has solved that problem and wrote the following guide:
A bug in JailbreakMe 3.0 could cause iPhone 4 (CDMA, i.e. Verizon) to get stuck at the Apple logoand be unable to boot. If you are in this situation, there are two options:
- Hold down the home and power buttons until you see “Connect to iTunes”, then use iTunes to restore to the latest firmware. This will lose data stored on the phone.
- Apply a quasi-experimental fix using redsn0w. Download:
- redsn0w 0.9.6rc19: Windows / Mac (do not use an earlier version)
- Fix bundle, depending on firmware version: 4.2.6 / 4.2.7 / 4.2.8
- IPSW for your firmware version, if you don’t have it: 4.2.6 / 4.2.7 / 4.2.8
Open redsn0w, select your IPSW, choose “Install custom bundle“, and select the fix bundle. Then follow the directions. If it works correctly, after installation your phone will boot normally.
There is a separate bug where choosing “Re-jailbreak” would cause a device to be unable to boot. If you have this issue and don’t want to restore, contact me.
New users wishing to jailbreak their device need not worry, as the fix has been introduced into the latest JailbreakMe 3.0 update.
A new “essential upgrade” is available in Cydia, as @saurik tweeted that “@comex made some fixes to the kernel patches for JailbreakMe”. This addresses several bugs which have cropped up since the release, including the camera connection kit issue. Non-Verizon users who are already jailbroken can open Cydia to accept the upgrade (see screenshot above), but those with Verizon should wait until there are further updates. comex warned that this debugging has “messed up” those CMDA iPhones.
The 3.0 version of JailbreakMe has been officially launched by @comex, who developed it in collaboration with @saurik and @chpwn. It works for all iOS devices running the latest 4.3.3 firmware, making it the first jailbreak solution that is compatible with the iPad and iPad 2.
JailbreakMe 3.0 supports the following:
iPad1: 4.3 to 4.3.3
iPhone3GS: 4.3 to 4.3.3
iPhone4: 4.3 to 4.3.3
iPhone4-CDMA: 4.2.6 to 4.2.8
iPod touch 3g: 4.3, 4.3.2, 4.3.3
iPod touch 4g: 4.3 to 4.3.3
The hack allows users to “free” their devices by utilizing a PDF vulnerability. The hacking process is simple. After visiting JailbreakMe.com through their iDevice’s browser, users start by tapping the FREE and INSTALL buttons to load an exploited PDF that injects the code. JailbreakMe will automatically install saurik’s popular Cydia, allowing access to unauthorized apps not found in Apple’s official app store.
After jailbreaking, users can enjoy the benefits of greater options, customization and control. With a DMCA exemption granting iPhone jailbreaking legality in the United States, JailbreakMe.com also assures that it is completely reversible.
comex released JailbreakMe 2.0 in August of last year, which first introduced browser-based jailbreaking via a PDF exploit.