evad3rs Member Reveals (Most of) How evasi0n Works

While most of us are only going to focus on the end results of a massive hack like the one the evad3rs managed to pull off to produce their evasi0n jailbreak, some of us smartphone fanatics are just as interested in exactly what steps needed to be taken to overcome Apple’s heavyweight iOS security system. Luckily for us, evad3rs member David Wang (planetbeing) spoke to Forbes to reveal just what tricks evasi0n uses to sidestep Apple’s protection.

Wang’s report isn’t quite a full technical description of exactly what evasi0n does to achieve its jailbreak down to every last system call, but it’s remarkably detailed for what it is, and really gives you a sense of all the effort put into this release. Being such a lengthy overview of how things work, we won’t repeat all of Wang’s words here, but we highly suggest checking out his account if you want to really appreciate how difficult this project was.

From exploiting Apple’s mobile backup system, to hijacking the iOS Launch Daemon, to making the phone’s root file system writable, and down to the the kernel modifications themselves, Wang lays it all out, only restraining himself to avoid giving Apple too many details into some critical components of the hack. For his whole explanation, check out the source link below.

Source: Forbes
Via: 9to5 Mac

Share This Post
Join the discussion...
About The Author
Stephen Schenck
Stephen has been writing about electronics since 2008, which only serves to frustrate him that he waited so long to combine his love of gadgets and his degree in writing. In his spare time, he collects console and arcade game hardware, is a motorcycle enthusiast, and enjoys trapping blue crabs. Stephen's first mobile device was a 624 MHz Dell Axim X30, which he's convinced is still a viable platform. Stephen longs for a market where phones are sold independently of service, and bandwidth is cheap and plentiful; he's not holding his breath. In the meantime, he devours smartphone news and tries to sort out the juicy bits Read more about Stephen Schenck!