By Stephen Schenck | February 5, 2013 4:36 PM
While most of us are only going to focus on the end results of a massive hack like the one the evad3rs managed to pull off to produce their evasi0n jailbreak, some of us smartphone fanatics are just as interested in exactly what steps needed to be taken to overcome Apple’s heavyweight iOS security system. Luckily for us, evad3rs member David Wang (planetbeing) spoke to Forbes to reveal just what tricks evasi0n uses to sidestep Apple’s protection.
Wang’s report isn’t quite a full technical description of exactly what evasi0n does to achieve its jailbreak down to every last system call, but it’s remarkably detailed for what it is, and really gives you a sense of all the effort put into this release. Being such a lengthy overview of how things work, we won’t repeat all of Wang’s words here, but we highly suggest checking out his account if you want to really appreciate how difficult this project was.
From exploiting Apple’s mobile backup system, to hijacking the iOS Launch Daemon, to making the phone’s root file system writable, and down to the the kernel modifications themselves, Wang lays it all out, only restraining himself to avoid giving Apple too many details into some critical components of the hack. For his whole explanation, check out the source link below.