Well I saw the video, from the iphone-devs, did you guys see it? It looks promising.
They pretty much have everything ready, they just want to release a "QuickPWN" sort of gui application to do the work automatically.
Ya, I heard that he needs to make it so it stays in a permanent state where a computer is not longer needed. Or something along the lines of that.
On iPTF, Chronic basically said that this exploit might render useless due to the signature checks and the inability to solve that problem. If it was him doing this right now, he would be looking for a new exploit. However, since the dev team is composed of professionals working in the engineering and programing fields, they know much more and are most likely going to crack it. However, time will tell.
Chronic also said he couldn't have even get the current exploit into a usable state. He is a smart guy but he is no where near on the same level as the dev team.
Commenter said:MuscleNerd- I don't care about when it will be released, but today on ipodtouchfans, King Chronic said that you guys will have to find another exploit. Is this true?
MuscleNerd said:This is what we've been looking for for the past couple of days...a way to compromise the system lower than the level we're at, to break the tethering requirement.
If it takes too long to find (if we conclude that we're "stuck"), then we'll just release the tethered version and let you guys jump through the hoops needed to get it to work (and without us redistributing Apple software of course). But that would be a headache for everyone, so we're looking for something a lot easier to use than that.
Commenter said:how long will you spend looking for a new exploit until you conclude you are "stuck"?
MuscleNerd said:When we run out of ideas to try
Chronic said:I have been particularly quiet lately because I have been working with pod2g, ius, CPICH, westbaer, AriX, and some others on IRC to test this out.
We have had major success with the arm7_go exploit. We can not successfully get it to run unsigned code, so we are pretty much up to par with the devteam in regards to being able to patch out signature checks in RAM, and probably boot to a hacked filesystem, although that has not been tested yet as the most recent success came from a payload by me and ius that I have dubbed