Ethical Hacking: The History of Jailbreaking iOS
What is iOS jailbreaking and why is it even a thing that people want to do? Jay Freemen, also known by his twitter handle @saurik, best described jailbreaking as:
“[Allowing] users to take control of their devices. There’s an old saying about Ford motorcars, that you can have any color you want as long as its black, and that very much applies to Apple. And, until very recently, you can have any wallpaper you want as long as it’s black” (Freeman).
What Freemen was referring to was how, up until iOS 4, you could not set a wallpaper on your iPhone, leaving you with only a mundane black background. So, people in pre-iOS 4 days, would be able to jailbreak their iOS device and gain the
…show more content…
So instead of returning the device or reselling it get his money back the young hacker decided he was going to use his technical prowess to solve his problem. So Hotz dismantled his phone, found the phones baseband processor, scrambled its code using a soldering tool and managed to reprogram it to work with T-Mobiles cellular network (Heath) (Freeman). As Jay Freemen noted in his interview with Make It Work on YouTube, this technically is not jailbreaking, the correct term is [carrier] unlocking. However, this is one of the first times that an iPhone has ever been hacked to do something that Apple did not intend it to do.
Around the same time that Hotz figured out how to unlock the original iPhone another group of hackers figured out how to gain access to the iOS kernel and install custom ringtones on their device (Heath). As interest in jailbreaking began to grow a few groups of hackers began to post iOS jailbreak tools on the internet for anyone to use. These early tools were very rudimentary and some were unstable by current standards. Eventually the jailbreak community organized shortly after Jay Freeman jumped on the jailbreaking bandwagon.
A year or so before Apple implemented the App Store on all iOS devices Jay Freemen created a repository aptly named Cydia after the moth who is known for destroying fruit crops as a larva. The Cydia repository, or more commonly known as the Cydia Store, became a central place for third party app
Subsequently, I think Apple should try and use the patch method to unlock the iPhone for several reasons, instead of not unlocking it at all. The iPhone's owner is a gunman, a shooter, and it would seem quite wrong to not unlock it to figure out anything, like who was this person, what are his plans, what made him like this. Technically, Apple has the right to refuse to unlock the iPhone, but we need to solve this issue, and protect ourselves from future terrorists to use iPhones. There is another problem, and it is that if Apple decides to work with the FBI to break the laws just to break into their own iPhones, other foreign governments can use Apple to break into iPhones from owners that don’t live in the US. This means that Apple will have to work more with others and give up time to use the iPhone. I think Apple should have some time to unlock the iPhone just for the FBI so they can have access to the terrorist’s plans. Terrorism in the US is a very critical problem and is very serious and Apple will need to solve the way to unlock the iPhone without giving up privacy and security to the FBI. Apple will need to find a way to make the iPhone unlock without the FBI knowing how to and other foreign governments also. If Apple does not succeed to unlock the iPhone, or gives up both privacy and security, then having an iPhone really looks like there is no specialty or difference between Android phones. If Apple decides to unlock the iPhone just for the FBI, this
Smartphones are combining cellphones and PDAs (Personal Data Assistant) into a single device system which offers some more than just a basic computer. The IOS is the Apple operating system, which allows you to multitask, create folders, and tethering’s that allows other devices to share the phones Internet connection. The IPhone matches with ITunes unlike other smartphones, so your ITunes on your computer is right there on your phone. The first four versions of the IPhone you would have to have a computer to set it up, but with technology booming with IOS 5 you are able to set up your IPhone on the phone itself for those who don’t own a computer. The IPhone IOS 5 connects to Apple’s App store, which offers the users thousands of applications for use on the IPhone. The IPhone has different hardware from other smartphones. Reports say that the battery life is
The case of Apple Vs FBI is basically the FBI trying to have Apple change their operating system (OS) in their phones so they can be encrypted if they need to be. Currently, Apple phones are set up to protect against hacking. The FBI wants to gain this access so they can stop a terrorist from being able to use mobile technology as means of harm and to gain knowledge of what the attack could be.
Johnson, Jon Swartz, K., Cava, M. D., & Swartz, J. (2016, March 29). FBI hacks into terrorist's iPhone without Apple. Retrieved September 26, 2016, from http://www.usatoday.com/story/news/nation/2016/03/28/apple-justice-department-farook/82354040/
Vance stated that not having access to encrypted iPhones is a significant impediment to law enforcement. He said that criminals know that this technology is essentially warrant-proof and that companies need to adapt to the tech that they’ve created. He compared the issue of the FBI compelling apple to create a tool to the requirement that banks track certain
These “hackers” are using the tethering feature to use up to two terabytes in some cases, which is well over the allotted amount. Typically, once a user reaches their limit then T-Mobile will throttle their data, which means their download and upload speeds will see a pretty noticeable decrease. In order to circumvent this, the “hackers” are using apps that allow them to hide their usage from T-Mobile, so the company never actually sees how much data is being used by the user.
People who are advocates of the government having a backdoor to unlock iPhones believe that this act will help reduce crime in society. Apple is one of the most widespread and frequently used brands in today’s society. It is no astonishment that the government seeks to use this company as a resource for information on crime activity. This demand has recently resulted from the government being unable to access the information in the iPhone 5c of one of the attackers of San Bernardino. The assailant was one of the individuals accountable for the deaths of fourteen victims. “Prosecutors said the contents of the phone could provide crucial evidence about the attackers’ communications and contacts before the shooting.” The attacker is now dead and all that is left of his deeds and intentions is his iPhone 5c. This criminal was using the iPhone that millions of other people use every day to contact other criminals and most likely discussed the details of his tactics. If the government has access to iPhones they are then capable of learning more about the criminals that use the phones and they can learn about their intentions in order to prevent further crime. Millions of people use iPhones including criminals and this form of communication is something the government needs access to in order to help prevent crime.
because it was older and more hackable than Dama's iphone 6. The father said that Apple
We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal. Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. (Cook)
“I believe Apple should help the FBI unlock a terrorist’s phone. Although doing this risks customer privacy, it's the price we have to pay for valuable information that could keep us safe in the long run. The ideal situation would be for Apple to create a way to unlock the iPhone without deleting information just this once and keep the way to do this confidential.”
The use of a backdoor or a “Master key”, would expose innocent citizens with an iPhone. The implications of putting one in, could leave us all very exposed and open to government surveillance. Tim Cook, Chief Executive Officer of Apple discusses what could be opened due to the backdoor “The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach
Privacy is something that a very important to people, and smart phones are also important to people in society today. The very popular phone right now is an iPhone, and Apple has made softwares where people can not hack into phones that easily. When a shooting occurred in San Bernardino, the FBI demanded them to hack into one of the criminal’s phone, but Apple refused. By refusing to the FBI’s request Apple has respected the rights of the people and their privacy.In the article, “PRO/CON: Should Apple have resisted FBI pressure to hack an iPhone?” Expresses the fact that Apple has no right and should not let help the FBI in hacking a phone without the proper warrant.The Apple company now that the people have some private information and they are sticking to their word in keeping it private.
Last year in December, a horrid act of terrorism transpired in San Bernardino: multiple lives lost. The government and FBI have frantically been trying to sort through the event to understand the crime. In a letter to Apple's customers, Tim Cook, Apple's CEO, addresses the issue over the FBI trying to force Apple to create a software to unlock an iPhone “recovered during the investigation”(Cook). Apple does not have a software or way to get into the phone at the time, but surely could create one, yet they should not. Unlocking the iPhone would potentially open a backdoor, and as Cook explained, “Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge” (Cook). Though this specific phone could allow the government to access critical information that could help to solve the San Bernardino case, it would also, undoubtedly, create many problems if the software got into the wrong hands.
Before embarking on any quest to jailbreak your iPhone or iPad you should first back up your data so that once you complete the jailbreak process you can simply restore your data back into your device. The next step is to download the latest version of Yalu jailbreak
The second ethical dilemma is related to Apple's failure to disclose the fact that the battery needs to be replaced after 300 to 400 charges and that customers must surrender their iPhone to Apple for replacement. The iPhone is not a just mobile phone; it is a power hungry device equipped with a touch screen, colorful user interface, portable mp3 player, web browser, PDA and more. Owners of all other mobile phones can purchase and replace their batteries themselves and without risk to the device. By contrast, iPhone owners find it is extremely hard to open the iPhone case. The iPhone's battery is glued to the unit, and the wires from the battery to the circuit board are soldered. This clearly shows that Apple does not appear willing to provide a battery replacement option unless design changes are made in future models.