Limera1n on our parade.

in typical geohot fashion, he released his new jailbreak limera1n out of nowhere without consulting the rest of the scene (or even much testing). At the time of this post, there are already four updates to his tool. Chronicdev and Dev-team are quickly updating their own tools to use the limera1n exploit. This way, they can save SHAtter for a later release. Limera1n and SHAtter are bootrom exploits. This means they cannot be patched out with a software update. However, they themselves are tethered jailbreaks. They rely on the hard work of @comex to patch the kernel and make it untethered. Limera1n does have the advantage of supporting more then just a4 devises (new bootrom 3GS owners cheer). Unlockers beware, updating to an unmodified ipsw will break your unlock possibly for a long time.

iPhone is about to SHAtter!

Ever since @pod2g discovered a new bootrom exploit we’ve all been patiently waiting for an update to our favorite tools.   Well, @MuscleNerd announced today that a beta of PwnageTool has already been developed to utilize the exploit.   @chronicdevteam has tools in the works as well.  Though i anxiously await the release of @greenpois0n, it is PwnageTool that will allow me to update my iPhone4 without endangering my baseband and killing my unlock.

What does this mean to you?  well, i’ll tell you since you asked.  It means that EVERY iOS devise ALL A4 devices (iPhone 4, Tough 4g, iPad, Apple TV 2) will be jailbreakable regardless of iOS version.  This is good news for anyone who “accidentally” updated or who purchased their device after apple fixed the exploit.  Now although this exploit cannot be fixed with an iOS update, it is still very important to back up your shsh blobs to ensure that you can utilize the tools that all these guys have worked so hard on.  Don’t get too excited.  No new baseband exploit has yet been announced, so all you unlockers running 4.0.2 or greater are still doomed.  lets hope they’re sitting on one for 4.2 or it’s going to be a cold and lonely winter.