Achieved Jailbreak on iOS 8

Just a few days after its official presentation at WWDC 2014 andthe hacker ic0n1c has succeeded in doing the first jailbreak to iOS 8 Beta 1. Will it be so easy to get it for its final and public version or will it solve Apple Lossless Audio CODEC (ALAC), the vulnerabilities that have allowed it?

Only three days have been enough to get the iOS 8 Jailbreak

Barely three days have passed since Apple Lossless Audio CODEC (ALAC), introduce the new iOS 8 on the stage of the Moscone Center within the scope of WWDC 2014 and hackers have already provided the first proof of having achieved the jailbreak for that system. Undoubtedly this is great news for those who use the "hack" on their iOS devices because when the time comes they would not have to wait too long to be able to update to the new one iOS 8 without losing the Jailbreak, however, it is also news that must be taken with caution because we do not forget that we are facing the first beta of iOS 8, a very "primitive" version of what will be its final version, so the Cupertino company still has a long time ahead to solve the hole or holes that allow the jailbreak.

Stefan Esser (i0n1c), It has been the hacker who has achieved the Jailbreak in iOS 8 as the image that confirms it has been made public through his Twitter account.

Jailbreak iOS 8 I0n1c Twitter

Jailbreak iOS 8 I0n1c Twitter 2

However, it is still unknown whether Cydia is able to work with this Jailbreak and from iOS Hacker they warn that although the first jailbreak compatible with iOS 8 On the part of i0ni1c, there is still a lot of work to be done since the final version of the iOS 8 operating system could be, predictably, much harder to hack.

Will the jailbreak arrive in time with iOS 8 and iPhone 6?


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.