Stefan Esser’s Untethered iOS 4.3.2 Jailbreak Exploit Will Not Work On iPad 2

Advertisement

by casey on April 17, 2011

There is a big confusion and a lot of people are asking it again and again. We thought to clear it out. First of all you need to know that Stefan Esser’s untethered iOS 4.3.1 jailbreak exploit is not patched in the latest firmware by Apple. The vulnerability is still there and it has the ability to jailbreak iOS 4.3.2 as well. It will JB iPhone 4, iPhone 3GS, iPad 1, iPod Touch 3G and iPod Touch 4G. Its NOT FOR iPad 2. Although,A tethered jailbreak solution using PwnageTool bundles is already availableposted here.

Of course you are not going to use the same tools (Redsn0w 0.9.6, PwnageTool 4.3. Sn0wbreeze 2.5) for untethered iOS 4.3.2 jailbreak that you have used with iOS 4.3.1 untethered jailbreak. The reason is that the hacker has to generate new untether binaries.

Esser who is a security expert will make the same exploit work for 4.3.2 firmware. Its not a new jailbreak exploit nor it will jailbreak iPad 2. This is what he has tweeted:

The iOS 4.3.1/4.3.2 untether exploits require root access to install. Therefore they cannot be used with iPad2 without further exploits.

ipad 2 untethered jailbreak stefan esser

Also there are many websites which are telling you about its estimated time of arrival. Remember no ETAs are told by the hacker himself. But hopefully it will be there for us very soon.

For people who are interested to know about iPad 2 jailbreak, we have already covered a news related to Chronic Dev Team.

Just to be on the safe side, you have to have iOS 4.3.1 SHSH blobs saved using TinyUmbrella before you upgrade and jailbreak 4.3.2 with the upcoming tools.

UPDATE 1:Redsn0w 0.9.6 RC13 Released For Untethered iOS 4.3.2 Jailbreak

We cover all jailbreak and unlock news. Proof is our homepage VeryRite.com. Make sure you follow us.

You may also like to see:

Follow us on TWITTER or Like Facebook Page to stay connected to get daily Internet News.

VeryRite
We Write Very Rite

Previous post:

Next post: