After the issue was widely reported at the start of this week, Apple immediately disabled the group FaceTime feature and promised to release a fix later this week.
Bug
Electra updated to version 1.2.6 to resolve various problems on A7 & A8 devices
The Electra Team pushed two subsequent updates to the Electra jailbreak tool Thursday evening with bug fixes and improvements, bringing the version number of iOS 11-centric tool to 1.2.6. The updates came just hours after Electra picked up support for tihmstar’s new v1ntex exploit.
The Electra Team announced the new updates via Twitter, adding that they would resolve problems users were experiencing on A7 and A8 devices concerning post-exploitation failures on iOS 11.2-11.4.1 and app crashing issues on iOS 11.4.x:
Apple is already hit with the first lawsuit over the FaceTime eavesdropping bug
Following an eavesdropping issue that let FaceTime callers see and hear the person they were calling before they answered, Apple is now facing its first lawsuit over the embarrassing bug.
Pwn20wnd advises jailbreakers to avoid impending software update despite FaceTime bug
Just yesterday, Apple was compelled to temporarily disable its FaceTime service after a critical bug was discovered that enabled a malicious individual to ‘spy’ on someone else via the recipient’s microphone and camera. Apple later mentioned that they would implement a fix via a software update later this week.
The circumstances present obvious implications for the jailbreak community, as installing a software update would reduce your jailbreakability to practically zilch. That said, if you’re waiting for an iOS 12 jailbreak to drop and don’t have the means to install Apple’s upcoming firmware update, then you’re undoubtedly questioning what the best course of action is.
Apple disables group FaceTime after critical privacy bug surfaces
Apple has disabled its newly-launched Group FaceTime feature, as it works to patch a serious privacy bug that surfaced late Monday afternoon. The bug, first reported by 9to5Mac, allows FaceTime users to access the microphone and front-facing camera of the person they are calling—even if that person doesn't answer.
Pwn20wnd drops new revision of unc0ver v2.2.0 pre-release, says he’s “actively implementing user requests”
Hacker and unc0ver lead developer Pwn20wnd has been on quite the roll lately; just yesterday he released unc0ver v2.1.4 to the general public, and he also pushed a bevy of revisions this weekend to the unc0ver v2.2.0 pre-release with bug fixes, performance improvements, and experimental new features. But as it would seem, there’s still more work to be done.
Pwn20wnd shared a Tweet Sunday morning denoting how he’s “actively implementing user requests” to make unc0ver “even better.” The Tweet points to the hacker’s official GitHub repository, where unc0ver users can reach out about problems and feature requests via the Issues tab on the web page:
Ninth unc0ver v2.2.0 pre-release revision now available for public testing
acker and unc0ver lead developer Pwn20wnd pushed his ninth revision to the unc0ver v2.2.0 pre-release jailbreak tool for public testing on Friday. As you might come to expect, this revision incorporates minor bug fixes and improvements to help the beta process along.
We can gather from Pwn20wnd’s official GitHub changelog that this new revision brings the following changes:
Last chance to downgrade to iOS 12.1.1 as S0rryMyBad publishes details about iOS 12-centric kernel exploit
Apple officially dropped iOS 12.1.3 on Tuesday, and it wasn’t long after that security researcher @S0rryMyBad Tweeted a proof of concept (PoC) of the bug used to achieve an iOS 12 jailbreak at the TianfuCup PWN Contest last November.
On Wednesday, @S0rryMyBad followed up with the PoC he Tweeted by publishing a detailed blog post elaborating the ins and outs of his bug, including how it works and how to use it on iOS 12.1.2 and below:
Unc0ver v2.2.0 pre-release receives two more revisions with minor bug fixes and improvements
Hacker and unc0ver lead developer Pwn20wnd dropped the first unc0ver v2.2.0 pre-release for public testing on Sunday with an extensive list of changes, but it now seems that was only the beginning.
On Monday, Pwn20wnd pushed at least two new revisions to the unc0ver v2.2.0 pre-release, dubbed b3 and b4. The changelog appearing on Pwn20wnd’s official GitHub page cites the following changes in these revisions:
S0rryMybad could release an iOS 12 exploit after Apple patches it in a software update
Apple first released iOS 12 in mid-September, and it’s seen a host of revisions over the last four months. Despite the continuous fortification of Apple’s mobile operating system, there’s been no shortage of bug and exploit reports encompassing iOS 12.
One of the latest announcements comes by way of security researcher @S0rryMybad, who appears to have happened upon a powerful exploit impacting iOS 12.1.2 and below on pre-A12 devices. But perhaps more importantly, the exploit can allegedly provide tfp0 on Apple’s latest mobile operating system:
iPad owners currently cannot restore from iCloud backups created on iOS 12.1.2
Are you finding it impossible to restore your iPad from an iCloud backup?
Pwn20wnd updates the unc0ver v2.1.0 public release to ‘fix weird issues’
New Year’s Eve was a busy day for hacker and unc0ver lead-developer Pwn20wnd. Shortly after dropping the official public release of unc0ver v2.1.0, Pwn20wnd issued a quick revision for the jailbreak tool comprised of bug fixes.
Pwn20wnd announced the revision Monday evening via Twitter, noting that the contained fixes targeted “weird issues” being experienced by some users: