Hacker Majd Alfhaily sneaks into your jailbroken iPhone by "brute force"

We know that when we apply the jailbreak the iPhone, you have to know well what you are doing, otherwise, we could find ourselves in a situation of greater insecurity. That does not imply that we are going to stop betting on the tool, but some well-known hackers in the jailbreak world such as Majd Alfhaily make it clear that sometimes, you have to know well what you are doing. And the previous video is another evidence of it.

What you have seen on these lines is a tool created by hacker Majd Alfhaily what it does is bypass the iPhone unlock code. It would not be the first time something like this is created, although in this case, that jump can be carried out in a maximum of 14 hours, which is how long it takes to try all the possible combinations. It is capable of doing it through a USB with connector and thanks to the fact that the attempt of incorrect codes does not block the terminal.

That means one of the most famous hackers in the world jailbreak tool development has shown that iPhones with this system are more insecure, since the machinery would not allow to do the same in a phone that has not been previously unlocked. Even so, it must be remembered that for it to be possible to carry out all this process of sneaking into the system, you must have the physical terminal in question. In other words, it is impossible for it to be carried out remotely.

The truth, all these experiments are always useful when it comes to demonstrating possible errors and finding a solution for them. But that the jailbreak involves risks, does not assume that it has no benefits. I comment on it because sometimes both things are confused and that makes many fearful users not take advantage of all its advantages.


You are interested in:
How to record videos with the iPhone screen off and without jailbreak
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   aaanñññ said

    The iPhone with jaibreak..is infinitely safer than android without root..ala already said….

    1.    paco said

      some android hater for these forums ??
      you only lack that
      if not they eat you alive
      hahahahaajjajam
      very good

  2.   pende28 said

    Amen !!!

  3.   paco said

    I think the article is badly written. It does not skip the code but performs the jailbreak without activating the code. Or deactivate it if you prefer. But once done, you still need the security code if you want to work with that iphone.,
    I think that would be better explained right?
    Cristina Torres with no intention of offending, what do you say ???