Connect with us

Tech

Now you can free an iPhone with an Android phone

Avatar

Published

on

Wir haben alle unsere in der Technologiewelt – PC gegen Mac, Android gegen iOS, Emacs gegen Vim. Gelegentlich können wir unsere eigenen Freunde über den Gang, der sich von ihnen unterscheidet, und dass wir am Ende des Tages nicht allicht sind. Die gleichen Rechtede Botschaft der Einheit kommt von den beiden gleichen Smartphone-Fraktionen, die und die Freuden der Eskalation von Privilegien: Es ist jetzt möglich, dass ein verwurzeltes Android-Telefon iOS jailbreakt.

Wie von XDA-Entwicklern zum ersten Mal gehört, hat der Reddit-Benutzer Stblr die Jailbreak-Puzzleteile gekauft, als der iOS-Jailbreaking-Exploit “Checkra1n” Linux-geprüfte, wurde verwendet, dass er auch aufrt Android auserden Sie winfden Telefon gerootets have, können Sie Ihr Android-Telefon und Ihr iPhone sehen, einige Terminalbefehle lesen und aus der Apple Sandbox ausbrechen.

Checkra1n ist der erste Jailbreak, der mit iOS 13 kompatibel ist, und funktioniert auf dem iPhone 5 bis iPhone X mit iOS 12.3 und wird. It ist nur ein einziges gehengehender Jailbreak und wird erledigt, wird das Telefon neu erledigt wird. Dies macht ein ultra-portable Gerät, das Ihr iPhone wieder in den Jailbreak-Modus versetzen kann, ist sicher, und verkauft für den Moment sind Android-Telefone immer noch etwas kleiner als Laptops.

Prüfen Sie iOS über den DFU-Modus (Geräte-Firmware-Upgrade). Dies ist ein Konfigurationsmodus, mit dem ein neues System über USB und das Gerät überprüft werden soll. Einige Fehler in der DFU-USB-Möglichkeit können eine Jailbreak-Exploit-Kette betreffen. Normale Android-Telefone können Problem mit einem Linux-Terminal lösen und über USB-Host-Funktionen führen. Für die gesamte Kontrolle über den USB-Stack von Android gehört Sie selbst Root-Zugriff. Checkra1n macht einige schmutzige Tricks wie das Unterbrechen von USB-Übertragungen auf halbem Weg, und gehört gibt ist keine API auf Benutzererebene.

Da es sich um einen USB-Exploit gehört, müssen Sie ein Kabel vom Android-Telefon zum iPhone verlegen. Dies bedeutet, dass Sie von USB-C von Android zum Lightning-Kabel des iPhones gehören können (wollen diese USB-C-iPhones?). Apple?) Der DFU-Modus wird erst erledigtaltet, wenn ein Kabelzug ist. Stblr enthält fest, dass nicht jedes USB-C-zu-Blitz-Kabel die richtigen Pins hat, um ein iPhone im DFU-Modus zu versetzen (). Stblr entertain müssen ein Blitz-zu-USB-A-Kabel und einen USB-A-zu-C-Adapter verlieren.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Pixel 4a photo leaks indicate a simple budget phone

Avatar

Published

on

These first rumors about Pixel 4a could only have some weight. Photo leaks on Twitter and Reddit seem to show Google’s next economic phone in nature, and seem to confirm the previous claims. The worn out prototype 4a in the images apparently has no facial recognition and the dual cameras of the normal Pixel 4 in favor of a more conventional fingerprint reader and a single rear camera. There is a pinhole camera for selfies in the front, and Google keeps the headphone jack for those who can’t justify Bluetooth headphones.

Snapshots do not show much more about what is in the phone, although an available memory log suggests that you should still be satisfied with 64 GB of non-expandable memory. A 5.7 or 5.8-inch screen is expected to be equipped with a medium-sized Snapdragon processor (probably 600 or 700 series) to keep costs low and extend battery life.

It is not certain when Pixel 4a could arrive, especially given the outbreak of the corona virus, which affects the production of many companies. Now that I / O is canceled, Google is certainly not linked to a specific start window. However, it is hard to imagine that Google will wait a long time. The Pixel 3a served not only as an entry point for the Google smartphone line, but also as a way to keep the series fresh and in the spotlight while the main pixel was still in the middle of the cycle.

Continue Reading

Tech

Jonathan Kraft makes an unpleasant compliment to Bill Belichick: “Machine Learning”

Avatar

Published

on

BOSTON, Mass. – Soccer is not exactly known for being a leader in the world of sports analytics, but Patriot President Jonathan Kraft says that Bill Belichick’s own melancholic looks and short answers are behind the version of “machine learning” of the coach.

“I think if you want to use a soccer coach like Bill Belichick, who has been a soccer coach for 40 years, you may not call him data, but he has a steel trap in his head,” Kraft told Sloan Sports conference Friday analytics. “Every instance of everything you’ve seen: it won’t call it data and it won’t call it machine learning, but its brain is a machine and it’s machine learning. So you can call it old-school training – Bill probably wouldn’t call it machine learning, but that is exactly. “

Last season, Belichick, 67, told reporters that the analysis was not his “thing”, and that he puts “less than zero” emphasis on decision making.

“You can use these advanced websites wherever you want,” Belichick said in 2016. “I don’t know. I have no idea that I’ve never seen one. I don’t even want to look at one. I don’t care what they say … All metric pages and all that, I mean, I have no idea. You should ask a coach smarter than me. “

The annual Sloan conference, organized by the Massachusetts Institute of Technology, discusses advances and problems in the sports analysis industry. Kraft spoke with Commissioner Don Garber in a panel discussion about the success story of Major League Soccer.

Regardless of whether Belichick actively uses advanced analysis or not, Kraft emphasized that it would be silly to completely ignore the progress of the industry.

“I think the data should be part of the decision-making aids in everything you do,” Kraft said. “If you’re not ready to understand what’s out there, put your team at a competitive disadvantage.”

Jonathan Kraft is co-owner of the New England Revolution of MLS with his father Robert Kraft, who also attended the annual sports technology summit here. The younger force talked about the differences in the way the two sports use and use the data.


“On the football side of the house, the data is not used as often [as in football] to capture the content game by game.” I know that people talk about it all the time, they still don’t, ”said Jonathan Kraft. “You could look at certain trends and other things and probabilities related to certain decision-making tools, but I would say that in football it is one of several ingredients that come into a game plan, while in football I am now for coaches who they believe in him. ” , I think it could even be the main one, one of the two or three main controllers. “

Kraft says that, unlike the patriots, the revolution was always up to date with the analyzes.

“On the football side of the house, we hired our first data analyst more than a decade ago. I think maybe we were the first team in the league to have one, ”he said. “We monitor the movement of each player on the field, how passes are made, how teams perform in different thirds, and so on.”

Continue Reading

Tech

The new Intel chip failure threatens encryption, but Macs are safe

Avatar

Published

on

The vulnerabilities inherent in Intel chips have been a common problem in recent years, with fatal errors such as Meltdown, Specter and ZombieLoad that affect virtually all Intel-equipped devices.

In 2019, Positive Technologies security researchers discovered another problem with Intel chips. In particular, it is a vulnerability that affects the Intel converged security management engine, an important security feature in Intel technology and firmware that runs on Intel hardware.

In addition to loading and varying the BIOS and power management firmware, CSME also offers the “cryptographic base” for functions such as DRM (Digital Rights Management), TPM (Firmware-based Trusted Platform Module) technologies or the ID itself Intel enhanced privacy.

Intel released a patch in 2019 to fix the problem. However, Positive Technologies researchers have discovered that it is much worse than originally thought. New research published Thursday shows that the vulnerability could be exploited to recover a cryptographic root key, which could allow an attacker to access all the data on a device.

This could be a big problem for DRM protected media. If used aggressively, the error can be used to decrypt incoming or outgoing data traffic from the affected device. On a larger scale, it could be used on Intel-based servers.

Although Intel’s previous vulnerabilities affected Apple devices, this error does not affect newer Macs equipped with an Apple T1 or T2 chip. Because these chips are based on proprietary technology and are released before Intel chips, a user’s encryption keys are secure.

Of course, older Macs without a T-Series chip, or the current iMac family without the iMac Pro, may be vulnerable to exploitation, which may compromise FileVault encryption. The error is undetectable and Intel advises users to maintain the “physical possession” of their devices, since there is no way to use the attack vector remotely, for example, by clicking on an incorrect ad.

However, Intel notes that the tenth generation chips are safe from this. The vulnerability and others that they like are also one of the many possible reasons why Apple may soon switch its Macs to ARM-based processors.

Continue Reading

Trending

Copyright © 2017 Rebloco.com