Комментарии:
Hey could you please explain more about debugging and exploiting.
ОтветитьSomebody made a USB-C iPhone a year or two ago, so Apple did not do it first. Easily missed thing that nobody saw, but true nonetheless.
Ответитьamazing work
ОтветитьI live for embedded hardware reverse engineering, especially when done on apple products.
ОтветитьOh wow, that was nice!
ОтветитьI think it's fair to say you was breast fed lol
Ответитьimagine a botroom exploit for iPhone 15 Pro Max 🤩🤩🤩
ОтветитьExcellent
ОтветитьIsnt jtag for xbox 360?
ОтветитьVery well put video, straight to the point and no music. +1 sub.
ОтветитьExcellent ✅✅
ОтветитьGreat stuff
ОтветитьMaybe a new full jailbreak after this?
ОтветитьGreat work! I am always wondering why people buy stuff that is built to lock out its owner but not the vendor. I would never buy such a device for personal use.
They should be required by law to give you the boot loader key on a piece of paper at the time of purchase.
Ok can I host 10th prestige challenge lobbies on my iPhone now?
ОтветитьAmazing!
ОтветитьFINALLY, a new video!!!!
ОтветитьHave you ever heard of J137 / banana cable for T2 Macs / EDWIN course of T2 repair which was clearly done before T2 macbooks were even released?
i have one and maybe it would be interesting information to share.
Beautiful work man! Videos like these are better than porn haha.
ОтветитьVery exciting! I'd be interested to know what is possible with JTAG.
Ответитьwhen I hear JTAG I think of Xbox360 jailbreaking
ОтветитьiPhone 15 lightning cable mod when>?
ОтветитьWhat does this allow you to do ? I only know the word jtag from the 360 days.
ОтветитьBeing European and absoltely hates the European Union, I hope my country get out of it as quick as possible (We voted against joining it in 2005 through national referundum by 54%, but ultimately got betrayed by our president, who removed the law of high treason). Forcing apple to use USB was a good moves
Ответитьvery in-depth video! get new subscriber 🎉
Ответитьso facinated by you guys. its my dream to do something like this someday. but i lack so much in everything...
Ответитьthis is awesome.
Ответитьbro where is the video about lighting part 2
Ответитьreally cool!
Ответитьomg i never think usb c so complex like this 😮 thanks mate for the video
ОтветитьIts crazy to me that iphone still hasnt embraced fast charge
Ответитьif/when you can achieve JTAG, what can you do with it?
ОтветитьYes! What a video! Thanks for this!!
ОтветитьI see you've done this with the iPhone 15, but I'm curious if JTAG can be found a similar way on Samsung Galaxy devices and if one could possibly access the KNOX e-fuse data store on a galaxy device? So essentially if the Knox bit has been tripped; that section in the boot loader can be reversed?
This is currently the only thing stopping me from going to GraphineOS and being able to support encryption and have as much support with the boot loader security as say a supported Pixel device?
This is so awesome. I would really like to be able to use hardware hacking as a business?
So if you can get JTAG to iPhone 15, does that mean that the boot loader can be reverse engineered and the iPhone could essentially run non-apple or customised firmware?
yo sup hope u read my comment, the hardware world is really confusing to me. I always stuggle to know how to start, I'll be glad if u can give me your ardvice on this, thanks.
Ответитьactually insane work but man do you need to practice your aim when plugging in a usb c port XD
ОтветитьJust joined the channel. Can't wait to see what you have been up to!
Ответитьcould this mean jailbreaking is possible?
ОтветитьApple hates me. I’m still using an iPhone X
ОтветитьAlready knew it! but may brick after flash Jtag
ОтветитьExcellent work. I was curious how long it would be, since the Macbooks and iPads are M1/etc rather than A-series chips. Quite interesting all the same!
Ответитьdude that was awesome. cant wait for another videos!
ОтветитьYOOOO NEW VIDEO
ОтветитьLove the Zappa reference!
Ответитьits not uncommon ( for my line of work) to see a jtag locked physically. maybe this is the case right here. some pull up resistor to some pads might be needed.
ОтветитьGood to know that you didnt finish the work , i have to know that checkm8 didnt work on the “newer“ iphones
But i thought for the Usb-c “problem“ on the TamarinCable FW where only changing the cables and changing some code .. ok Its Not so easy
But on iPhone 15 swd is Open i think thats a good Start ..