The password issue is ONLY IF YOUR JAILBROKEN ALREADY AND INSTALL OPENSSH!!!!
I guess you miss the fact that this JB DOES install OpenSSH... or even skipped past my post where I mentioned that this JB does install OpenSSH...
The password issue is ONLY IF YOUR JAILBROKEN ALREADY AND INSTALL OPENSSH!!!!
The password issue is ONLY IF YOUR JAILBROKEN ALREADY AND INSTALL OPENSSH!!!!
I guess you miss the fact that this JB DOES install OpenSSH... or even skipped past my post where I mentioned that this JB does install OpenSSH...
The password issue is ONLY IF YOUR JAILBROKEN ALREADY AND INSTALL OPENSSH!!!!
I guess you miss the fact that this JB DOES install OpenSSH... or even skipped past my post where I mentioned that this JB does install OpenSSH...
It already has access to your system before can install OpenSSH. OpenSSH isn't something you can just install on any device without already gaining full access to it.
I'm going to just stop commenting on this thread, you guys obviously don't know or want to know. Its doing what ever you THINK it does and thats it.
It already has access to your system before can install OpenSSH. OpenSSH isn't something you can just install on any device without already gaining full access to it.
I hate to say it... but it's only getting access through the known root credentials... The jailbreak uses stock FW from CrApple with the stock Root password.... He found a way to inject his code, and run it in a hole left open from CrApple... And is only able to execute it because stock FW has a Root PW of "alpine"...
I'm almost 100% sure that if you JB using jailbreakme.com.... change your root password... and, for whatever reason, try to re-jailbreak without restoring.... It would fail.....
I'm nearly 100% sure that he is depending on the Root PW to be "alpine" to run his code.... Again... like I mentioned, it would be best to ask @Comex about this....
For all we know... this PDF Warner app is just gathering device info, and could be a "virus" in itself....
I hate to say it... but it's only getting access through the known root credentials... The jailbreak uses stock FW from CrApple with the stock Root password.... He found a way to inject his code, and run it in a hole left open from CrApple... And is only able to execute it because stock FW has a Root PW of "alpine"...
I'm almost 100% sure that if you JB using jailbreakme.com.... change your root password... and, for whatever reason, try to re-jailbreak without restoring.... It would fail.....
I'm nearly 100% sure that he is depending on the Root PW to be "alpine" to run his code.... Again... like I mentioned, it would be best to ask @Comex about this....
For all we know... this PDF Warner app is just gathering device info, and could be a "virus" in itself....
I just tested your crazy theory. Changed default password, went over to jailbreakme.com and guess what. It was still able to load the jailbreak and go through the jailbreak process agian.
I hate to say it... but it's only getting access through the known root credentials... The jailbreak uses stock FW from CrApple with the stock Root password.... He found a way to inject his code, and run it in a hole left open from CrApple... And is only able to execute it because stock FW has a Root PW of "alpine"...
I'm almost 100% sure that if you JB using jailbreakme.com.... change your root password... and, for whatever reason, try to re-jailbreak without restoring.... It would fail.....
I'm nearly 100% sure that he is depending on the Root PW to be "alpine" to run his code.... Again... like I mentioned, it would be best to ask @Comex about this....
For all we know... this PDF Warner app is just gathering device info, and could be a "virus" in itself....
I just tested your crazy theory. Changed default password, went over to jailbreakme.com and guess what. It was still able to load the jailbreak and go through the jailbreak process agian.
How did you change your Mobile/SSH/Root passwords?
Second time today I answer my own question, LOL.Is there an workaround or update planned for that?