Current location - Quotes Website - Signature design - Foreign users successfully installed and implemented iPSW for iPhone 6.
Foreign users successfully installed and implemented iPSW for iPhone 6.
IOS 13 has confirmed the elimination of many iPad models such as iPhone 5s, iPhone 6 and iPhone 6 Plus. Only iPhone 6s and iPhone SE or above are supported, while iPad Ados only supports iPad Air 2 or above. However, yesterday, a Twitter user @NighttigerFTW announced that he had successfully implemented iOS 13 beta 1 for iPhone 6 devices, and announced that he would release iPSW after the official release of iOS 13, which caused a lot of discussion, but is this true? Let's take a look at it.

On June 16, NighttigerFTW shared his latest amazing achievements through Twitter. After six days of continuous efforts, he finally solved the method of making unsupported iPhone 6 devices execute iOS 13 beta 1, mainly because he found a very big loophole in the "Unable to jailbreak iOS" directory. Only in this way can the eliminated devices install the latest iOS system. Finally, iPSW has not been made public, but it will be shared publicly soon, and even four photos are attached to confirm that iPhone 6 is running iOS 13 beta 1 picture.

Then NighttigerFTW immediately added that in order to prevent this vulnerability from being fixed, he would not release the iPSW file until Apple officially launched iOS 13.

What makes everyone curious is, can iOS 13 be executed on the iPhone 5s? NighttigerFTW also wrote that he actually tried to confirm that this was not feasible.

Can iPhone 6 really run iOS 13 beta 1?

The NighttigerFTW incident certainly caused a heated discussion in the jailbreak circle. Some people think he is real, others think he is fake. However, in Mr. Crazy's view, it seems that there is a great possibility of fraud. After all, if you want to execute the latest iOS 13 on a device that can't support the new version, it is possible to solve BootROM and SEP first, and then trick iTunes into logging in through iOS.

Moreover, it is impossible for one person to successfully transplant the new firmware to the old device within six days, and it is very time-consuming to solve the problem of creating a filler for each kernel extension (the new firmware is not made for iPhone 6). In the past, there were cases in which Android successfully transplanted ROM, but only a large number of developers could complete the migration of camera driver in just one week.

Moreover, it is impossible to install iOS 13 Beta 1 on an iPhone 6 just by modifying iPSW. If it is implemented through a BootROM kernel vulnerability, this vulnerability can be very precious and can be provided to Apple in exchange for a million-dollar vulnerability bonus. No one will give up this opportunity offered to the public for free.

Pwn20wnd, the follow-up developer of unc0ver jailbreak, also directly asked a lot of vulnerability questions in private, and NighttigerFTW couldn't answer them and was blocked.

Finally, it was revealed by a friend that NighttigerFTW was fake. In fact, he took an iPhone 7 to run iOS 13 beta 1 screenshot, and threw the photo on the iPhone 6 device to display the picture. After editing the serial number of the device by drawing software, it is disguised as a real iPhone 6, so that the picture looks like it can really run IOS 13beta65438+.

Later, NightigerFTW also found that the joke was too big, and immediately deleted the post, published an unintentional prank message, set the account to a private state, and even claimed to delete the account.

Finally announced that he was gone! And also left a fake photo of iPhone 6 executing iOS 13 as a souvenir. He also expressed the hope that he has the ability to do such a thing, but his current ability can't.

Finally, it proved to be a fake picture of mischief. After all, simply modifying iPSW can make the eliminated devices successfully install unsigned iOS version (iPhone 6 can't sign IOS). Ninja developers think there are only two ways.

This guy may have one of them when using iBoot or lower vulnerabilities, but he never shows off, and there is a very simple way to prove that he has iBoot or lower vulnerabilities, that is, to publish the key of theiphonewiki without publishing the source code, but he didn't do these things. If she really has the iBoot vuln vulnerability, then she should be able to do other useful things instead of using it to install iOS 65438.

The second method is to disassemble the iOS OTA update. No one has really tried this method yet. Pwn20wnd also said that this is impossible after iOS 9.0.