{"id":7775,"date":"2009-09-13T18:14:16","date_gmt":"2009-09-13T16:14:16","guid":{"rendered":"http:\/\/www.iphone-ticker.de\/2009\/09\/13\/greenpois0n-jailbreak-fur-os-31-in-vorbereitung\/"},"modified":"2009-09-13T18:18:26","modified_gmt":"2009-09-13T16:18:26","slug":"greenpois0n-jailbreak-fur-os-31-in-vorbereitung","status":"publish","type":"post","link":"https:\/\/www.iphone-ticker.de\/greenpois0n-jailbreak-fur-os-31-in-vorbereitung-7775\/","title":{"rendered":"Greenpois0n: Jailbreak f\u00fcr OS 3.1 in Vorbereitung"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.iphone-ticker.de\/wp-content\/uploads\/2009\/09\/greenpois.jpg\" alt=\"greenpois.jpg\" align=\"right\" \/>Die Ank\u00fcndigung kommt vom <a href=\"http:\/\/chronic-dev.org\/blog\/\">Chronic DEV-Team<\/a> (einem losen Zusammenschluss von Hackern mit Verbindungen zum iPhone DEV-Team) und best\u00e4tigt die ersten Hinweise \u00fcber eine Jailbreak-taugliche Schwachstelle im iPhone OS 3.1. Unter dem Codenamen &#8222;<a href=\"http:\/\/greenpois0n.com\/\"><em>Greenpois0n<\/em><\/a>&#8220; in Arbeit, soll der Jailbreak zum Brechen des iPhone-Schutzes keinen DFU-Mode mehr ben\u00f6tigen und weitestgehend <a href=\"http:\/\/www.ipodtouchfans.com\/forums\/showthread.php?t=241908\">automatisch funktionieren<\/a>. Hier, eine erste <a href=\"http:\/\/qik.com\/video\/2861114\">Video-Demonstration auf Qik<\/a> die wir euch auch im Anschluss eingebettet haben.<\/p>\n<blockquote><p><em>&#8222;To clear things up, greenpois0n, or pois0n for short, is our solution for jailbreaking 3.1 and 3.1.1 firmwares on all devices, including ipt3. It uses a new exploit that doesn&#8217;t even require you putting the device in DFU mode, all you do is plug it in and everything is done automatically, much like purplera1n on 3.0. &#8222;<\/em><\/p><\/blockquote>\n<p>Auch das DEV-Team hat bereits die entsprechenden Software-Tools f\u00fcr einen 3.1-Jailbreak angek\u00fcndigt und <a href=\"http:\/\/blog.iphone-dev.org\/post\/182722675\/rock-out-without-lockout\">verspricht im Hausblog<\/a> die Ver\u00f6ffentlichung des PwnageTools f\u00fcr die iPhone Software 3.1:<\/p>\n<blockquote><p><em>&#8222;We\u2019re currently working on PwnageTool for 3.1, and will be sure to let you know when it\u2019s available<\/em> &#8222;<\/p><\/blockquote>\n<p><!--more--><br \/>\n<center><object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=9,0,115,0\" id=\"qikPlayer\" align=\"middle\" height=\"319\" width=\"425\"><param name=\"allowScriptAccess\" value=\"sameDomain\"><\/param><param name=\"allowFullScreen\" value=\"true\"><\/param><param name=\"movie\" value=\"http:\/\/qik.com\/swfs\/qikPlayer4.swf\"><\/param><param name=\"quality\" value=\"high\"><\/param><param name=\"bgcolor\" value=\"#333333\"><\/param><param name=\"FlashVars\" value=\"rssURL=http:\/\/qik.com\/video\/f855bb98e665424ea03a1f9e9bf46a7d.rss&amp;autoPlay=false\"><\/param><div class=\"responsive-video\"><embed src=\"http:\/\/qik.com\/swfs\/qikPlayer4.swf\" quality=\"high\" bgcolor=\"#333333\" name=\"qikPlayer\" allowscriptaccess=\"sameDomain\" allowfullscreen=\"true\" type=\"application\/x-shockwave-flash\" pluginspage=\"http:\/\/www.macromedia.com\/go\/getflashplayer\" flashvars=\"rssURL=http:\/\/qik.com\/video\/f855bb98e665424ea03a1f9e9bf46a7d.rss&amp;autoPlay=false\" align=\"middle\" height=\"319\" width=\"425\"><\/embed><\/div><\/object><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<a href=\"https:\/\/www.iphone-ticker.de\/greenpois0n-jailbreak-fur-os-31-in-vorbereitung-7775\/\"><img decoding=\"async\" width=\"150\" src=\"http:\/\/www.iphone-ticker.de\/wp-content\/uploads\/2009\/09\/greenpois.jpg\" class=\"alignright wp-post-image tfe\" alt=\"greenpois.jpg\" title=\"\" \/><\/a><p>Die Ank\u00fcndigung kommt vom Chronic DEV-Team (einem losen Zusammenschluss von Hackern mit Verbindungen zum iPhone DEV-Team) und best\u00e4tigt die ersten Hinweise \u00fcber eine Jailbreak-taugliche Schwachstelle im iPhone OS 3.1. Unter dem Codenamen &#8222;Greenpois0n&#8220; in Arbeit, soll der Jailbreak zum Brechen des iPhone-Schutzes keinen DFU-Mode mehr ben\u00f6tigen und weitestgehend automatisch funktionieren. Hier, eine erste Video-Demonstration auf [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[43,5659,8],"class_list":["post-7775","post","type-post","status-publish","format-standard","hentry","category-news","tag-hacks","tag-jailbreak","tag-video"],"aioseo_notices":[],"rest_api_enabler":[],"_links":{"self":[{"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/posts\/7775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/comments?post=7775"}],"version-history":[{"count":0,"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/posts\/7775\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/media?parent=7775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/categories?post=7775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iphone-ticker.de\/apiv2\/wp\/v2\/tags?post=7775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}