Ⓜ MuscleNerd

All Photos Twitter.com
Another few minutes until totality here :) mnerd.me/m6f3/image.jpg
New iPhone, new plates! :)
Slow moving, likely "space junk"... RT @mholt6: Full video of meteor-like event @BadAstronomer
Retweeted by Ⓜ MuscleNerd
It was no accident. Apple left even more images unencrypted in 10.0b2 (e.g. all ramdisks and 32-bit bootloaders!) mnerd.me/gdPX/image.png
We talked with @nedos about hardware security, hacking ICs and learning how to do it all! buff.ly/1USQgDy
Retweeted by Ⓜ MuscleNerd
Untangling iOS PIN code security: a look at the Apple vs. FBI saga, from a technical perspective. marcan.st/2016/03/untang…
Retweeted by Ⓜ MuscleNerd
This was almost the last thing I ever messaged to @gnihsub . We'll miss you fail0verflow.com/ben
iOS Hacker's Handbook 2016 Edition (Retweet this if you think a good idea, favorite if you don't)
Retweeted by Ⓜ MuscleNerd
Apple fixed over 40 bugs with today's 8.4.1 (detailed listing support.apple.com/en-us/HT205030 ) including those from 3 most recent JB teams
Congrats @taig_jailbreak for today's 8.1-8.3 jailbreak taig.com/en :) Substrate and MS tweaks not working but saurik is on it
Not sure that I'll ever get used to seeing such a long list of security fixes for a watch support.apple.com/en-us/HT204870
For the hardware tinkerers out there, here are the internals of that ethernet cable mnerd.me/at30/image.jpg mnerd.me/assN/image.jpg
Quirky lightning-to-ethernet cable from redpark.com (but only for apps that know how to use it)
Now questioning all the previous gift-giving advice I’ve taken from Amazon mnerd.me/amf5/image.png
not for the shy: Subway cashier rapidly pointed, yanked coworker over “See! He just paid with his watch!”. with everyone in line staring:)
Wondering if the pairing screen is video with thousands of tiny multi-colored lights swarming in a sphere? (audio..) mnerd.me/amii/video.mov
actually the URL they give isn’t even helpful..that warning isn’t listed in the contact form mnerd.me/ammN/image.png mnerd.me/amjl/image.png
The 39 security bugs fixed in today's iOS 8.3 support.apple.com/kb/HT204661 rivals the 7.x->8.0 release (but JBers still need to avoid it)
The 8.2 bug fixes are up at support.apple.com/en-us/HT204423 . That "reboot-via-SMS" bug would have been messy if an exploit were widely deployed
Jailbreakers stay away from today’s 8.2 update for now, or you will get burned cl.ly/a7Dx/image.jpg
I hope someone codes a ResearchKit app measuring sobriety level at the moment you put down $10,000 for an Apple Watch Edition :)
ResearchKit borders on creepy. Jailbreaks will help ensure its privacy claims. On the other hand JBs will allow fake data to be generated.
First big Apple Event of 2015 starts soon at apple.com (live blogs live.theverge.com/apple-watch-ma… live.cnet.com/Event/Apples_M… + many more)
Live long and prosper. So long, Mr. Nimoy.
Retweeted by Ⓜ MuscleNerd
An early-morning launch from Vandenberg Air Force Base: mnerd.me/ZYEp/image.jpg
Jailbreakers should stay clear of today's 8.1.3 iOS release! Bug fixes listed at support.apple.com/en-us/HT204245
Great plane spotting park next to LAX… no kites allowed! mnerd.me/ZSbp/image.jpg
Guy wearing 94 iPhones would have looked more natural if they were iPhone 6+, seeing as how they bend so easily cnet.co/1wQaEXV
World’s first (known) bootkit for OS X can permanently backdoor Macs ars.to/1xG0JZj by @dangoodin001
Retweeted by Ⓜ MuscleNerd
Only Apple can turn unwrapping a simple cable into a pleasurable experience (or would even try to?) mnerd.me/ZAzZ/image.jpg
Activation is a continuous, heavily used service. It can’t be permanently hacked any more than, for instance, cellular voice service
I see activation bypass scammers are still around in 2015. Most seeking help are new to IOS and so can’t see the obvious, unavoidable issue
ah, it wasn't a big earthquake for LA but I was on the epicenter :) BTW I had "snow" on my lawn yesterday morning twitter.com/earthquakesLA/…
That is one gigantic vacuum cleaner!
The untether is much more transparent than Pangu (unobfuscated, and kernel is left open to inspection via "standard" task_for_pid0 patch)
to the exe file. From then on, when you run the tool it'll log the urls accessed in a log/<timestamp>.log file.
Nothing too unsettling with that TaiG JB...just some light device fingerprinting. To see that, create an empty debuglog.cfg file next…
Ruxcon 2014 - iOS 8: Containers, Sandboxes and Entitlements - slideshare.net/i0n1c/ruxcon-2…
Retweeted by Ⓜ MuscleNerd
To anyone wondering “why right now”: My guess is Pangu and TaiG are essentially racing each other in this space, and there’s big $$ involved
Looks like TaiG just released a jailbreak for 8.1.1 (and 8.0,8.1,8.2beta). Best to wait a few days just in case taig.com
It looks like the latest version of Pangu does not support task_for_pid 0. Is there a replacement?
Retweeted by Ⓜ MuscleNerd
Apple's had this catty comment about jailbreaking on their sales page for quite a while :) mnerd.me/Ybwr apple.com/legal/sales-su…
We need a term for JBs that only work if your device is already JB (not stock). Maybe “JB, Jr” (Jailbreak, Jailbreak-required) #JBJr :)
Twiends™ uses the Twitter™ API, displays it's logo & trademarks, and is not endorsed or certified by them. These items remain the property of Twitter. We do not sell followers, we only provide display advertising. Bots & fake accounts are not permitted on twiends. © 2009
Grow Your Twitter Free
Want To Grow Your Twitter?
We help other people find and follow you on Twitter.
Key Info:
Started in 2009
Over 6 million signups
Country targeting provided
We never auto tweet to your timeline
We never auto follow others
We actively moderate our community
Please Share
Please upgrade your browser  chrome