Unfortunately I don't think it will make any difference for the passcode bypassing aspect. I'm not 100 percent sure, but I believe the support up to the iPhone 4/iPad 1 was based upon a boot ROM hardware exploit which another has not been found as yet on the newer devices. As the JB community has now provided an untethered JB for the majority of users, I just don't see them spending more time working on a harder (possibly non-existent) exploit in the hardware now being used.
I reached out to the devs yesterday to confirm the possibility of passcode bypassing for LE and forensic usage but am sceptical that I will receive a response.
Unfortunately I don't think it will make any difference for the passcode bypassing aspect. I'm not 100 percent sure, but I believe the support up to the iPhone 4/iPad 1 was based upon a boot ROM hardware exploit which another has not been found as yet on the newer devices. As the JB community has now provided an untethered JB for the majority of users, I just don't see them spending more time working on a harder (possibly non-existent) exploit in the hardware now being used.
I reached out to the devs yesterday to confirm the possibility of passcode bypassing for LE and forensic usage but am sceptical that I will receive a response.
Colin is right on this, the earlier A4 based devices (iPhone 4/iPad) were jailbroken using a hardware exploit as far as my knowledge goes. This exploit is not available on the more recent A5 and A5X devices. The mass market for jailbroken devices want the ability to install software outside of the app store, with the current software based exploits catering for this, the hardware exploit is an unnecessary alternative. That and there perhaps isn't one.
This is all my understanding and please don't take it as gospel.
I'd happily use a normal jailbreak on more occasions if there was a way of removing it at the end of everything. I cant see much happening in password recovery/Imaging soon as much as I hope for it to happen.
I'd happily use a normal jailbreak on more occasions if there was a way of removing it at the end of everything. I cant see much happening in password recovery/Imaging soon as much as I hope for it to happen.
I've used a jailbreak on an exhibit before but I had express permission from the OIC that it was ok. This was a long time ago as well.
In recent years when jailbreaking devices I have had more occasions where the process has removed data and required a restore from a backup. Obviously this was on a test device for test purposes and in no way an evidential device. As Alex says, there's no way of removing the jailbreak afterwards.
I'm not sure about other jurisdictions outside of Perth, but I know the Police here are able to apply for "Data Access Orders" to force suspects to provide passwords/encryption keys etc. The penalty for defying an Access Order are quite severe and generally much worse than what is being investigated, hence no incentive to not supply the passwords.
For that reason the ability to bypass/crack passwords for LE in Perth is really no longer a major issue, but that's just Perth.
Out in the corporate world I come across it occasionally and it's also a sexy trick to sell to clients, so for that reason I hope the hardware exploit is found, but as I said it's been a long time since the iPad2 came out and it was never exploited, so I'm not holding my breath for the other newer devices. It seems for the time being that Apple have the upper hand and with the large JB community satisfied with the soft hack to JB there seems to be little interest in finding a hardware exploit.