Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.
iPhone Newsforums, a part of the
Apple Thursday afternoon seeded iOS 6.1.3 beta 2 to iOS developers for testing. iOS 6.1.3 beta 2 is the second beta of the iOS 6.1.1 beta that was seeded to...
02-21-2013, 12:30 PM #1
iOS 6.1.3 Beta 2 Released to Developers
Apple Thursday afternoon seeded iOS 6.1.3 beta 2 to iOS developers for testing. iOS 6.1.3 beta 2 is the second beta of the iOS 6.1.1 beta that was seeded to developers a couple of weeks ago, although it has been renamed because the latest version of iOS is currently iOS 6.1.2 and iOS 6.1.1 was the chosen name for a hot-fix on the iPhone 4S.
iOS 6.1.3 includes all of the improvements to the Maps application that were included in the iOS 6.1.1 beta, including the additional support for Japan, optimized directions, and improved road pronunciation as pointed out by 9to5Mac.
In today’s beta version, iOS 6.1.3 appears to have fixed the iOS 6.1 lock screen security issue that could allow someone to bypass your passcode and access information such as your contacts, photos, phone history, and more. Apple made an official comment about the security issue, saying "Apple takes user security very seriously. We are aware of this issue, and will deliver a fix in a future software update."
It is not yet known if the update patches the evais0n jailbreak. It is recommended that users avoid the update when it is released to the public until hackers have made an official announcement on what to do. Being that the update is only in the second beta, it probably has a while to go still before it hits the public's hands.
Last edited by Anthony Bouchard; 02-21-2013 at 12:40 PM.
02-21-2013, 12:48 PM #2
I say it'll be out by next Friday. But damn really 3 software updates in a month?"You may say I'm a dreamer, but I'm not"
02-21-2013, 01:08 PM #3
What's up with all these updates??
02-21-2013, 01:11 PM #4
- Join Date
- Aug 2012
- Thanked 2 Times in 1 Post
Apple be facking up lol
02-21-2013, 01:22 PM #5
These are legitimate updates for problem issue. My how quickly we forget. Doesn't everyone remember 4.2.1, 4.2.2 ----> 4.2.8!! Then 4.3--> 4.3.3.. This is pretty typical for Apple. Only getting up to 5.1.1 last time was the oddball.Here to help if I can. If I can't I know someone who can!
02-21-2013, 01:55 PM #6
The Following User Says Thank You to Jato_BZ For This Useful Post:
02-21-2013, 02:00 PM #7
It will be interesting to see what Apple does in the final release of 6.1.3. They have a chance to be nice guys here and patch only the security holes.
The evasi0n jailbreak isn't a security threat, since you need the passcode lock (and any password for an encrypted backup) disabled.
Patching the jailbreak would only spoil the fun for a large number of Apple fans, who also happen to enjoy jailbreaking. I wonder if Apple can afford to do that right now?
02-21-2013, 02:08 PM #8
02-21-2013, 02:16 PM #9
The Following User Says Thank You to Simon For This Useful Post:
02-21-2013, 03:02 PM #10
Can I download this somewhere without dev. Account?
I want the blob
02-21-2013, 03:39 PM #11
Apple playing a game of cat and mouse with the jailbreak! Will they/won't they fix it! Or maybe they have tried and failed lol
The Following User Says Thank You to GrumpySod For This Useful Post:
02-21-2013, 04:12 PM #12
I don't believe there is any cat and mouse game going on here, if apple could patch the exploit with an update, they would have by now, the fact that they haven't suggests they cant pinpoint the hole. I agree with Anthony's comment above, an exploit is a security flaw and they must be seen to eliminate any kind of hole in the softwares code.
02-21-2013, 06:02 PM #13
I also have to disagree about evasi0n being a security hole. If a third party asked you to plug your iphone in to your computer, take off the password and run their software on your PC, whilst tapping certain icons that magically appeared on your phone, would you do it? If you're really that gullible, please PM me your SSN and bank account number.
02-21-2013, 06:14 PM #14
Granted evasi0n asks you if you want to jailbreak and doesn't do anything until you click jailbreak, but a malicious hacker trying to steal your information might not be as kind as to ask if you want to run the third party code or not. They might just do it behind the scenes when you plug your device in.
Evasi0n itself isn't the security hole. It's the security holes that led to evasi0n being possible that Apple needs to fix to secure their system, and that's exactly why they patch the jailbreak constantly. They don't see a jailbreak as fun, like we all do, because the jailbreak hackers are exploiting the security holes.
A good example of the situation I'm trying to explain is the JailbreakMe 3.0 Web site for iOS 4.3. Remember when comex released a jailbreak tweak that patched the PDF exploit after the jailbreak used it? He did this because if he didn't, other non-JailbreakMe Web sites could have exploited the same security hole and installed malware on your device.
Last edited by Anthony Bouchard; 02-21-2013 at 06:20 PM.
02-21-2013, 06:32 PM #15
02-21-2013, 06:36 PM #16
It is worth noting that evasi0n and its related exploits require:
1) Physical access to the device--no remote initiation or execution here.
2) A compromised computer the user is connected to via USB--evasi0n doesn't install itself on the iPhone.
3) Passcodes disabled--the USB code execution can't start if the device is still locked down and refusing USB connections.
4) Getting the user to open a particular application on the device after the USB code execution has completed.
Needless to say, it'd have to be a pretty complicated phish or trojan program to get a user to unwittingly dance through all those steps. Apple does not have the same sense of urgency that a remote-execution program (with no user intervention needed, vis-à-vis JBME "Star" or "Saffron") would necessitate.
However, a security hole is a security hole, and evasi0n at its core totally defeats the entire userspace and kernel's security systems and allows for total root privileged access and unsigned code execution across the device.
02-21-2013, 06:39 PM #17
There are a lot of strange situations that could happen, but for the most part you're spot-on with the fact that the exploits evasi0n itself uses could only be used maliciously in strange or non-likely situations. The possibility of these strange situations, while potentially unlikely, is the awareness I'm trying to bring.
Also another thing that could be considered is that the evasi0n team say they have even more exploits that they've saved for future firmware updates. Who's to say that a malicious hacker wouldn't use those exploits or similar ones instead of all of the ones evasi0n uses? These are the predictions Apple has to take into consideration when they secure iOS.
Anyway, good conversation.
02-21-2013, 06:46 PM #18
I understand why Apple will one day patch this, but I hope (as Orby says) they don't consider this one too urgent.
02-21-2013, 09:11 PM #19
Why are people upset about lots of updates?
Apple is quickly finding and fixing problems. Would you rather there be a problem and have them take forever to fix it?
02-21-2013, 09:22 PM #20