Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How does reverse engineering binaries like this work? Did geohot really go through the entire disassemble during the time of a plane ride?


As evidenced by hash Geohot posted on his twitter on December 8th of http://geohot.com/mt.jpg he has had access to some of the vulnerabilities for some time. I know for sure the use of the signed WWDC application has been known by some of the jailbreak developers for over a year.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: