We came to know from Modmyi Forum that Apple may have patched limera1n exploit which is being currently used in Redsn0w on the new iDevices which they will be giving in near future. Limera1n exploit exists in the hardware, only a hardware revision from Apple could have patched it. And if Jack’s findings are true, Apple might have patched it in the new stock of iPhone 4, 3GS, iPad, iPod touch 4G and Apple TV 2G.
Now who is guy Jack? Here is a complete story on him.
I made a trip to the Apple Store today to get an iPad for my old lady (Christmas present). She told me she’d love it jailbroken, so I sat down in front of my computer to redsn0w this 4.2.1 iPad.
One problem–redsn0w 0.9.6b6 could not upload a pwned iBSS (hanged at the white screen on OS X, upload timed out and rebooted into jailed state with Windows).
Furthermore, the device constantly stalls when attempting to dump its bootrom. This leads me to believe the injection vector used via USB has been patched in DFU mode.
Case in point: Any iOS device with a serial number xx050 (this week) or higher might be unable to be jailbroken via the limera1n exploit. Slightly older devices may be invulnerable as well.
Jack is person who went to buy an ipad for his Old Lady and he wanted to do a Jailbreak of it and iPad was on IOS4.2.1 and he couldn’t do it. So he share some photos of the new and old iPad serial number and found a difference between them.
The above one is Jailborken with limera1n.
The above one is which cannot be jailbroken with l1mera1n exploit.
So if your new iOS device comes with serial number xx050, there is a high chance that Limera1n is already patched on this device and you may not be able to jailbreak it with current jailbreak tools.
Well their is no confirmation by Dev Team on this thing, whether it is true or not. We are waiting for Dev Teams confirmation.
Stay tuned with us we will be updating you as soon as we hear any thing new about it and lets hope the Jailbreak coming this Xmas don’t gets delayed for IOS4.2.1. Follow us on Twitter and keep visiting our Facebook page to stay up to date with us.