The iOS hacker responsible for untethering our Apple A4 devices under iOS 5.0.1 has uploaded a post to his blog, in which the recently released exploit-powered package (called “Corona”) is discussed in-depth.
Back towards the end of December, the Chronic Dev Team launched a late Christmas gift in the form of Corona: a jailbreak package that had the ability to convert a tethered jailbreak into an untethered one. The iPhone Dev-Team also updated its redsn0w jailbreak software, utilizing the same exploit.
Now, the jailbreak mastermind @pod2g (who is responsible for uncovering the important exploits), has uploaded a post to his blog, in which the technical details on the development of Corona are analyzed.
For those of you who have a technical knowledge of Apple’s iOS and of jailbreaking, this will prove to be an interesting read. It’s also possible, if you wish, to make donations to @pod2g via his blog.
Head over there now, and feel free to post your thoughts on his analysis and on the iOS 5.0.1 jailbreak in the comments.