iPhone hacker 'Comex' let go from work with Apple
Comex said he forgot to reply to an email from the company, but revealed few other details
IDG News Service - The famed iPhone hacker "Comex," who engineered ways to hack Apple's mobile operating system, is no longer doing work for the company, according to Twitter postings.
"So...no point in delaying. As of last week, after about a year, I'm no longer associated with Apple," wrote Comex, who has more than 196,000 followers.
He wrote the reason is that he failed to respond to an email from the company. It's rare but not unprecedented for someone who has a hacked a company's software to end up working there. Comex couldn't be immediately reached for comment.
Later on Thursday he tweeted: "Now I feel like a big damn drama queen."
Comex is widely respected in the iPhone hacker realm for his work with the JailbreakMe applications, which exploited Apple's software to allow the installation of programs not vetted by the company in its App Store, a modification known as "jailbreaking." Apple doesn't like the practice, although it is legal in the U.S. under an exception to the Digital Millennium Copyright Act.
In July 2011, Comex and his team released JailbreakMe 3.0, which used a pair of vulnerabilities to install unauthorized software on iOS versions 4.3.3 and prior. It worked with the first and second versions of the iPad and the iPhone.
Comex also delivered in July 2010 with JailbreakMe 2.0, which also used two vulnerabilities to exploit iOS. Apple patched the problems shortly after JailbreakMe 2.0 was released.
Elite iOS hackers are still at work to develop a jailbreak for iOS 6, Apple's latest version which was released last month. A "tethered" jailbreak exists, but an iOS 6 device must be connected to a computer when the attack occurs.
The more graceful way is to engineer an untethered jailbreak. iPhone hackers said at the Hack in the Box security conference last week that Apple has improved the security of iOS making it more difficult, but not impossible, to eventually perform an untethered jailbreak.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
All Cyberwarfare White Papers |