Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Not yet jailbroken (Score 2, Informative) 299

by oz_paulb (#33729354) Attached to: AppleTV Runs iOS, Already Jailbroken
The SHAtter exploit was used on an iPod touch to decrypt the AppleTV firmware. The AppleTV device has not yet been exploited - although it is likely susceptible to the same exploit. Once hackers get their hands on the device, they can try to use the exploit, then try to run jailbroken firmware on it. At this point, without knowing details of the SHAtter exploit, it's unclear to me whether/not that particular piece of code comes into play during a normal firmware update (since we don't know how the mini-USB port can be used yet - presumably "normal" code updates are done via wifi/Ethernet).

MOUNT TAPE U1439 ON B3, NO RING

Working...