View Single Post
Old 03-10-2014, 03:02 AM   #23
dsmid
Linux devotee
dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.dsmid ought to be getting tired of karma fortunes by now.
 
dsmid's Avatar
 
Posts: 598
Karma: 2069047
Join Date: Feb 2011
Device: Kindle 3, Kindle 4B, Kindle PW2
@ameho: I think NiLuJe meant that if the device was already jailbroken, the oldupdate hack could have a usual name like Update_oldupdate_install.bin, no zh.sh would be needed and it would look nicer.
We tend to believe in UNIX philosophy: do one thing and do it well.
The hacks don't need to re-jailbreak the device, once the door is open. That's the job of jailbreak.
Imagine updating all the hacks with their own jailbreak when the old attack vector is closed and a new one is found.
Yes, this approach requires some level of cooperation and sharing of achievements, but that's no problem here on MobileRead.

See the attachments - that's how it would look like if it was invented here on MobileRead.
Anyway, it's a nice trick, thanks for sharing.
Attached Files
File Type: zip oldupdate.zip (1.4 KB, 1208 views)
File Type: gz oldupdate_src.tar.gz (206.4 KB, 719 views)
dsmid is offline   Reply With Quote