There are two exploits that work on 5.16.2.1 that I am waiting (and waiting, and waiting) for Amazon to formally close so I can disclose the write-up and let folks have at it.
One of the exploits requires specific corruption of the FAT file-system.
This is being mitigated in the 5.16.3 family by converting from mass storage to MTP..
The other exploit is at the Javascript level As far as I can tell, it is still present in 5.16.3 -- it will need to be fixed on all devices in parallel, and it really needs to be fixed.
Now, with that said, I'm not a Jailbreak writer.
All these exploits do is give you the ability to execute arbitrary code as root.
There are additional pieces that needs to be done so the Kindle Jailbreak Framework works. This has to be done with some degree of caution because something the Framework does can cause a boot loop if a certain file doesn't get +x permissions.
Which is a long way of saying, if you want a jailbroken Kindle stay on the firmware it came with, and impatiently wait.
|