It's not wrong at all !! The security holes that we use for custom purpose could be exploited by less happyfull people to control our defys... (such as PDF breach used earlier for jb of iPh4...)
On the other side, it would be easier to allow a regular root access that we can control via authentication mechanisms which would then allow a normal patching schedule of the security fixes...(just like on our desktops)
Let's be patient for a new root method...
What's the kernel version of this release ?
Cheers,
K
On the other side, it would be easier to allow a regular root access that we can control via authentication mechanisms which would then allow a normal patching schedule of the security fixes...(just like on our desktops)
Let's be patient for a new root method...
What's the kernel version of this release ?
Cheers,
K