Apple released a new version of the iPhone 4S 5.0.1 firmware yesterday. Surprisingly, the ramdisks are not encrypted in that release. That’s why it is now possible to write a simple script to extract all the necessary Siri files from the 5.0.1 ipsw. And because the ipsw is publicly available, obtaining the Siri files is completely legal.

“Huh…today’s 4S 5.0.1 bump (9A406) has wide open main fs musclenerd.com/4s406.txt“

“@AndrewKeezer it’s the first public 4S ipsw where the main filesystem keys are obtainable (due to non-encrypted ramdisks)”

“(to clarify: wide open for inspection from a Mac/PC…not wide open security wise 🙂 Can get Siri files and such without piracy)”

While this is great news regarding Siri ports, we have to keep in mind that we still need to find a way to generate or obtain the iPhone 4S authentication keys. Luckily, it looks like @chpwn and @stroughtonsmith, the hackers who first ported Siri to the iPhone 4, already have a tool ready that will be released after the iPhone 4S jailbreak.

“I just realized… anyone who installed those “Siri Ports” might have replaced the dyld_cache which probably conflict with future untethers.” “@iH8sn0w Yeah. I’d wait for my (upcoming) tool here.”

“To people asking: Can’t do a non-server Siri port before there’s a 4S jailbreak. Filesystem access isn’t helpful in this respect”

Let’s hope @pod2g’s untether also works for the iPhone 4S so we can finally enjoy Siri on our older iOS devices.

Share this article

Follow us on Twitter of Like our Facebook page to get the latest news from our site: @SiriHacks folgen

Share