Sunday, November 17, 2024
Google search engine
HomeMobileJailbreakMisaka v8.1.2 introduces fix for AT&T customers who couldn’t access the app...

Misaka v8.1.2 introduces fix for AT&T customers who couldn’t access the app due to filtering

The Misaka package manager app for MacDirtyCow and kernel file descriptor (kfd) exploit-vulnerable handsets has received another update on Tuesday, this time bringing the project up to version 8.1.2.

Misaka v8.1.2 released.Misaka v8.1.2 released.

Misaka lead developer @straight_tamago first announced the latest Misaka update via a post shared to X (formerly Twitter), and from what we can gather, this is a relatively minor, yet important update that implements filtering avoidance for the AT&T network.

What do we mean by this exactly? Well according to @straight_tamago, AT&T customers were receiving a nasty message while attempting to use Misaka. As it turns out, AT&T is no friend to iPhone hacks and customizations:

AT&T blocking Misaka as malware (false positive).AT&T blocking Misaka as malware (false positive).
AT&T’s network falsely flags Misaka as malware. The latest update should fix this.

The latest update should prevent Misaka users from seeing the above pop-up so that they can continue using the app as usual.

To be clear, Misaka isn’t the malware AT&T’s pop-up colors it as. But since it’s a hack-based utility, it’s understandable why AT&T’s system might flag it as such. We’ve previously seen similar anti-malware pop-ups affect perfectly safe jailbreak tools as well, so it’s nothing to be alarmed about.

While this update is primarily for AT&T subscribers, all users can install and use it. The latest .ipa is now available via the Misaka project’s GitHub page and can be sideloaded over your existing installation with AltStore or Sideloadly, or perma-signed with TrollStore.

If you’re not already using Misaka, then you can install it using one of the step-by-step tutorials below:

With Misaka, you are able to install hacks and add-ons that exploit the MacDirtyCow bug for iOS & iPadOS 15.0-16.1.2 and the kfd bug for iOS & iPadOS 16.0-16.6.1. Misaka is also a popular installation method for TrollStore 2, and supports JavaScript hacks on iOS & iPadOS 17 as well as tvOS-based hacks via MacDirtyCow.

Are you taking advantage of the latest version of Misaka yet? Be sure to let us know in the comments section down below.

Dominic Rubhabha-Wardslaus
Dominic Rubhabha-Wardslaushttp://wardslaus.com
infosec,malicious & dos attacks generator, boot rom exploit philanthropist , wild hacker , game developer,
RELATED ARTICLES

Most Popular

Recent Comments