this post was submitted on 20 Aug 2025
1 points (100.0% liked)

iOS Jailbreak (iPhone, iPad, iPod Touch, Apple TV)

45 readers
0 users here now

We stand in solidarity with numerous people who need access to the API including bot developers, people with accessibility needs (r/blind) and 3rd...

founded 2 years ago
MODERATORS
 
This is an automated archive made by the Lemmit Bot.

The original was posted on /r/jailbreak by /u/Bright-Dependent2648 on 2025-08-19 21:49:17+00:00.


This report documents undocumented system behavior observed in iOS 18.6, where trusted Apple daemons:

  • Bypass TCC (Transparency, Consent, and Control) to access protected data (e.g. Reminders)
  • Write to sensitive preference domains related to photo/comms safety without user interaction
  • Transmit network data (~5MB) silently via system daemons
  • Do so with no app contextno user prompt, and no visibility in UI or privacy settings

Key Findings

  • tccd silently accessed kTCCServiceReminders (Reminders) with preflight=yes and no client app
  • abm-helperCommCenterRootHelpercfprefsd, and others activated Mach/XPC communication
  • sosd attempted writes to com.apple.messages.commsafety.plist
  • nsurlsessiond and symptomsd coordinated silent upload/download (~5MB over 2s)

This behavior violates the assumptions behind Apple's TCC privacy framework and is not disclosed in Apple’s documentation.

Reproduce It Yourself

Requirements

  • iPhone running iOS 18.6
  • macOS with Apple Console.app
  • USB cable (no jailbreak required)

Steps

  1. Connect your iPhone via USB
  2. Run the following command in Terminal:log collect --output ~/Desktop/ios18_logs.logarchive
  3. Open Console.app, load the .logarchive
  4. Filter logs by:
    • tccd
    • cfprefsd
    • sosd
    • abm-helper
    • nsurlsessiond
    • symptomsd
  5. Look for:
    • preflight=yes (TCC)
    • Writes to com.apple.messages.commsafety
    • Silent network traffic (rx/tx) within seconds

Why It Matters

  • No UI prompt, no app context = user has no way to see or deny access
  • TCC is silently bypassed, violating Apple’s stated privacy guarantees
  • EDR/MDM cannot detect this — trusted daemons execute the chain
  • Forensics and red teams must rely on logs — not standard analytics
no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here