electra
electra copied to clipboard
Support for blacklisting tweaks from sandbox bypass
Lots of apps are crashing since their jailbreak checks run properly when unsandboxed. If there was a plist in /bootstrap that had the bundle id’s of apps that were blacklisted, it would allow users to change which apps are blacklisted.
List of apps that this would be helpful for: http://reddit.com/r/jailbreak/comments/7tkavf/discussionupcoming_give_me_the_names_of_apps_with/
I'd rather blacklist them from injecting anything at all tbh, but it would be a nice option I think.
Won't be hard to implement in code, but making a good UI for it would be harder. Where should it be configurable?..
Would it be enough to just add the process name in here?
Maybe an icon in the corner, sort of like the info one and when you click on it there's a dropdown scroll list of all the processes and or apps and you can just select which processes to blacklist before jailbreaking.
We don’t even need that. Just a plist in /bootstrap will work just fine
On Jan 29, 2018 at 2:27 PM, <Lil Sarx (mailto:[email protected])> wrote:
Maybe an icon in the corner, sort of like the info one and when you click on it there's a dropdown scroll list of all the processes and or apps and you can just select which processes to blacklist before jailbreaking.
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub (https://github.com/coolstar/electra/issues/89#issuecomment-361357936), or mute the thread (https://github.com/notifications/unsubscribe-auth/ASin5G9pukXDQhy55d0Ly7rjyPRLLPfYks5tPhuXgaJpZM4Rwik4).
We could also do something like this in pspawn_payload:
- check if the binary is in a plist
- if not show a notification and let the user decide, 3.a if he wants to deny injection of tweaks into the application 3.b if he wants to inject into the application 3.c if he wants to inject into the application on every launch
If he selects a) or c) we could save this to the plist. This way users can try out if they want injection (with option b)) and can deny it afterwards.
Another approach would be to detect, if the user presses both volume buttons on app launch and then show the notification. This way it won't be too annoying and the user can change his decision later on. For example if an app updates and has a new jailbreak detection mechanism, the user could simply hold down both volume buttons and start the app. The notification will show up and he can disable injection.
@michyprima Just tried your suggestion and it worked for the Citi Mobile app!
@ccsasuke Where do you find the process names for individual apps? I want to try this with Animal Crossing Pocket Camp.
I copy-pasted a snippet of tutorial online:
Find the app online (Google for the iTunes link). For this example we use Apple Pages: https://itunes.apple.com/app/pages/id361309726?mt=8. Copy the number after the id in the URL. (Here: 361309726). Open https://itunes.apple.com/lookup?id=361309726 where you replace the ID with the one you looked up. Search the output for "bundleID". In this example it looks like this (next to a bunch of other data): "bundleId":"com.apple.Pages". So for Apple, the bundle ID is com.apple.Pages.
Thanks for the quick help. By sheer luck I actually found the bundle ID by searching for plist files with nintendo in their name but your way is much faster. Unfortunately it did not work and the version of electra that I complied from coolstar's github disabled all of my tweaks too. I don't think he has released the source files for electra 1.4 yet.