Evasi0n jailbreak was released few days ago. the hack works on iOS 6.1 used by the iPhone including iPhone 5, iPad, iPod Touch. It turns out Evasi0n is the most popular Jailbreak ever, nearly seven millions iOS devices were reported to use this method to mainly free from Apple restrictions for download apps exclusively from Apple App store and the ability to make appearance changes on the OS. The latest jailbreak method has been the most elaborate to date; It took a group called “Evad3rs” 136 days to crack iOS 6.1, compared to just 98 days for the iPhone 4S, 38 days for the iPhone 4, and just 14 days for the iPhone 3GS. Evasi0n is untethered hack, meaning it has the property that if the user turns the device off and back on, the device will start up completely, and the kernel will be patched without the help of a computer – in other words, it will be persistently jailbroken after each reboot.
It has been a leapfrogging game between Apple and hacker community. You can expect the next version of iOS, Apple will patch the hole to protect its ecosystem and it OS integrity.
Since software programs available through Cydia are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps. Users install these programs for purposes including personalization and customization of the interface, adding desired features and fixing annoyances, and making development work on the device easier by providing access to the file system and command-line tools.
Apple issued warnings to users who want to jailbreak their phone:
As designed by Apple, iOS and iPhone, iPad, and iPod touch are designed to work together reliably. Unauthorized modifications to iOS (“jailbreaking”) can cause numerous issues to the hacked iPhone, iPad or iPod touch. Examples of issues caused by these unauthorized modifications to iOS have included the following:
Instability: Frequent and unexpected crashes of the device, crashes and freezes of built-in apps and third-party apps, and loss of data.
Security vulnerabilities: Security compromises have been introduced by these modifications that could allow hackers to steal personal information, damage the device, attack the wireless network, or introduce malware or viruses.
Shortened battery life: The hacked software has caused an accelerated battery drain that shortens the operation of an iPhone, iPad, or iPod touch on a single battery charge.
Unreliable voice and data: Dropped calls, slow or unreliable data connections, and delayed or inaccurate location data.
Disruption of services: Services such as Visual Voicemail, Weather, and Stocks have been disrupted or no longer work on the device.
Additionally, third-party apps that use the Apple Push Notification Service have had difficulty receiving notifications or received notifications that were intended for a different hacked device. Other push-based services such as iCloud and Exchange have experienced problems synchronizing data with their respective servers.
Inability to apply future software updates: Some unauthorized modifications have caused damage to iOS that is not repairable. This can result in the hacked iPhone, iPad, or iPod touch becoming permanently inoperable when a future Apple-supplied iOS update is installed.
Apple strongly cautions against installing any software that hacks iOS. It is also important to note that unauthorized modification of iOS is a violation of iOS end-user license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software.