際際滷

際際滷Share a Scribd company logo
Data Science NL Meetup
Utrecht, 23 January 2014

-fun in Utrecht
ichard Gill
!
http://www.math.leidenuniv.nl/~gill

(R on an iDevice)
R on iOS ?

Sure, thanks to ech0chrome



http://leafmoon.users.sourceforge.net/cydia/



http://twitter.com/#!/ech0chrome



Taiju Yamada <ech0chrome@104.net>
R on iOS



First jailbreak iDevice  gain root privileges and
circumvent Apple restrictions (your legal right, AFAIK)



Jailbreak restores hidden functionality and installs Cydia
(App Store for lots more)



Apple doesnt (yet) see difference & device can be
restored to original state  no loss of warranty
Why jailbreak an iThing?


iPhone, iPad speed, memory, storage, monitor
(number of pixels) of typical 10 years old desktop, plus...


Internal mobile internet modem (3G cell phone)



Bluetooth, Wireless, USB connections...



Gorgeous GUI on top of a (BSD) UNIX



Apple treats you like a child



Why climb Everest? Because its there
Jailbreaking


At time of writing: works on all iDevices running iOS 7;
not dif鍖cult or risky AFAIK (but make a backup 鍖rst!)


Run evasi0n 7 on Mac or PC connected by USB



Uses known CPU architecture & vulnerabilities in Apples boot process



Note: the next generation will have new initially unknown architectures



Next upgrade of iOS 7 might well remove currently exploited vulnerability



Downgrading a currently installed iOS is essentially impossible



Last upgrade of earlier iOS essentially makes earlier exploits impossible
Jailbreaking iPad2, iOS 7.0.4


Backup; download evasi0n7; connect and run



Install OpenSSH and change passwords (alpine)
of root and of user (mobile)



Install more cool stuff and useful tools



You cant upgrade iOS



You can re-install iOS, and then restore your personal
stuff from iTunes backup (jailbreak lost)
Cydia

Terminal

Fin

de
r

bile ot
mo tsp
a
Im ss ho
ele
wir
Cydia Installed
R fun utrecht
Open in
pdf viewer
from
Finder
Amst-R-dam.pdf

0.00

0.05

0.10

0.15

TrueHistogram of sample, size 1000
gamma distn, shape=7,
seed=11091951
probability density superimposed

5

10

15

truehist from library MASS, all options default
data
Have fun!


Remember to change the passwords of root and of
mobile from alpine to ...



Be prepared for annoyance as Apple, hackers,
play cat and mouse



Beware of scams and rumours, dont pay anyone
anything!



Dont count on jailbreak still being possible a few
models / iOS versions later
Postscript (1)


Why I dont use it much: cant install extra libraries;
touchscreen iOS keyboard has no tab, ctrl, arrow keys



Apple has made life of a non-standard developer almost
impossible (code signing, )



Should you develop on the iDevice or outside?



If youve got internet, why not do R in the cloud?



RStudio Server  !
(but: a bug presently prevents effective use from iDevice)
Postscript (2)


http://gamma-level.com/iphoneos/ports/texlive
(Aaron油Grif鍖th) provides Cydia-based install of LaTeX


Just needs Perl from http://coredev.nl/



iOS hard disk has small partition for system, large partition for
user. But you can move, symlink /usr/local (system partition)
to /private/var/local (user partition), see http://coredev.nl/



Grif鍖th also explained how he made his own build,
could be useful ... !



However these instructions dont work on latest iOS
R inside

The End
Ad

Recommended

Types of Hardware
Types of Hardware
Charles Vincent Familar
Talk data sciencemeetup
Talk data sciencemeetup
datasciencenl
128-ch3.pptx
128-ch3.pptx
DeepakPanchal65
iOS Basics
iOS Basics
Richa Jain
iOS jailbreaking
iOS jailbreaking
Varun Luthra
Introduction to iOS Penetration Testing
Introduction to iOS Penetration Testing
OWASP
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
Sam Bowne
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
Hands-On iOS Application Penetraion Testing.pptx
Hands-On iOS Application Penetraion Testing.pptx
AkashKatare9
[CONFidence 2016] Sawomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sawomir Kosowski - Introduction to iOS Application Securit...
PROIDEA
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !
Veduruparthy Bharat
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
eightbit
Jailbreaking iOS
Jailbreaking iOS
Mihir Patel
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
EkoParty 2010: iPhone Rootkit? There's an App for that.
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
Tom Eston
Beyond the 'cript practical i os reverse engineering lascon
Beyond the 'cript practical i os reverse engineering lascon
Nino Ho
Jail breaking
Jail breaking
Rokkam Reddy
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
iOS Application Exploitation
iOS Application Exploitation
Positive Hack Days
Wahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash Course
eightbit
iOS Application Security
iOS Application Security
Egor Tolstoy
IoS An enomorous thing
IoS An enomorous thing
SOUNDARRAJAN V
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
eightbit
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
iOS Jail break
iOS Jail break
yarden hanan
Supporting the NextGen 911 Digital Transformation with FME
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software

More Related Content

Similar to R fun utrecht (20)

Hands-On iOS Application Penetraion Testing.pptx
Hands-On iOS Application Penetraion Testing.pptx
AkashKatare9
[CONFidence 2016] Sawomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sawomir Kosowski - Introduction to iOS Application Securit...
PROIDEA
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !
Veduruparthy Bharat
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
eightbit
Jailbreaking iOS
Jailbreaking iOS
Mihir Patel
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
EkoParty 2010: iPhone Rootkit? There's an App for that.
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
Tom Eston
Beyond the 'cript practical i os reverse engineering lascon
Beyond the 'cript practical i os reverse engineering lascon
Nino Ho
Jail breaking
Jail breaking
Rokkam Reddy
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
iOS Application Exploitation
iOS Application Exploitation
Positive Hack Days
Wahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash Course
eightbit
iOS Application Security
iOS Application Security
Egor Tolstoy
IoS An enomorous thing
IoS An enomorous thing
SOUNDARRAJAN V
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
eightbit
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
iOS Jail break
iOS Jail break
yarden hanan
Hands-On iOS Application Penetraion Testing.pptx
Hands-On iOS Application Penetraion Testing.pptx
AkashKatare9
[CONFidence 2016] Sawomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sawomir Kosowski - Introduction to iOS Application Securit...
PROIDEA
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !
Veduruparthy Bharat
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
eightbit
Jailbreaking iOS
Jailbreaking iOS
Mihir Patel
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
EkoParty 2010: iPhone Rootkit? There's an App for that.
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
Tom Eston
Beyond the 'cript practical i os reverse engineering lascon
Beyond the 'cript practical i os reverse engineering lascon
Nino Ho
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
iOS Application Exploitation
iOS Application Exploitation
Positive Hack Days
Wahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash Course
eightbit
iOS Application Security
iOS Application Security
Egor Tolstoy
IoS An enomorous thing
IoS An enomorous thing
SOUNDARRAJAN V
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
eightbit
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix

Recently uploaded (20)

Supporting the NextGen 911 Digital Transformation with FME
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
Kubernetes Security Act Now Before Its Too Late
Kubernetes Security Act Now Before Its Too Late
Michael Furman
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
SOFTTECHHUB
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
Addressing Evolving AI Model Challenges Through Memory and Storage, a Prese...
Addressing Evolving AI Model Challenges Through Memory and Storage, a Prese...
Edge AI and Vision Alliance
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
TrustArc Webinar - 2025 Global Privacy Survey
TrustArc Webinar - 2025 Global Privacy Survey
TrustArc
Murdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementary
JorgeSemperteguiMont
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
Edge AI and Vision Alliance
The State of Web3 Industry- Industry Report
The State of Web3 Industry- Industry Report
Liveplex
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
Supporting the NextGen 911 Digital Transformation with FME
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
Kubernetes Security Act Now Before Its Too Late
Kubernetes Security Act Now Before Its Too Late
Michael Furman
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
SOFTTECHHUB
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
Addressing Evolving AI Model Challenges Through Memory and Storage, a Prese...
Addressing Evolving AI Model Challenges Through Memory and Storage, a Prese...
Edge AI and Vision Alliance
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
TrustArc Webinar - 2025 Global Privacy Survey
TrustArc Webinar - 2025 Global Privacy Survey
TrustArc
Murdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementary
JorgeSemperteguiMont
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
Edge AI and Vision Alliance
The State of Web3 Industry- Industry Report
The State of Web3 Industry- Industry Report
Liveplex
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
Ad

R fun utrecht

  • 1. Data Science NL Meetup Utrecht, 23 January 2014 -fun in Utrecht ichard Gill ! http://www.math.leidenuniv.nl/~gill (R on an iDevice)
  • 2. R on iOS ? Sure, thanks to ech0chrome http://leafmoon.users.sourceforge.net/cydia/ http://twitter.com/#!/ech0chrome Taiju Yamada <ech0chrome@104.net>
  • 3. R on iOS First jailbreak iDevice gain root privileges and circumvent Apple restrictions (your legal right, AFAIK) Jailbreak restores hidden functionality and installs Cydia (App Store for lots more) Apple doesnt (yet) see difference & device can be restored to original state no loss of warranty
  • 4. Why jailbreak an iThing? iPhone, iPad speed, memory, storage, monitor (number of pixels) of typical 10 years old desktop, plus... Internal mobile internet modem (3G cell phone) Bluetooth, Wireless, USB connections... Gorgeous GUI on top of a (BSD) UNIX Apple treats you like a child Why climb Everest? Because its there
  • 5. Jailbreaking At time of writing: works on all iDevices running iOS 7; not dif鍖cult or risky AFAIK (but make a backup 鍖rst!) Run evasi0n 7 on Mac or PC connected by USB Uses known CPU architecture & vulnerabilities in Apples boot process Note: the next generation will have new initially unknown architectures Next upgrade of iOS 7 might well remove currently exploited vulnerability Downgrading a currently installed iOS is essentially impossible Last upgrade of earlier iOS essentially makes earlier exploits impossible
  • 6. Jailbreaking iPad2, iOS 7.0.4 Backup; download evasi0n7; connect and run Install OpenSSH and change passwords (alpine) of root and of user (mobile) Install more cool stuff and useful tools You cant upgrade iOS You can re-install iOS, and then restore your personal stuff from iTunes backup (jailbreak lost)
  • 11. Amst-R-dam.pdf 0.00 0.05 0.10 0.15 TrueHistogram of sample, size 1000 gamma distn, shape=7, seed=11091951 probability density superimposed 5 10 15 truehist from library MASS, all options default data
  • 12. Have fun! Remember to change the passwords of root and of mobile from alpine to ... Be prepared for annoyance as Apple, hackers, play cat and mouse Beware of scams and rumours, dont pay anyone anything! Dont count on jailbreak still being possible a few models / iOS versions later
  • 13. Postscript (1) Why I dont use it much: cant install extra libraries; touchscreen iOS keyboard has no tab, ctrl, arrow keys Apple has made life of a non-standard developer almost impossible (code signing, ) Should you develop on the iDevice or outside? If youve got internet, why not do R in the cloud? RStudio Server ! (but: a bug presently prevents effective use from iDevice)
  • 14. Postscript (2) http://gamma-level.com/iphoneos/ports/texlive (Aaron油Grif鍖th) provides Cydia-based install of LaTeX Just needs Perl from http://coredev.nl/ iOS hard disk has small partition for system, large partition for user. But you can move, symlink /usr/local (system partition) to /private/var/local (user partition), see http://coredev.nl/ Grif鍖th also explained how he made his own build, could be useful ... ! However these instructions dont work on latest iOS