In his recent blog post, the hacker has said that he is not doing testing of the A4 jailbreak any more, and he has given this work to the Chronic Dev-team so he can dedicated his all time and energy to find a bootrom-level exploit in Apple's latest A5 processor.
Pod2g in his post wrote: I read the comments on the blog, and I know that a lot of people are waiting for the A5 jailbreak.
Also, I know there are tons of people out there with A4 or even earlier devices who wants to untether, now and don't care about it could be interesting to wait A5 is finished to release or even 5.1, so that we don't waste an exploit that took me months to find and develop, he said.
About giving the responsibility of testing the recently found A4 untethered jailbreak, he said: I need to focus on A5 and hope I can find a path quick, and I have the feeling that Chronic-dev could help me.
So here is what I did:
I gave all the details to the chronic dev team so that can finish, test, integrate and release the A4 JB ASAP.
I'll put all my energy from now on on the A5.
The French hacker is reluctant to release the jailbreak so that Apple does not prevent the new jailbreak in iOS 5.1.
As A4 device users already have tethered and semi-tethered jailbreaks, they can wait for the untethered one in order to save hard work of the hacking community.
Pod2g has been working hard on A5 devices and has already solved the A5 cache problem. But the hacker is yet to succeed in finding a bootrom-level exploit in A5 processor built on Cortex-A9 dual core processor.
Bootrom-level exploit is the only sort of exploit that is found in hardware like processor, CPU or ROM, and is unfixable by any software update because it is on the hardware and is read-only.
Apple's last processor, A4, was built upon ARM's Cortex A8 CPU which was a single core CPU, but the latest, A5 processor, is built upon ARM's Cortex A9 dual core CPU which is the biggest hurdle in finding the bootrom-level exploit in both the A5 devices.