Board Thread:LOC General Discussion/@comment-108.35.154.66-20130911165857/@comment-8122845-20130920013711

Exploiting a vulnerability -is- hacking. Though I don't know the exact method used, from what I hear the tools are being distributed through Cydia. So the cloners don't need to know how to do it, they just have to download the tool.