This is a bit of a complex read for the average user. Anyone with a bit of technical knowledge will be able to make sense of some of it, but a lot of it just won’t make sense to most of it.
The blogpost by Branden Thomas of Accuvant Labs takes an in-depth look at what exploits the team behind the evasi0n untethered jailbreak for iOS 6 and iOS 6.1. Here’s a small portion of the post:
One important point to make is that unlike the previous jailbreakme.com exploits, which could be used against an unwitting victim, jailbreaks that require USB tethering have a lower security impact, and are usually only useful to the phone’s owner. Attackers are less interested because iPhones with a passcode set will refuse to communicate over USB if they are locked, unless they have previously paired with the connecting computer. So your phone is stolen and it’s locked, attackers won’t be able to jailbreak it. Therefore, only malicious code already running on your computer can leverage USB jailbreaks nefariously.
There is much more, but that just serves as an introduction. Take a look, and read the full post here.
We also have a jailbreak how-to, here.