If you’re on the yalu+mach_portal jailbreak for iOS 10.1.1, there’s good news for you today! An updated exploit has resulted in extra_recipe+yaluX, a new version of the jailbreak without the stability issues of the previous tool.
In this guide, we’ll show you how to use Extender: Reloaded (formerly Extender Installer) to modify Saurik’s Cydia Extender, allowing you to automatically re-sign your jailbreak app on-device. No more 7-day signing, no more computer required!
There’s now a way to avoid re-signing your jailbreak app every 7 days with a computer. Extender: Reloaded (formerly Extender Installer) modifies Saurik’s Cydia Extender, and allows auto-resigning of the jailbreak app on-device.
Have Pangu got something up their sleeve? Images showing an apparent iOS 10.3.1 jailbreak have surfaced on the web. While details are extremely thin on the ground at present, they appear to be genuine and are an encouraging sight for jailbreakers.
Today saw the release of a new bootrom exploit for the iPhone 3GS, an unpatchable vulnerability which gives jailbreakers total control of this device forever.
Although the iPhone 3GS is now very much a legacy device and few users will be actively using them, the rarity of a bootrom exploit makes it worthy of note. There have been no publicly released exploits of this kind since limera1n, which supported only up to the iPhone 4.
I reported a few weeks back on an interesting new bug for 32-bit devices, which allowed you to restore them to any unsigned iOS 9.x firmware, provided you had blobs for the destination firmware.
At the time, it was thought that the bug would mainly be of use for people downgrading from iOS 9.3.5 to a lower firmware, to jailbreak with Home Depot or Pangu9. However, it turns out the bug is in fact more powerful and wide-ranging than previously thought, and may have much wider utility.