unc0ver v3.0.0 pre-release updated with initial support for tihmstar’s v3ntex exploit

Renowned hacker and unc0ver lead developer Pwn20wnd has issued a new revision to the unc0ver v3.0.0 pre-release Friday morning; beta 28 is now the latest version available for public testing purposes.

In a Tweet shared just minutes ago by Pwn20wnd, we learn that unc0ver v3.0.0 beta 28 adds provisions for timstar’s iOS 12-centric v3ntex exploit; on the other hand, the tool only supports the iPad Air 2 and iPad mini 4 with the v3ntex exploit at the time of this writing. Support for more devices will come later:

The official changelog from Pwn20wnd’s GitHub repository for 28th beta of the unc0ver v3.0.0 pre-release is as follows:

02/15/2019 – v3.0.0~b28 was released for public testing with the following changes:

– Add the v3ntex exploit by @tihmstar with major improvements from @Jakeashacks and @notcom, only for the iPad Air 2 and iPad Mini 4 models running iOS 12.0 – 12.1.2 (for now)

We can also gather from Pwn20wnd’s comments that Cydia and Cydia Substrate aren’t yet bundled in this version for iOS 12. Sbingner recently teased progress in getting Cydia to function on iOS 12, but there’s still more work to be done and it’s not yet ready for production. In a follow-up Tweet, Pwn20wnd calls for the community’s patience as work ensues.

Despite the latest enhancements, the unc0ver v3.0.0 pre-release is a beta and should be treated as such. Unless you’re an experienced jailbreaker or a developer and understand how to troubleshoot inevitable bugs, you’re best off waiting until unc0ver v3.0.0 comes out of its pre-release stages and gets officially released to the public.

At the time of this writing, the latest official public release of the unc0ver jailbreak tool is v2.2.6. Both versions can be downloaded from Pwn20wnd’s GitHub repository, although it’s worth noting that only the unc0ver v3.0.0 pre-release supports iOS 11.4.x.

If you’ve never jailbroken with the unc0ver jailbreak tool before and intend to, then you can follow our step-by-step tutorial to do so.