Hacker and unc0ver lead developer Pwn20wnd revised the unc0ver v3.0.0 pre-release on Wednesday to beta version 42 with some significant improvements, including full support for the new machswap exploit on A9(X) devices.
Pwn20wnd shared the news about the new version on Twitter just this afternoon, directing users to his personal GitHub repository with download links:
Citing the official changelog for unc0ver v3.0.0 beta 42, the new version encompasses the following changes:
03/06/2019 – v3.0.0~b42 was released for public testing with the following changes:
– Make the machswap exploit slightly faster
– Enable the machswap exploit on A9(X)
– Update the APT lists cache file for repositories
Previously, the unc0ver jailbreak only deployed the machswap exploit on 4K devices, but the A9(X) platform specifically is of the 16K variety.
As it would seem Pwn20wnd has further improved the machswap to make it faster, which is astonishing considering that the exploit was already oodles faster and more reliable than its predecessor.
It should be noted that A12(X) devices such as the iPhone XR, XS, and XS Max and the iPad Pro (2018) are not yet supported in this version of the unc0ver jailbreak tool, but that’s expected to change soon as the hacker’s PAC-forging efforts continue.
Furthermore, unc0ver v3.0.0 pre-release is still a beta, and while it might be tempting to hop onboard right now, we’d strongly advise waiting for the official public release to prevent any possible bugs from manifesting.
Those already jailbroken on iOS 12 with the unc0ver v3.0.0 pre-release are being advised to download and run this update as soon as possible to take full advantage of the new features and improvements.
The latest public release of the unc0ver jailbreak tool is v2.2.6 with support for iOS 11.0-11.4 beta 4 – the unc0ver v3.0.0 pre-release is the only iteration that supports iOS 11.4-11.4.1. Both versions of the unc0ver jailbreak tool can be had from Pwn20wnd’s official GitHub repository.
Have you installed the latest version of unc0ver on your iOS 12 handset yet? Let us know how the new exploit works for you in the comments section below.