If you’ve been following the news lately, then you’ve unquestionably heard about the latest text message bug affecting the iOS platform that can crash or freeze the recipient’s iPhone. Demonstrations of the glitch were published all over YouTube and internet news sources yesterday afternoon, and reveal that characters of the Sindhi language are the primary culprit.

Apple will unquestionably address this issue in a future software update to iOS and iPadOS, but jailbreakers who want to avoid updating to new software releases will be excited to learn that there’s now an unofficial patch by way of a newly released jailbreak tweak dubbed CaptureTheFlag by iOS developer MTAC.

As you might come to expect, simply installing CaptureTheFlag on your jailbroken iPhone or iPad is enough to curb this nasty little bug. Once you’ve installed it, others can send you the infamous crash-prone text message and nothing of that sort should actually happen to your device.

It’s worth noting that the tweak only works when your handset is in a jailbroken state, and this has implications for modern-day semi-tethered and semi-untethered jailbreaks like checkra1n and unc0ver. Should your device reboot for any reason, your handset will become vulnerable again until you’re able to re-jailbreak and initialize the tweak.

This isn’t the first time a character-driven bug has been used to target iPhones. Just a couple of years ago, a similar glitch involving characters of the Telugu language resulted in tantamount iOS spasms.

If you’re jailbroken and chewing at your nails with the thought of experiencing a crashed iPhone by way of a malicious text message, then we’d seriously recommend downloading CaptureTheFlag as soon as possible. It’s available as a free download from the BigBoss repository via your preferred package manager and supports all jailbroken iOS 13 devices. Furthermore, the tweak is open source on the developer’s GitHub page.

Do you plan to protect your jailbroken handset with CaptureTheFlag? Let us know in the comments section below.