How to save .shsh2 blobs on A12+ devices

With the introduction of the A12 chip, Apple strengthened the security around generating nonces, saving blobs, and restoring in general. The basic process remains the same, but due to a feature called nonce-entanglement (yes, really), there are a few extra hoops we need to jump through to save valid blobs. This tutorial will show you how to do so.

Security researcher achieves tfp0 exploit on A13 device running iOS 13.4.1

Matrix code hacked iPhone.

Jailbreakers with access to an A7-A11 device pretty much have it made thanks to the hardware exploit-based checkra1n jailbreak that can’t be patched by Apple in a software update. Those handling newer devices, such as the A12 and A13 varieties, instead depend on infrequently released tfp0 exploits. These seem to surface sporadically with no rhyme or reason, and they can unfortunately be patched by Apple’s software updates.

On a more positive note, it does appear that a skilled security researcher going by the Twitter handle @ProteasWang has achieved tfp0 on an A13-equipped handset running iOS 13.4.1. This is currently the latest version of iOS available from Apple, and with that in mind, the news has particularly exciting implications for jailbreaks such as unc0ver and the to-be-released Chimera13 tool.

Unc0ver v4.0.3 update resolves prominent App Store bug, and more

The unc0ver jailbreak only just picked up official support for iOS 13.0-13.3 on A12(X)-A13 devices this past weekend. Given just how young the new support is, it’s not overly surprising to learn that there were some bugs that needed to squashed.

In a Tweet shared just this afternoon, Pwn20wnd announced the release of an updated version of the unc0ver jailbreak dubbed version 4.0.3 with important bug fixes:

Unc0ver v4.0.2 released to address issues with jailbreaking iOS 13.0-13.2.3

The unc0ver jailbreak received official support for iOS 13.0-13.3 on A12(X)-A13 devices over the weekend thanks to Brandon Azad's OOB Timestamp tfp0 exploit, but from what we can gather, the release wasn’t without its initial flaws as a plethora of users reported issues when trying to jailbreak versions of iOS older than that of 13.3.

Fortunately for those affected by the aforementioned issues, Pwn20wnd has released yet another update for unc0ver to address them, this time bringing the jailbreak tool up to version 4.0.2. The hacker announced the update via Twitter just this afternoon:

Unc0ver jailbreak updated to v4.0.1 with bug fixes and improvements

It was only yesterday that Pwn20wnd released unc0ver v4.0.0 to the general public with official support for iOS 13.0-13.3 on A12(X)-A13 equipped devices. In doing so, unc0ver became the first public jailbreak to support A13 devices, and also the first public jailbreak to support iOS 13 on A12(X) devices. But that’s old news now.

On Sunday, Pwn20wnd released a small update for the unc0ver jailbreak, officially bringing it up to version 4.0.1. The hacker announced the latest update via Twitter earlier in the afternoon:

Unc0ver v4.0.0 adds support for A12(X)-A13 devices on iOS 13.0-13.3

Those who’ve keenly waited for the unc0ver jailbreak to officially support A12-A13 devices running iOS 13.0-13.3 devices by way of Brandon Azad’s oob_timestamp tfp0 exploit will be happy to know that the wait is finally over.

In a Tweet shared just this afternoon, project lead developer Pwn20wnd launched unc0ver v4.0.0 with support for the aforementioned device types and firmware versions:

Pwn20wnd says unc0ver could support iOS 13.0-13.3 on A12(X)-A13 devices

There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.

Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support:

Brandon Azad plans to release a new exploit for iPhone 11 on iOS 13.3

Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?

Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3:

Hacker iBSparkes achieves tfp0 on A13 with iOS 13.3

The jailbreak community has been on fire these past few months, with checkra1n delivering an un-patchable jailbreak experience for handsets ranging from the iPhone 5s to the iPhone X, and with unc0ver picking up support for iOS 12.4.1. But hey, why let the pwnage stop there?

Renowned hacker and iOS security researcher iBSparkes broke the silence this weekend after sharing a teaser of what appears to be successful tfp0 on a brand-new A13 device running iOS 13.3. Yes indeed folks, that’s both Apple’s latest hardware and software – pwned in one fell swoop. Not too shabby!

Pwn20wnd issues advice for potential jailbreakers using A12(X) and A13 devices

Things have been getting very real in the jailbreak community in the past several weeks. One of the most significant tidbits of news has been the development of the A5-A11-based checkra1n jailbreak by Luca Todesco and others, which rides on the back of a brand-new bootrom exploit from @axi0mX called checkm8. But the captivation isn’t stopping there.

With all the exciting information (and drama) that we’ve seen recently, one might be inclined to say it’s breath of fresh air to see unc0ver jailbreak lead developer Pwn20wnd touting potential work on something new. The hacker took to Twitter Sunday morning to share pertinent information for A12(X) and A13 device users who might be in the market for a jailbreak: