Mid-production design changes aren't common for most companies, but especially not Apple. But it looks like the company made some important changes late last year for a select number of chips.
With the introduction of the A12 chip, Apple strengthened the security around generating nonces, saving blobs, and restoring in general. The basic process remains the same, but due to a feature called nonce-entanglement (yes, really), there are a few extra hoops we need to jump through to save valid blobs. This tutorial will show you how to do so.
The entry-level iPad is the best Apple tablet in terms of price vs. features comparison, but Apple will sweeten the deal further with a refresh to the $329 device coming in Spring 2021.
Jailbreakers with access to an A7-A11 device pretty much have it made thanks to the hardware exploit-based checkra1n jailbreak that can’t be patched by Apple in a software update. Those handling newer devices, such as the A12 and A13 varieties, instead depend on infrequently released tfp0 exploits. These seem to surface sporadically with no rhyme or reason, and they can unfortunately be patched by Apple’s software updates.
On a more positive note, it does appear that a skilled security researcher going by the Twitter handle @ProteasWang has achieved tfp0 on an A13-equipped handset running iOS 13.4.1. This is currently the latest version of iOS available from Apple, and with that in mind, the news has particularly exciting implications for jailbreaks such as unc0ver and the to-be-released Chimera13 tool.
The unc0ver jailbreak only just picked up official support for iOS 13.0-13.3 on A12(X)-A13 devices this past weekend. Given just how young the new support is, it’s not overly surprising to learn that there were some bugs that needed to squashed.
In a Tweet shared just this afternoon, Pwn20wnd announced the release of an updated version of the unc0ver jailbreak dubbed version 4.0.3 with important bug fixes:
The unc0ver jailbreak received official support for iOS 13.0-13.3 on A12(X)-A13 devices over the weekend thanks to Brandon Azad's OOB Timestamp tfp0 exploit, but from what we can gather, the release wasn’t without its initial flaws as a plethora of users reported issues when trying to jailbreak versions of iOS older than that of 13.3.
Fortunately for those affected by the aforementioned issues, Pwn20wnd has released yet another update for unc0ver to address them, this time bringing the jailbreak tool up to version 4.0.2. The hacker announced the update via Twitter just this afternoon:
It was only yesterday that Pwn20wnd released unc0ver v4.0.0 to the general public with official support for iOS 13.0-13.3 on A12(X)-A13 equipped devices. In doing so, unc0ver became the first public jailbreak to support A13 devices, and also the first public jailbreak to support iOS 13 on A12(X) devices. But that’s old news now.
On Sunday, Pwn20wnd released a small update for the unc0ver jailbreak, officially bringing it up to version 4.0.1. The hacker announced the latest update via Twitter earlier in the afternoon:
Those who’ve keenly waited for the unc0ver jailbreak to officially support A12-A13 devices running iOS 13.0-13.3 devices by way of Brandon Azad’s oob_timestamp tfp0 exploit will be happy to know that the wait is finally over.
In a Tweet shared just this afternoon, project lead developer Pwn20wnd launched unc0ver v4.0.0 with support for the aforementioned device types and firmware versions:
There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.
Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support:
Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?
Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3:
The jailbreak community has been on fire these past few months, with checkra1n delivering an un-patchable jailbreak experience for handsets ranging from the iPhone 5s to the iPhone X, and with unc0ver picking up support for iOS 12.4.1. But hey, why let the pwnage stop there?
Renowned hacker and iOS security researcher iBSparkes broke the silence this weekend after sharing a teaser of what appears to be successful tfp0 on a brand-new A13 device running iOS 13.3. Yes indeed folks, that’s both Apple’s latest hardware and software – pwned in one fell swoop. Not too shabby!
Things have been getting very real in the jailbreak community in the past several weeks. One of the most significant tidbits of news has been the development of the A5-A11-based checkra1n jailbreak by Luca Todesco and others, which rides on the back of a brand-new bootrom exploit from @axi0mX called checkm8. But the captivation isn’t stopping there.
With all the exciting information (and drama) that we’ve seen recently, one might be inclined to say it’s breath of fresh air to see unc0ver jailbreak lead developer Pwn20wnd touting potential work on something new. The hacker took to Twitter Sunday morning to share pertinent information for A12(X) and A13 device users who might be in the market for a jailbreak: