Beta

Pwn20wnd shares what’s left to complete A12(X) support for unc0ver

Hacker and unc0ver lead developer Pwn20wnd first introduced ‘partial’ A12(X) device support for the unc0ver iOS 12 jailbreak tool just under three weeks ago, but as most of the jailbreak community already knows, full support for A12(X) devices won’t be possible until Saurik first updates Cydia Substrate with compatibility for arm64e devices.

In a short spiel Monday afternoon, Pwn20wnd took to Twitter with a small status update for those still wondering about the status of the A12(X) jailbreak:

Apple seeds sixth betas of iOS 12.2, tvOS 12.2, watchOS 5.2 and macOS 10.14.4 to developers

Apple on Monday seeded the sixth betas of iOS 12.2, tvOS 12.2, watchOS 5.2 and macOS 10.14.4 to developers. Registered devs can install the updates via each platform's respective OTA mechanism, or through the Developer Center. Today's releases come one week after beta 5, and one week before Apple's 'It's show time' media event, suggesting we are nearing the public launch.

Pwn20wnd says machswap2 exploit is coming to unc0ver with support for A7-A12(X) devices

It was only two weeks ago that security research @iBSparkes shared an iOS 11.0-12.1.2 exploit dubbed machswap with the general public, and just a few days later, hacker and unc0ver lead developer Pwn20wnd integrated the new exploit into his unc0ver jailbreak tool for A7-A9(X) devices running iOS 11.0-12.1.2. Fortunately, the fun isn’t stopping there.

As it would seem, @iBSparkes has been working on a newer exploit dubbed machswap2, which works in similar ways and supports A7-A12(X) devices running iOS 11.0-12.1.2. Perhaps more importantly, Pwn20wnd got it working with unc0ver, which means the jailbreak tool will soon support both the machswap or machswap2 exploits:

Pwn20wnd updates unc0ver v3.0.0 to beta 45 to address exploit issue on A12(X) devices

Shortly after releasing an update for the unc0ver v3.0.0 pre-release with ‘partial’ support for A12 and A12X devices, Pwn20wnd dropped yet another revision, bringing the tool up to beta number 45 for public testing.

In a Tweet shared just this afternoon, Pwn20wnd reveals that the somewhat minor update addresses an issue involving the voucher_swap exploit by Brandon Azad on certain beta-centric firmware versions on A12(X) devices: