Brandon Azad

PsychoTea’s iOS 11-12.1.2 kernel exploit for A7-A9 devices now released, detailed writeup imminent

Matrix code hacked iPhone.

There’ve been so many kernel exploit releases for the iOS platform as of late that our heads are still spinning, but that’s pleasant news if you’re a jailbreak aficionado, because it gives our respected jailbreak tool developers more resources to work with.

The latest kernel exploit reportedly comes by way of hacker PsychoTea, and it has been named machswap. The exploit appears to be viable on all A7-A9 devices running iOS 11.0-12.1.2, which could make it a worthwhile candidate for modern jailbreak tools such as Electra or unc0ver.

Jake James releases rootlessJB 3.0, a rootless SSH-based iOS 12 jailbreak for developers

Talented hacker and software developer Jake James took the jailbreak community by surprise this weekend after releasing rootlessJB 3.0, a developer-focused rootless jailbreak tool for A9, A10, and A11 devices running iOS 12.0-12.1.2.

James announced the release of rootlessJB 3.0 via Twitter on Saturday, perhaps unsurprisingly stirring up quite of a bit of attention among his following:

Geosn0w releases OsirisJailbreak12, an incomplete ‘developer-only’ “jailbreak” PoC for iOS 12.0-12.1.2

Wednesday saw two separate jailbreak tools (Electra and unc0ver) pick up support for iOS 11.4.x, so one might be inclined to say that it’s been a decent day for the jailbreak community. But wait… there’s more!

Wednesday evening, hacker and software tinkerer @Geosn0w announced the release of an incomplete ‘developer-only jailbreak’ for iOS 12.0-12.1.2 dubbed OsirisJailbreak12. The work was made possible by the tfp0 exploit that was just recently unleashed by security researcher Brandon Azad:

Security researcher Brandon Azad publishes voucher_swap exploit for pre-iOS 12.1.2 devices

Matrix code hacked iPhone.

Not long after tihmstar published his iOS 11.4-11.4.1-centric tfp0 exploit for headphone jack-enabled handsets, security researcher Brandon Azad followed up by releasing an exploit of his own intended for devices running iOS 12.1.2 and earlier.

Azad shared the news via Twitter Tuesday afternoon, including a link to documentation encompassing the exploit: