checkra1n

Stay up-to-date with the latest news and releases of checkra1n, an unpatchable semi-tethered jailbreak based on the checkm8 powerful bootrom exploit supporting A7-A11 devices on iOS and iPadOS 12.0 and higher.

How to get the new iOS 14.2 emojis on your jailbroken device

The last few iOS point releases had been all quiet on the emoji front, but iOS and iPadOS 14.2 brought over 100 novelties to users, including such ragers as "Pinched Fingers" (that emphatic gesture which often accompanies a hackneyed impression of an Italian), "Bubble Tea", "Ninja", and "Tamale" (at last!). Whilst stock users will have to update to iOS 14.2 to make use of these little beauties, jailbroken users don't have to, thanks to developer Poomsmart.

Choosing between losing your jailbreak by updating to iOS 14.2, or being unable to spam your friends with the Dodo emoji, is thankfully not necessary. We'll show you how to get the best of both worlds.

Checkra1n v0.12.2 fixes A10/A10X device crash on iOS 14.3, enables USB on Apple TV 4K

While many of us are gathering with small circles of close friends and family to usher in the incoming 2021 year this New Year’s Eve, the checkra1n team appears to have different plans.

Earlier this evening, the checkra1n team took to Twitter to announce that the checkra1n jailbreak tool has been updated to version 0.12.2 with a small number of changes, although notable ones nevertheless.

Team unc0ver announces plan to launch Substitute v2.0 with speed & performance gains

The unc0ver Team has been extraordinarily silent  despite FreeTheSandbox and ZecOps releasing a new tfp0 exploit with support for iOS & iPadOS versions 13.5.1-13.7recently , but that silence was broken this Sunday evening following a rather intriguing announcement.

The announcement, shared in a Tweet by the unc0ver Team and retweeted by unc0ver lead developer Pwn20wnd reveals exactly what the team has been working on all this time — a reworked version of Substitute:

Checkra1n jailbreak update adds Safe Mode improvements, partial HomePod support, & more

Hot off the heels of everything going on with the Odyssey jailbreak and the newly released exploit for iOS 13.5.1-13.7, the checkra1n team seemingly appeared from out of nowhere Friday evening with an unexpected update for its bootrom exploit-powered jailbreak tool, checkra1n.

The checkra1n team announced the release of the new update, dubbed version 0.12.1, via Twitter just minutes ago:

Apple’s original HomePod has been jailbroken with checkra1n

A photo showing a finger resting on the HomePod top with the Siri orb animation

When most people think of a jailbreak tool like checkra1n, among the first things that come to mind are iPhones, iPod touches, iPads, and Apple TVs. Interestingly enough, the checkra1n team has shown time and time again that the checkm8 bootrom exploit that powers this particular jailbreak is commanding enough to hack even some of the most arbitrary of things, including Apple’s T2 chip, which resides in a variety of Macs.

On Thursday, we learned that even Apple’s HomePod Smart Speaker devices are susceptible to the checkra1n jailbreak. The news, first shared this afternoon by Twitter user @_L1ngL1ng_, took many avid jailbreakers by surprise:

Sileo and Zebra package managers each get updates with improved iOS 14 support

Checkra1n is the only public jailbreak tool capable of pwning iOS & iPadOS 14 at the time of this writing, and regardless of whether you use it as it comes or you use the Odyssey Team’s Odysseyra1n bootstrap, a few notable package manager updates are now available as of Wednesday evening that you probably won’t want to miss, assuming they apply to you.

No, the aforementioned updates aren’t for the pre-installed Cydia package manager, but instead for competing package managers that have gained a lot of traction in the past couple of years. We’re talking of course about Zebra, a popular Cydia alternative that can be installed with the native checkra1n bootstrap, and Sileo, the default package manager that comes pre-installed with the Odysseyra1n bootstrap.

Checkra1n v0.12.0 released, supports A10(X), iOS 14.1 & 14.2, and more

The checkra1n team updated its venerable jailbreak tool to version 0.12.0 this Sunday afternoon, adding a plethora of improvements that are certain to garner attention from the community.

The team took to Twitter this afternoon to reveal that checkra1n v0.12.0 is an update that many iOS 14 users probably won’t want to miss, and given the exciting content of this update, it’s easy to see why:

Checkra1n tinkerer demonstrates custom boot sound on T2-equipped Mac

One of the things that makes the checkra1n jailbreak unique is that it’s bootrom-based, which means that it’s able to jailbreak any hardware vulnerable to the checkm8 bootrom exploit. This includes iPhones, iPads, Apple TVs, and even the T2 chip that many modern Mac computers now come equipped with from the factory.

It wasn’t long ago that the checkra1n team baked official support for the T2 chip into their jailbreak tool, and as such, it may come as no surprise that some of the first T2-based hacks are beginning to trickle in. One of the latest of such hacks apparently involves modifying a T2 chip-equipped Mac Mini to play the infamous THX sound during boot-up:

Luca Todesco touts progress with team on checkra1n for A10 devices on iOS 14

Checkra1n first picked up support for iOS & iPadOS 14 exactly one month ago starting today, but with a significant caveat in that it would initially support only A8-A9X devices. At the time, the team said it would work to add A10 support “in coming weeks,” and now that four weeks have passed since the announcement, it may come as no surprise that team member Luca Todesco addressed the community this afternoon via Twitter.

Now before your heart skips a beat on that subject, we’ll come right out and say that the latest comment contains good news. It seems that progress has been made in adding support for A10 devices running iOS & iPadOS 14, and Todesco expects a public release for this new support to happen quite soon:

Security researchers demonstrate ‘PlugNPwn’ attack on T2-equipped Mac

It wasn’t long after the checkm8 bootrom exploit gave rise to the checkra1n jailbreak tool that clever hackers learned how they could use the same exploit (along with other hacks) to tamper with the proprietary T2 chip embedded in a bevy of modern Macs. In fact, the checkra1n jailbreak tool’s most recent update even added support for the T2 chip in Macs for interested tinkerers.

Despite how incredible the aforementioned circumstances sounded to jailbreak enthusiasts at first glance, those on the other side of the fence quickly began wondering about the implications this might have for the security of Apple’s most popular computers. Now, we may finally have some idea thanks to information published by the t8012 Development Team.

FAQ: iOS 14 checkra1n jailbreak

The checkra1n jailbreak recently picked up support for iOS 14 on devices equipped with Apple’s A8-A9X processors, but as many noticed on the night this happened, the checkra1n team also elucidated on how it would take more time to add support for A10 and A10X devices and that they weren’t even sure if they would be able to add support for A11-equipped devices like the iPhone 8, 8 Plus, and X.

Given the rather unexpected and uncertain circumstances, we’re sure there are a lot of questions about the checkra1n jailbreak and when or if it will receive updates to support newer devices. With that in mind, we wanted to take a moment to deliver an FAQ-style post that would discuss many of the most common questions and the best answers for those questions that we have at the time of this writing.

Checkra1n jailbreak picks up support for iOS 14 on A8-A9X devices

Not even one week after Apple officially released iOS and iPadOS 14 to the general public, the checkra1n team has released checkra1n version 0.11.0 with support for Apple’s latest and greatest mobile operating system (albeit with a catch).

The checkra1n Twitter page shared the announcement late Monday night, followed closely by commentary from Todesco himself: