The unc0ver jailbreak only just picked up support for iOS & iPadOS 14.0-14.3 this past weekend, and while it was met with unprecedented hype from those who’ve been waiting for a public iOS & iPadOS 14-centric jailbreak for all devices, anyone could have guessed that the tool would soon receive subsequent updates with bug and stability fixes.
Unc0ver received its first update after adding support for iOS & iPadOS 14.0-14.3 Monday evening with a number of improvements, but as many veteran unc0ver jailbreakers would come to expect, it wouldn’t be the final update. The unc0ver jailbreak tool received an update once again on Wednesday, this time to version 6.0.2 with additional changes.
The unc0ver jailbreak has received its first minor update after initially picking up support for iOS & iPadOS 14.0-14.3 this past weekend, a feat made possible by a custom kernel exploit that drew heavy inspiration from the recently released cicuta_verosa exploit by @ModernPwner.
In the latest update, dubbed version 6.0.1, unc0ver received bug fixes and performance improvements to address some of the issues reported by users within the first 48 hours of the tool being available to the general public.
In case you missed it, the unc0ver jailbreak tool received an update Saturday night to version 6.0.0, adding official support for iOS & iPadOS 14.0-14.3 devices.
Many iPhone and iPad users are excited about the thought of jailbreaking their iOS & iPadOS 14 devices, but they’re either not sure where to begin or might be experiencing turbulence in the attempt to jailbreak.
After much anticipation, the unc0ver team has officially updated its tenable jailbreak tool Saturday evening with initial support for iOS & iPadOS 14.0-14.3.
The latest unc0ver update brings the tool up to version 6.0.0, and as expected, incorporates a full fledged jailbreak experience with tweak injection via Substitute and package management via Cydia.
First off, this guide is only necessary for 64-bit devices which are currently jailbroken on old firmwares, such as iOS 9 and some versions of iOS 10. The jailbreaks for those firmwares did not always include a way to set a generator for use with futurerestore, and nonceEnabler provides that ability. Nearly all newer jailbreaks provide their own simpler ways of setting a generator, and they do not need to use nonceEnabler, nor this guide. If your device is not currently jailbroken on an old firmware such as the ones mentioned in this guide, and/or has its own method of setting a generator, refer instead to our main futurerestore guides.
Apple is facing yet another antitrust claim against it. This time around, though, it's from one of the company's oldest "competitors".
A substantial number of veteran jailbreakers who relied on Cydia’s ‘Log in with Facebook’ mechanism to access their previous jailbreak tweak and extension purchases were met with frustration after the feature appeared to stop working last June.
Fortunately, the problem now appears to be fixed, as noted by a couple of Tweets shared just this weekend by Cydia creator Jay Freeman, also known more colloquially to the jailbreak community as Saurik:
Saurik released yet another update for the Cydia Substrate tweak injection package on Saturday in a move to help improve the software’s overall reliability and stability with day-to-day use.
The latest update, coined version 0.9.7111, is said to fix a problem that Saurik purportedly introduced in the older 0.9.7109 update. Saurik notes in the newest change log that the update intended to solve a problem with an earlier update, but inadvertently un-fixed a totally different issue in doing so:
If you’ve spent any time brushing up on your jailbreak news over the past couple of months, then you likely noticed that Jay Freeman, also commonly known as Saurik, has released a plethora of updates for Cydia Substrate recently.
Those who know their jailbreak facts will know that the Cydia Substrate package isn’t one to normally receive a ton of updates. As such, many jumped to the conclusion that Saurik may be trying to modernize Cydia Substrate solely for competitive purposes as other tweak injection methods gain steam on alternative jailbreaks. A statement recently released by Saurik reveals that this couldn’t be further from the truth…
In most scenarios, someone with the desire to view jailbreak apps and tweaks would need to fire up their jailbroken device and launch a package manager such as Cydia, Installer, Sileo, or Zebra to do so. Sometimes, however, you might fancy searching for specific packages hosted on your favorite repositories even when your jailbroken device isn’t in reach, and this poses unique challenges in and of itself.
An upcoming website and API dubbed Parcility will strive to make all of this information readily available from virtually any web browser, whether you’re using a personal computer or a non-jailbroken device to browse jailbreak-centric repositories. Citing the concept’s release post on /r/jailbreak, Parcility will index more than 600 individual repositories, and this equates to a whole lot of browsing power.
Following a chain of recent updates to the Cydia Substrate package this past weekend, Saurik issued yet another update late last night with notable bug fixes and changes. The latest update brings the tweak injection method up to version 0.9.7110.
The change log comments via Cydia Substrate’s official package depiction are particularly extensive for this release, and are as follows:
After a brief hiatus from last month’s rush of Cydia Substrate updates, Saurik appears to be at it again. Starting this morning, checkra1n jailbreak users should be able to refresh their sources and see two notable new updates including Cydia Substrate version 0.9.7108 and Substrate Safe Mode version 0.9.6004.
Both packages are especially important for the checkra1n jailbreak, as one drives tweak injection while the other serves as the last line of defense between jailbreak tweak failures and the possibility of a consequential boot loop. Fortunately, these packages work in tandem to permit jailbreak tweak usage in a safe environment.