Apple just yesterday released iOS & iPadOS 14.6 to the general public to lay the groundwork for Apple Music’s upcoming lossless playback option, support Apple Card Family, and more. But that's not all...
Also worth noting is that iOS & iPadOS 14.6 patched a number of security vulnerabilities, including one that purportedly allowed security researcher @xerub to gain arbitrary code execution by simply parsing a carefully crafted certificate.
Thanks to the checkm8 bootrom exploit that powers it, the checkra1n jailbreak has earned a reputation for its resilience. No mere software update can patch this exploit, and so susceptible devices (those equipped with A7-A11 chips) should effectively be jailbreakable for life...
Apple announced its new AirTag tracking accessory at the Spring Loaded event just over two weeks ago, and the first deliveries only started reaching the hands of avid customers last weekend.
Despite how new the product is, it seems that it has already been hacked by brilliant minds in the security research space.
The quest to pwn the Apple Watch is one that has received oodles of attention over the years, and while the concept is most certainly possible, it hasn’t quite reached the level of fruition that most jailbreakers would expect – especially when compared with the jailbreak offerings for iPhones and iPads.
Much of this has to do with the uncertainty of an Apple Watch jailbreak’s usefulness in addition to concerns related to restoring the Apple Watch’s firmware in the event of catastrophic errors (respring loops, etc.), but that hasn’t stopped some jailbreak developers from dabbling with the idea.
Pwn20wnd’s unc0ver jailbreak was the first semi-untethered tool to add support for iOS & iPadOS 14.0-14.3 back in February, but recent attention shifted to the Odyssey Team’s Taurine jailbreak for iOS & iPadOS 14.0-14.3 given that it just launched last week.
Still, that hasn’t stopped Pwn20wnd from cranking out regular revisions to unc0ver. Just this evening, the unc0ver jailbreak received an update to version 6.1.2 with a number of new stability improvements and a shiny new safety feature that jailbreakers may find helpful.
The jailbreak community has been on fire lately. Not only have all iOS & iPadOS 14.0-14.3 devices been made pwnable by both the tried and true unc0ver and brand new Taurine jailbreak tools, but the recent release of the kok3shi jailbreak made it possible for users of 64-bit iOS 9.3-9.3.5 devices to pwn their handsets as well.
Now, it seems a little more love is being provided for iOS 10 users as the Athenus Dev Team and w212 have teamed up to release ap0110, an auto-executing semi-untethered jailbreak for 32 and 64-bit iOS 10.x devices.
In case you’ve been living under a rock, the Taurine jailbreak is now officially available for all iOS & iPadOS 14.0-14.3 devices.
Taurine is the latest jailbreak whose development is led by CoolStar, the same individual responsible for spearheading the development of the Odyssey jailbreak on iOS & iPadOS 13.0-13.7 devices, the Chimera jailbreak on iOS 12 devices, and the Electra jailbreak on iOS 11 devices. With that in mind, if you've used any of the aforementioned jailbreak tools in the past, then you will find that Taurine's user experience feels particularly similar.
Ever since @ModernPwner dropped the cicuta_verosa kernel exploit for iOS & iPadOS 14.0-14.3 devices, we knew it’d only be a matter of time before jailbreaks would pick up support.
Pwn20wnd was the first to the party after adding iOS & iPadOS 14.0-14.3 support to the unc0ver jailbreak with a custom kernel exploit based on cicuta_verosa, but it just so happens that CoolStar was also working on an iOS 14.0-14.3 jailbreak that uses the cicuta_verosa kernel exploit directly.
Just under a week ago, CoolStar seeded Odyssey v1.3.1 beta 1 to members of the Sileo / Odyssey Discord channel for public beta testing. The biggest change was initial support for the new cicuta_verosa kernel exploit by @ModernPwner.
It wasn’t long after the beta release that the Odyssey Team learned of an issue involving bootstrapping a fresh device when using the cicuta_verosa exploit. Consequently Odyssey v1.3.1 beta 2 is now available with a fix.
While much of the jailbreak community’s interest recently has been hyper-focused on the unc0ver jailbreak adding support for iOS & iPadOS 14.0-14.3, many continue to wait for CoolStar to launch Odyssey14 (an interim name for the upcoming Sileo-supported iOS & iPadOS 14.0-14.3 jailbreak that will likely receive a new name once released).
While such a jailbreak isn’t yet out to the general public, it should be noted that CoolStar released a new public beta of the Odyssey jailbreak for iOS & iPadOS 13.0-13.7 on Friday. The new public beta, dubbed version 1.3.1 beta 1, provides access to the brand new cicuta_verosa exploit on iOS & iPadOS 13 devices, among other exploit-related changes.
The unc0ver jailbreak only just picked up support for iOS & iPadOS 14.0-14.3 this past weekend, and while it was met with unprecedented hype from those who’ve been waiting for a public iOS & iPadOS 14-centric jailbreak for all devices, anyone could have guessed that the tool would soon receive subsequent updates with bug and stability fixes.
Unc0ver received its first update after adding support for iOS & iPadOS 14.0-14.3 Monday evening with a number of improvements, but as many veteran unc0ver jailbreakers would come to expect, it wouldn’t be the final update. The unc0ver jailbreak tool received an update once again on Wednesday, this time to version 6.0.2 with additional changes.
The unc0ver jailbreak has received its first minor update after initially picking up support for iOS & iPadOS 14.0-14.3 this past weekend, a feat made possible by a custom kernel exploit that drew heavy inspiration from the recently released cicuta_verosa exploit by @ModernPwner.
In the latest update, dubbed version 6.0.1, unc0ver received bug fixes and performance improvements to address some of the issues reported by users within the first 48 hours of the tool being available to the general public.