Apple hasn’t held back from being vocal about the performance and security of its proprietary M1 chip – the tried-and-true powerhouse found inside of several different Mac computer models and even the highest-end 2021 iPad Pro. But as it would seem, not even the venerable M1 chip is hack proof…
Hacker and ZecOps security researcher @08Tc3wBB, known for contributions to the jailbreak community in the form of exploits that have been used in tools such as unc0ver by Pwn20wnd, appears to have made a momentous breakthrough with respect to the M1 chip.
Hacker and security researcher @pattern_F_ issued a stern reminder to avid jailbreakers Tuesday afternoon about the potential dangers of a jaw-dropping security flaw discovered in iOS & iPadOS 14.0-14.3.
Hot off the heels of Apple’s newly released iOS & iPadOS 14.7.1 software update Monday afternoon, the company published a page entitled “About the security content of iOS 14.7.1 and iPadOS 14.7.1.” The notes describing what this update patches are somewhat shocking.
Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.
Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.
Apple just yesterday released iOS & iPadOS 14.6 to the general public to lay the groundwork for Apple Music’s upcoming lossless playback option, support Apple Card Family, and more. But that's not all...
Also worth noting is that iOS & iPadOS 14.6 patched a number of security vulnerabilities, including one that purportedly allowed security researcher @xerub to gain arbitrary code execution by simply parsing a carefully crafted certificate.
Thanks to the checkm8 bootrom exploit that powers it, the checkra1n jailbreak has earned a reputation for its resilience. No mere software update can patch this exploit, and so susceptible devices (those equipped with A7-A11 chips) should effectively be jailbreakable for life...
Apple announced its new AirTag tracking accessory at the Spring Loaded event just over two weeks ago, and the first deliveries only started reaching the hands of avid customers last weekend.
Despite how new the product is, it seems that it has already been hacked by brilliant minds in the security research space.
The quest to pwn the Apple Watch is one that has received oodles of attention over the years, and while the concept is most certainly possible, it hasn’t quite reached the level of fruition that most jailbreakers would expect – especially when compared with the jailbreak offerings for iPhones and iPads.
Much of this has to do with the uncertainty of an Apple Watch jailbreak’s usefulness in addition to concerns related to restoring the Apple Watch’s firmware in the event of catastrophic errors (respring loops, etc.), but that hasn’t stopped some jailbreak developers from dabbling with the idea.
Pwn20wnd’s unc0ver jailbreak was the first semi-untethered tool to add support for iOS & iPadOS 14.0-14.3 back in February, but recent attention shifted to the Odyssey Team’s Taurine jailbreak for iOS & iPadOS 14.0-14.3 given that it just launched last week.
Still, that hasn’t stopped Pwn20wnd from cranking out regular revisions to unc0ver. Just this evening, the unc0ver jailbreak received an update to version 6.1.2 with a number of new stability improvements and a shiny new safety feature that jailbreakers may find helpful.
The jailbreak community has been on fire lately. Not only have all iOS & iPadOS 14.0-14.3 devices been made pwnable by both the tried and true unc0ver and brand new Taurine jailbreak tools, but the recent release of the kok3shi jailbreak made it possible for users of 64-bit iOS 9.3-9.3.5 devices to pwn their handsets as well.
Now, it seems a little more love is being provided for iOS 10 users as the Athenus Dev Team and w212 have teamed up to release ap0110, an auto-executing semi-untethered jailbreak for 32 and 64-bit iOS 10.x devices.
In case you’ve been living under a rock, the Taurine jailbreak is now officially available for all iOS & iPadOS 14.0-14.3 devices.
Taurine is the latest jailbreak whose development is led by CoolStar, the same individual responsible for spearheading the development of the Odyssey jailbreak on iOS & iPadOS 13.0-13.7 devices, the Chimera jailbreak on iOS 12 devices, and the Electra jailbreak on iOS 11 devices. With that in mind, if you've used any of the aforementioned jailbreak tools in the past, then you will find that Taurine's user experience feels particularly similar.
Ever since @ModernPwner dropped the cicuta_verosa kernel exploit for iOS & iPadOS 14.0-14.3 devices, we knew it’d only be a matter of time before jailbreaks would pick up support.
Pwn20wnd was the first to the party after adding iOS & iPadOS 14.0-14.3 support to the unc0ver jailbreak with a custom kernel exploit based on cicuta_verosa, but it just so happens that CoolStar was also working on an iOS 14.0-14.3 jailbreak that uses the cicuta_verosa kernel exploit directly.