With iOS and iPadOS 15 now available to the general public, an assortment of questions and even rumors have started to circulate about jailbreaking.
If you’ve had your eyes glued to jailbreak community developments amid all the talk of untethers recently, then you’re not alone, and we’re especially excited to share that you’re in for some good news.
Excitement is swirling around in the jailbreak community Monday evening after hacker and iOS developer @__spv took to Twitter to share thought-provoking Tweets related to untethered jailbreaks.
Untethered jailbreaks are something of a rarity these days, with most modern jailbreaks being either semi-tethered or semi-untethered variants instead. But a teaser by security researcher Linus Henze just one week ago manifested at least some hope that the community could witness one again soon, at least for the likes of iOS & iPadOS 14.5.1 and below.
And speaking of untethered jailbreaks, Odyssey Team lead developer CoolStar announced via the Sileo / Taurine / Odyssey Discord channel Monday evening that they had successfully achieved arbitrary code execution in a native iOS/iPadOS application after conducting a full reboot of the device. This is, of course, the hallmark feature of an untethered jailbreak.
For the past several years, the overwhelming majority of jailbreaks have been semi-untethered, meaning that you could still use a handset hacked liberated by said tools after a reboot, albeit in a non-jailbroken state.
The lack of untethered jailbreaks — or those that remain fully jailbroken following a reboot — has been a pain point for jailbreakers for as long as anyone can remember. For that reason, a Tweet shared by @LinusHenze Monday afternoon might be of particular interest…
The most current jailbreak tools available to the public today are Taurine and unc0ver, each of which are capable of jailbreaking devices running up to and including iOS or iPadOS 14.3. Several iPhone and iPad software updates later, and we’re currently residing at iOS & iPadOS 14.7.1 with a public iOS & iPadOS 15 release looming just over the horizon.
Having said that, the elephant in the room would be the blazingly-obvious question: where are all the jailbreak-viable exploits for iOS 14.4 and later?
In a spark of optimism for the jailbreak community, the Odyssey Team seems to be getting a head start with respect to investing in the future of jaibreaking.
Apple hasn’t held back from being vocal about the performance and security of its proprietary M1 chip – the tried-and-true powerhouse found inside of several different Mac computer models and even the highest-end 2021 iPad Pro. But as it would seem, not even the venerable M1 chip is hack proof…
Hacker and ZecOps security researcher @08Tc3wBB, known for contributions to the jailbreak community in the form of exploits that have been used in tools such as unc0ver by Pwn20wnd, appears to have made a momentous breakthrough with respect to the M1 chip.
Hacker and security researcher @pattern_F_ issued a stern reminder to avid jailbreakers Tuesday afternoon about the potential dangers of a jaw-dropping security flaw discovered in iOS & iPadOS 14.0-14.3.
Jailbreakers using iOS or iPadOS 14.0-14.3 have long had the option of choosing between Taurine by the Odyssey Team or unc0ver by Pwn20wnd. But earlier in the year, a third option dubbed Manticore was being relentlessly teased.
Checkra1n is one of the best ways to jailbreak an iPhone or iPad if you have a compatible device (A7-A11) because it utilizes an un-patchable hardware-based bootrom exploit known as checkm8. Perhaps the only notable caveat to checkra1n is that it’s a semi-tethered jailbreak, which means that you need a computer to return to a jailbroken state if you reboot your device for any reason.
Hot off the heels of Apple’s newly released iOS & iPadOS 14.7.1 software update Monday afternoon, the company published a page entitled “About the security content of iOS 14.7.1 and iPadOS 14.7.1.” The notes describing what this update patches are somewhat shocking.