Hack

Pwn20wnd says unc0ver could support iOS 13.0-13.3 on A12(X)-A13 devices

There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.

Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support:

Complications and progress as Pwn20wnd tests the new oob_timestamp exploit

The release of Brandon Azad’s oob_timestamp exploit yesterday afternoon meant that Pwn20wnd could finally get to work on adopting support for the unc0ver jailbreak. On the other hand, a plethora of Tweets shared early Saturday morning suggest that doing so could be a lot more work than initially thought.

While Pwn20wnd has every intention of updating the unc0ver jailbreak to support iOS 13.3 on A12(X)-A13 as planned, it seems that the biggest complication would be the impractical amount of work needed to support each and every individual firmware version between iOS 13.0 and 13.3 on each and every device type:

Brandon Azad officially releases OOB Timestamp exploit for iOS 13.0-13.3

Several days ago, hacker and iOS security researcher Brandon Azad took the jailbreak community by storm when he said he would soon be releasing a new kernel exploit proof-of-concept targeting the iPhone 11 on iOS 13.3. It didn’t take long after that for unc0ver jailbreak lead developer Pwn20wnd to add that unc0ver would likely receive an update incorporating the new exploit.

The teasers have awakened a brand-new audience in the jailbreak community, namely those handling Apple’s latest handsets like the iPhone 11 and variants of the iPhone 11 Pro. But all that hype aside, Azad officially released his new kernel exploit proof of concept Friday afternoon, and he’s calling it OOB Timestamp:

Pwn20wnd reveals plan to update unc0ver for iOS 13.0-13.3 with Brandon Azad’s exploit

If you’ve been following along with trends in the jailbreak community recently, then you’ve undoubtedly caught wind of hacker and security researcher Brandon Azad’s plans to release a tfp0 exploit proof-of-concept targeting the iPhone 11 on iOS 13.3.

The news, announced just yesterday, has good implications for jailbreaking. It means that jailbreaks could potentially be devised for devices running iOS 13.3, perhaps even other handsets of the A13 variety. But who will make them?

Brandon Azad plans to release a new exploit for iPhone 11 on iOS 13.3

Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?

Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3:

Fugu: An early concept open source jailbreak project based on checkm8

Matrix code hacked iPhone.

Checkra1n has long enjoyed its prestigious status of being the first and only jailbreak tool to take advantage of the checkm8 bootrom exploit, but could that change in the near future?

A curious new posting shared just this evening on /r/jailbreak appears to detail a new jailbreak tool dubbed Fugu that is being dubbed the “first open-source jailbreak tool based on the checkm8 exploit” by its creator Linus Henze. This eye-popping development certainly grabbed our attention, but a closer look at the project's GitHub page reveals the fine print:

Hacker teases successful jailbreak on third iOS 13.3.1 beta

It’s no secret that the checkra1n jailbreak tool the jailbreak community by storm. But despite being unfixable by Apple, it’s still always comforting to see a newfangled jailbreak demonstration, especially when it happens on Apple’s latest firmware and when checkra1n isn’t the method of pwnage.

A Tweet with an embedded video demonstration shared Monday afternoon by Twitter user @08Tc3wBB appears to demonstrate an iPhone X on iOS 13.3.1 beta 3 being jailbroken with the assistance of an unknown side-loaded jailbreak app.

Checkra1n for Linux is purportedly almost complete

The checkra1n jailbreak has earned quite the impressive reputation over the past several months as it became both the first iOS 13-supported jailbreak and the first un-patchable bootrom exploit-based jailbreak to be released since the infamous limera1n days almost one full decade ago. But there’s also a certain stigma surrounding the checkra1n jailbreak as it only runs on macOS at the time of this writing.

Fortunately, that’s set to change sooner rather than later. While a Windows version of the jailbreak tool is still probably rather far off due to the complexities of its development, the good news is that the Linux version of checkra1n is nearing completion and could be released very soon. Checkra1n co-developer Nikias Bassen (@pimskeks) shared the exciting announcement via Twitter this Tuesday afternoon:

New solder-on cable allegedly permits DFU mode entry on Apple TV 4K

One of the most substantial things to happen in the jailbreak community in the past decade was the release of @axi0mX’s hardware-based checkm8 bootrom exploit. This exploit can’t be patched by Apple in a software update, and it essentially guarantees the jailbreakability of several of Apple’s devices using the A5-A11 SoC for life.

While checkm8 is already being used in the checkra1n jailbreak for handsets ranging from the iPhone 5s to the iPhone X, it’s also true that the same exploit can be used to jailbreak compatible Apple TV units. The newest Apple TV, on the other hand, purportedly sports a hidden Lightning port that would necessitate a special adapter to utilize for such an exploit.

Hacker iBSparkes achieves tfp0 on A13 with iOS 13.3

The jailbreak community has been on fire these past few months, with checkra1n delivering an un-patchable jailbreak experience for handsets ranging from the iPhone 5s to the iPhone X, and with unc0ver picking up support for iOS 12.4.1. But hey, why let the pwnage stop there?

Renowned hacker and iOS security researcher iBSparkes broke the silence this weekend after sharing a teaser of what appears to be successful tfp0 on a brand-new A13 device running iOS 13.3. Yes indeed folks, that’s both Apple’s latest hardware and software – pwned in one fell swoop. Not too shabby!