Kicking off this Wednesday morning, hacker and unc0ver lead developer Pwn20wnd has issued an updated version of the unc0ver jailbreak tool dubbed version 4.2.1.
In a Tweet shared just minutes ago, Pwn20wnd said that unc0ver v4.2.1 would resolve a plethora of issues that were present in v4.2.0, including battery drain and Substitute unreliability:
Pwn20wnd officially released unc0ver v4.2.0 to the general public Tuesday afternoon after several internal beta testers had teased the jailbreak working on A8X-A11 devices running iOS 13.0-13.3 earlier in the day.
The hacker announced the new update, along with some vital information, just this afternoon via Twitter:
Ever since the unc0ver jailbreak picked up support for iOS 13.0-13.3 with Brandon Azad’s oob_timestamp exploit (and more recently, Jake James’ time_waste exploit), this support has been limited to A12(X)-A13 devices. Pwn20wnd was rather noncommittal with regards to adding support for A8-A11 devices since they’re already supported by the bootrom exploit-based checkra1n jailbreak, but that could now be on the verge of changing.
According to Tweets shared just this morning by Pwn20wnd, it seems that support for A8X-A11 devices on iOS 13.0-13.3 is very near to becoming a reality:
Ever since the unc0ver jailbreak picked up support for iOS 13.0-13.3 on A12(X)-A13 devices with the help of Brandon Azad’s oob_timestamp exploit, Pwn20wnd has been releasing bug fix updates on a regular basis to address some of the issues reported by users. Today is no different.
Shared in a a series of Tweets this afternoon, Pwn20wnd announced the launch of unc0ver versions v4.1.0 and 4.1.1, with the latter being the newest:
Those who’ve been keeping close tabs on the jailbreak community as of late should be keenly aware of Brandon Azad’s oob_timestamp exploit, which made iOS 13.0-13.3 support for A12(X)-A13 devices via the unc0ver jailbreak possible. As wonderful as it is, the oob_timestamp exploit isn’t without its shortcomings, such as memory leaks.
Given the aforementioned circumstances, a series of Tweets shared early this morning by renowned hacker Jake James may be considered great news for the jailbreak community:
Those who’ve keenly waited for the unc0ver jailbreak to officially support A12-A13 devices running iOS 13.0-13.3 devices by way of Brandon Azad’s oob_timestamp tfp0 exploit will be happy to know that the wait is finally over.
In a Tweet shared just this afternoon, project lead developer Pwn20wnd launched unc0ver v4.0.0 with support for the aforementioned device types and firmware versions:
Pwn20wnd issued a build of the updated unc0ver jailbreak tool with support for Brandon Azad’s oob_timestamp tfp0 exploit on A12(X)-A13 running iOS 13.0-13.3 to internal beta testers earlier this week. While many anticipated a public beta launch shortly after all the positive comments shared by internal beta testers, a bug was later discovered that delayed any sort of public release.
Fortunately for those waiting to use the new unc0ver on their compatible device(s), patience is almost certainly a virtue. In a Tweet shared Friday evening by Pwn20wnd, we learn how the pesky bug that delayed the initial public release of the renewed unc0ver jailbreak tool had been resolved:
The unc0ver jailbreak is so close to publicly supporting iOS 13.0-13.3 on A12(X)-A13 that we can almost taste it. Support for Brandon Azad’s new oob_timestamp exploit was pushed into internal beta testing yesterday afternoon, and according to Pwn20wnd, unc0ver could be publicly available in the next 24 hours or so if everything goes smoothly.
Assuming you managed to downgrade to iOS 13.3 from iOS 13.3.1 before Apple stopped signing it yesterday or already had some version of iOS 13 installed between 13.0-13.3, you’re probably wondering what you can do to prepare your jailbreakable handset. If that’s the case, then we’d advise setting up AltStore on your Mac or PC.
Apple must’ve caught wind about Pwn20wnd’s fast-paced progress on updated the unc0ver jailbreak for iOS 13.0-13.3. Not even a few hours after internal beta testers hyped the project on Twitter with the #unc0ver hashtag, Apple officially closed the signing window for iOS 13.3 to prevent downgrades from iOS 13.3.1.
Apple’s swift blow to iOS downgrading on Wednesday was somewhat out of character for the company because it transpired much earlier in the day than usual. While Apple regularly unsigns older firmware, the abruptness of iOS 13.3’s unsigning after Pwn20wnd’s slurry of announcements regarding unc0ver suggests that Apple intended to contain the jailbreak situation before it could reach the masses.
Hot off the heels of a plethora of teasers that have been shared over the course of the past couple of weeks, Pwn20wnd has officially commenced an internal beta testing phase for the unc0ver jailbreak with iOS 13.0-13.3 support on A12(X)-A13 as of Wednesday afternoon – a feat made possible with Brandon Azad’s oob_timestamp tfp0 exploit.
The news surfaced by way of Pwn20wnd’s official Twitter account, which earlier this morning noted that unc0ver would soon move into the internal testing phase. A few short hours later, internal testing officially began:
There’s been a ton of hype recently regarding Pwn20wnd updating the unc0ver jailbreak with official support for iOS 13.0-13.3 on A12(X)-A13 devices as of late, a feat only possible with Brandon Azad’s new oob_timestamp tfp0 exploit. But just how far along has the tool’s development come? A good question, and presumably one that has already been answered.
According to a series of Tweets shared by Pwn20wnd Tuesday afternoon, it would seem that tweak injection has been updated to work flawlessly on A13 devices (it was already working on A12[X]):
There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.
Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support: