If you’re avidly following the latest developments in the jailbreak community as of late, then you might be excited to learn that hacker and unc0ver lead developer Pwn20wnd has made swift and substantial progress on implementing Brandon Azad’s newly-released oob_timestamp tfp0 exploit for iOS 13.3 into the unc0ver jailbreak.
Throughout the past hour, Pwn20wnd has shared a plethora of status updates regarding his progress. Perhaps one of Pwn20wnd’s most notable Tweets was that he had successfully bypassed the mitigations in place by Apple to trump his codesigning bypass, which is claimed to be “the biggest part of the jailbreak on A12(X),” and apparently, on A13 too:
The release of Brandon Azad’s oob_timestamp exploit yesterday afternoon meant that Pwn20wnd could finally get to work on adopting support for the unc0ver jailbreak. On the other hand, a plethora of Tweets shared early Saturday morning suggest that doing so could be a lot more work than initially thought.
While Pwn20wnd has every intention of updating the unc0ver jailbreak to support iOS 13.3 on A12(X)-A13 as planned, it seems that the biggest complication would be the impractical amount of work needed to support each and every individual firmware version between iOS 13.0 and 13.3 on each and every device type:
Several days ago, hacker and iOS security researcher Brandon Azad took the jailbreak community by storm when he said he would soon be releasing a new kernel exploit proof-of-concept targeting the iPhone 11 on iOS 13.3. It didn’t take long after that for unc0ver jailbreak lead developer Pwn20wnd to add that unc0ver would likely receive an update incorporating the new exploit.
The teasers have awakened a brand-new audience in the jailbreak community, namely those handling Apple’s latest handsets like the iPhone 11 and variants of the iPhone 11 Pro. But all that hype aside, Azad officially released his new kernel exploit proof of concept Friday afternoon, and he’s calling it OOB Timestamp:
The news that hacker and iOS security researcher Brandon Azad would be releasing a tfp0 exploit POC for the iPhone 11 on iOS 13.3 took the jailbreak community by storm, and it didn’t take long before unc0ver lead developer Pwn20wnd responded with plans to update unc0ver when it gets released.
Many questions have been circulating about whether this exploit would work on older devices or whether it would support older versions of iOS. Fortunately, Pwn20wnd has taken to Twitter to answer many of these questions and to prepare the jailbreak community for great things to come.
Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?
Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3:
The jailbreak community has been on fire these past few months, with checkra1n delivering an un-patchable jailbreak experience for handsets ranging from the iPhone 5s to the iPhone X, and with unc0ver picking up support for iOS 12.4.1. But hey, why let the pwnage stop there?
Renowned hacker and iOS security researcher iBSparkes broke the silence this weekend after sharing a teaser of what appears to be successful tfp0 on a brand-new A13 device running iOS 13.3. Yes indeed folks, that’s both Apple’s latest hardware and software – pwned in one fell swoop. Not too shabby!
It’s always exciting for the jailbreak community when someone comes forward with a brand-new bug that could potentially enable exploitation for jailbreaking newer devices and versions of iOS. After all, Apple tries very hard to keep iOS bug-free and quickly patches anything that even smells jailbreakable.
With that in mind, a newly-teased ‘tfp0’ bug shared first by @08Tc3wBB and later validated by security researcher @RazMashat would appear to be compatible with Apple’s latest and greatest iOS 13.3 firmware on handsets up to and including the A13 variety. Indeed; even the iPhone 11 Pro platform seems to be vulnerable:
Apple stopped signing iOS 13.2.3 Thursday evening, barely over a week after releasing iOS 13.3 to the general public. It’s an expectable move on the company’s behalf that prevents iPhone and iPad users from restoring to that particular firmware version, or from downgrading from the newer iOS 13.3 release.
Apple’s official reasoning for doing this is to facilitate software upgrades to ensure that users take advantage of the latest features, bug fixes, and security patches. Behind that marketing façade, it’s also evident that Apple prevents software downgrades in an effort to keep the jailbreak community at bay, as most jailbreak tools only operate on older versions of iOS, and Apple quickly patches these jailbreaks in its software updates.
With the launch of iOS 13.3, Apple introduced another security feature as part of its Screen Time feature, which is meant to help parents limit who their kids talk to at certain points in a day.
Apple yesterday released iOS 13.3 and iPadOS 13.3 to the public. We thought iDownloadBlog readers might want to know what's new so we've put together a nice little hands-on video walkthrough taking you through the best new iPhone and iPad features enabled by the update.
Apple today released the iOS 13.3 software for its Siri-driven HomePod wireless speaker.
The iOS 13.3 software update that dropped today brought a bunch of bug fixes to iPhones and iPads around the world along with new features like Screen Time Communication Limits, a handy Memoji Stickers toggle for the stock keyboard and more. But there's one particular feature that we'd like to highlight because Apple has tucked it away as a side-note in the bug-fixes section of the iOS 13.3 changelog. I'm talking about trimming videos in Photos.