Apple is no longer signing iOS or iPadOS 13.4.1 as of this evening, a move that prevents iPhone and iPad users from downgrading from the iOS and iPadOS 13.5 software updates that the Cupertino-based tech giant released to the general public just last week.
Downgrading iOS device firmware isn’t a common necessity, but it can be necessary if or when Apple releases a software update that introduces bugs or instability to its devices. This isn’t a particularly common thing to happen, but it did transpire last October when iOS 13.2 was found to be ‘too aggressive’ with backgrounding restrictions, compelling many users to downgrade until a software update could be released to fix the issue.
On April 7, Apple released iOS 13.4.1 to the public with a few different bug fixes, and now the company has released the same software again -- this time for the new iPhone SE.
Jailbreakers with access to an A7-A11 device pretty much have it made thanks to the hardware exploit-based checkra1n jailbreak that can’t be patched by Apple in a software update. Those handling newer devices, such as the A12 and A13 varieties, instead depend on infrequently released tfp0 exploits. These seem to surface sporadically with no rhyme or reason, and they can unfortunately be patched by Apple’s software updates.
On a more positive note, it does appear that a skilled security researcher going by the Twitter handle @ProteasWang has achieved tfp0 on an A13-equipped handset running iOS 13.4.1. This is currently the latest version of iOS available from Apple, and with that in mind, the news has particularly exciting implications for jailbreaks such as unc0ver and the to-be-released Chimera13 tool.
Despite the fact Apple has already jumped to iOS and iPadOS 13.4.5 in its beta testing phase, the company has just released version 13.4.1 to the public for both mobile operating systems.
According to a new report, Apple may release a small iOS 13.4.1 update later this week to squish a nasty bug on iPhone, iPad and iPod touch that has caused data and IP addresses in virtual private networks (VPN) to be exposed.