If you haven’t heard about the Fugu14 untether and how the unc0ver jailbreak now supports it, then you’d be inviting the age-old question of whether you live under a rock or not. And now that the latest version of AltStore (v1.4.8) can bundle the Fugu14 untether with the latest version of the semi-untethered unc0ver jailbreak tool, lots of people with compatible devices are jumping onboard.
iOS 14.5.1
How to install the Fugu14 untether with the unc0ver jailbreak via AltStore
If you have a Fugu14 untether-compatible device and you’re interested in using it to untether your unc0ver jailbreak, then you’re in luck because recent updates to AltStore, Fugu14, unc0ver have tied it all together to make the installation process easy and straightforward.
Linus Henze updates Fugu14 untether for reliability as Pwn20wnd updates unc0ver jailbreak to v7.0.1
If you’ve been following along with all the latest jailbreak hubbub, then you undoubtedly witnessed Linus Henze releasing his highly anticipated Fugu14 untether last Sunday. Shortly after that happened, hacker and jailbreak developer Pwn20wnd updated the unc0ver jailbreak tool to version 7.0.0 with preliminary support for Fugu14.
Linus Henze postpones iOS 14 untether release until Sunday to address newly discovered bugs
A small update surfaced this Tuesday evening for everyone that has been avidly looking forward to the public release of Linus Henze’s jailbreak untether for iOS & iPadOS 14.5.1 and below.
Linus Henze demos untethered jailbreak on iPhone 12 Pro Max with iOS 14.5.1
For the past several years, the overwhelming majority of jailbreaks have been semi-untethered, meaning that you could still use a handset hacked liberated by said tools after a reboot, albeit in a non-jailbroken state.
The lack of untethered jailbreaks — or those that remain fully jailbroken following a reboot — has been a pain point for jailbreakers for as long as anyone can remember. For that reason, a Tweet shared by @LinusHenze Monday afternoon might be of particular interest…
Newly teased PoC raises hope for pwning certain handsets on iOS 14.4-14.5.1
The most current jailbreak tools available to the public today are Taurine and unc0ver, each of which are capable of jailbreaking devices running up to and including iOS or iPadOS 14.3. Several iPhone and iPad software updates later, and we’re currently residing at iOS & iPadOS 14.7.1 with a public iOS & iPadOS 15 release looming just over the horizon.
Having said that, the elephant in the room would be the blazingly-obvious question: where are all the jailbreak-viable exploits for iOS 14.4 and later?
Apple in hot legal waters again, this time over excessive iPhone battery drain in iOS 14.5
A consumer group in Europe wants some answers from Apple regarding alleged iPhone battery drain after receiving complaints that iOS 14.5 and other updates slowed down recent iPhones.
Ian Beer publishes PoC that could allow arbitrary code execution on iOS 14.4-14.5.1
Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.
Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.
Arbitrary code execution achieved on iOS 14.5.1 and below, write-up purportedly coming at a later date
Apple just yesterday released iOS & iPadOS 14.6 to the general public to lay the groundwork for Apple Music’s upcoming lossless playback option, support Apple Card Family, and more. But that's not all...
Also worth noting is that iOS & iPadOS 14.6 patched a number of security vulnerabilities, including one that purportedly allowed security researcher @xerub to gain arbitrary code execution by simply parsing a carefully crafted certificate.