Whilst most are no doubt still eagerly awaiting a jailbreak for the just-released iOS 10.2, there are those who still have devices on various flavours of iOS 9 and older, who have fallen through the cracks of the most recent Pangu releases. For them, this week brought some hope, with two separate announcements of upcoming jailbreaking tools, in addition to the release of a browser-based tool from Luca Todesco. This round-up will cover the various pieces of jailbreak release news that came to light over the past few days.
As reported recently on iDB, Luca Todesco has decided to solve the certification problems which have plagued the most recent Pangu release for 9.2-9.3.3, by making public a web-based tool for re-activating the jailbreak.
After doing some testing and research it seemed appropriate for a more in-depth discussion of the tool, along with a walkthrough, in order to address some of the more technical questions surrounding this latest development in the jailbreaking scene.
Noted iOS security researcher and hacker Luca Todesco has just released a WebKit-based loader for the Pangu 9.3.3 jailbreak. This impressive browser exploit is reminiscent of the original JailbreakMe exploits on iOS 1 and iOS 4, after which it is named.
All that is required for the technique to work is to follow a URL in mobile Safari, press a button, lock your device and wait for the respring.
Whilst this development is testament to Todesco’s hacking skills and has alleviated one major problem with the current 9.3.3 jailbreak: its reliance on developer certificates for the loader app, there is bound to be some confusion over what this tool actually does, and what it means for the jailbreak community. This post aims to bring some clarity to the topic.
Your location is an important piece of information, and sometimes apps ask for it. If you’re somewhat of a privacy monger, then you might like to keep a lot of apps from acquiring your true location and logging information about you.
With a new jailbreak tweak called LocationHandle, you can actually spoof your location. This tweak works on iOS 9.3.3, unlike many other popular location-spoofing jailbreak tweaks, and we’ll show you how it works in this review.
Nearly three weeks after releasing iOS 9.3.4, Apple has closed the signing window for iOS 9.3.3 and iOS 9.3.2, making it impossible to downgrade from the latest firmware version available to these older ones.
Saurik has officially updated Cydia Eraser this week with support for iOS 9.3.3, which means anyone who jailbroke with the Pangu jailbreak tool now has a way to un-jailbreak their devices without using iTunes to restore and update their device.
In this tutorial, we’ll show you how and why to use Cydia Eraser to un-jailbreak your iOS 9.3.3 device.
Ever since the jailbreak for iOS 9.2-9.3.3 was released by Pangu, there has been a lot of confusion about the jailbreak. Slowly, but surely, the answers to everyone’s questions are coming out into the light, and we’ve made a jailbreak FAQ posting to answer most of them.
On the other hand, one of the biggest benefits to jailbreaking is being able to install jailbreak tweaks to modify your device to your liking. In this piece, we’ll talk about some of the best jailbreak tweaks you can install on iOS 9.3.3 right now.
Apple has released iOS 9.3.4 on Thursday with “important improvements to the security” of iOS.
On the other hand, we understand iOS 9.3.4 actually just kills the semi-untethered jailbreak for iOS 9.3.3. As a result, it’s highly recommended that you get your devices to iOS 9.3.3 and jailbroken if you value having a jailbreak at all.
If you’re currently jailbroken on iOS 9.3.3, then we suggest you install the latest version of the English Pangu jailbreak app on your device, because Pangu says it can now embed the 1-year Beijing enterprise certificate that will keep your jailbreak valid until April 2017.
In this tutorial, we’ll show you how to install the new Pangu app and embed the 1-year Beijing enterprise certificate on your device. We promise, it’s not that difficult!