iOS

Pwn20wnd touts notable progress on iOS 13.3 support in unc0ver jailbreak

If you’re avidly following the latest developments in the jailbreak community as of late, then you might be excited to learn that hacker and unc0ver lead developer Pwn20wnd has made swift and substantial progress on implementing Brandon Azad’s newly-released oob_timestamp tfp0 exploit for iOS 13.3 into the unc0ver jailbreak.

Throughout the past hour, Pwn20wnd has shared a plethora of status updates regarding his progress. Perhaps one of Pwn20wnd’s most notable Tweets was that he had successfully bypassed the mitigations in place by Apple to trump his codesigning bypass, which is claimed to be “the biggest part of the jailbreak on A12(X),” and apparently, on A13 too:

This tweak lets you launch the Camera app from anywhere in iOS

One of the best reasons to own an iPhone is to have one of the world’s greatest point-and-shoot cameras at your disposal. But even better, those with jailbroken iPhones can augment their camera’s capabilities on top of all the killer features Apple provides out of the box.

Enter Fisting, an unfortunately named, but free jailbreak tweak by iOS developer kremedved that makes accessing your iPhone’s Camera app a cinch no matter where you are in the operating system.

Complications and progress as Pwn20wnd tests the new oob_timestamp exploit

The release of Brandon Azad’s oob_timestamp exploit yesterday afternoon meant that Pwn20wnd could finally get to work on adopting support for the unc0ver jailbreak. On the other hand, a plethora of Tweets shared early Saturday morning suggest that doing so could be a lot more work than initially thought.

While Pwn20wnd has every intention of updating the unc0ver jailbreak to support iOS 13.3 on A12(X)-A13 as planned, it seems that the biggest complication would be the impractical amount of work needed to support each and every individual firmware version between iOS 13.0 and 13.3 on each and every device type:

Brandon Azad officially releases OOB Timestamp exploit for iOS 13.0-13.3

Several days ago, hacker and iOS security researcher Brandon Azad took the jailbreak community by storm when he said he would soon be releasing a new kernel exploit proof-of-concept targeting the iPhone 11 on iOS 13.3. It didn’t take long after that for unc0ver jailbreak lead developer Pwn20wnd to add that unc0ver would likely receive an update incorporating the new exploit.

The teasers have awakened a brand-new audience in the jailbreak community, namely those handling Apple’s latest handsets like the iPhone 11 and variants of the iPhone 11 Pro. But all that hype aside, Azad officially released his new kernel exploit proof of concept Friday afternoon, and he’s calling it OOB Timestamp:

Pwn20wnd touts progress on PAC-less tweak injection on iOS 13

If you’ve been following the jailbreak community as of late, then you’ve undoubtedly caught wind of Pwn20wnd’s plethora of recent announcements regarding the potential synergy between the unc0ver jailbreak tool and Brandon Azad’s yet-to-be-released tfp0 exploit.

Azad’s exploit was initially revealed to work on the iPhone 11 running iOS 13.3, and according to Pwn20wnd, it should also be viable on A12(X) devices and with all firmware versions between iOS 13.0-13.3. At the same time, Pwn20wnd cited three notable hurdles that would need to be dealt with if tweak injection was to work in the PAC-less implementation on iOS 13 via unc0ver.

Last chance to downgrade to iOS 13.3 on A12/A13 for potential jailbreak eligibility

The news that hacker and iOS security researcher Brandon Azad would be releasing a tfp0 exploit POC for the iPhone 11 on iOS 13.3 took the jailbreak community by storm, and it didn’t take long before unc0ver lead developer Pwn20wnd responded with plans to update unc0ver when it gets released.

Many questions have been circulating about whether this exploit would work on older devices or whether it would support older versions of iOS. Fortunately, Pwn20wnd has taken to Twitter to answer many of these questions and to prepare the jailbreak community for great things to come.

Checkra1n team launches PongoKit for checkm8-vulnerable iOS devices

The checkra1n team is best known for their checkm8 bootrom exploit-based checkra1n jailbreak tool, which just yesterday picked up support for Linux after being macOS-only for several months. We’ve known for quite some time that the checkra1n team intended to delve into more than just jailbreaking with the checkm8 bootrom exploit, and the fruits of such research are finally starting to surface.

The checkra1n team took to Twitter early Thursday morning to announce the initial release of PongoKit, a highly experimental and developer-only SDK that should help permit the deployment of other platforms on checkm8 vulnerable iOS devices:

AutoScroll prevents finger fatigue when scrolling a lot on your iPhone

As Steve Jobs once said, your finger is the best pointing device for your iPhone. But with enough manual scrolling effort, it may not take long before you start to experience finger fatigue, especially when reading lengthy websites or eBooks.

Those looking for a solution to the finger fatigue problem when scrolling endlessly may enjoy a newly released jailbreak tweak called AutoScroll by iOS developer pxcex. Just as the name implies, this add-on incorporates automatic scrolling into iOS.

Pwn20wnd reveals plan to update unc0ver for iOS 13.0-13.3 with Brandon Azad’s exploit

If you’ve been following along with trends in the jailbreak community recently, then you’ve undoubtedly caught wind of hacker and security researcher Brandon Azad’s plans to release a tfp0 exploit proof-of-concept targeting the iPhone 11 on iOS 13.3.

The news, announced just yesterday, has good implications for jailbreaking. It means that jailbreaks could potentially be devised for devices running iOS 13.3, perhaps even other handsets of the A13 variety. But who will make them?