Pwn20wnd officially released unc0ver v4.2.0 to the general public Tuesday afternoon after several internal beta testers had teased the jailbreak working on A8X-A11 devices running iOS 13.0-13.3 earlier in the day.
The hacker announced the new update, along with some vital information, just this afternoon via Twitter:
Ever since the unc0ver jailbreak picked up support for iOS 13.0-13.3 with Brandon Azad’s oob_timestamp exploit (and more recently, Jake James’ time_waste exploit), this support has been limited to A12(X)-A13 devices. Pwn20wnd was rather noncommittal with regards to adding support for A8-A11 devices since they’re already supported by the bootrom exploit-based checkra1n jailbreak, but that could now be on the verge of changing.
According to Tweets shared just this morning by Pwn20wnd, it seems that support for A8X-A11 devices on iOS 13.0-13.3 is very near to becoming a reality:
Ever since the unc0ver jailbreak picked up support for iOS 13.0-13.3 on A12(X)-A13 devices with the help of Brandon Azad’s oob_timestamp exploit, Pwn20wnd has been releasing bug fix updates on a regular basis to address some of the issues reported by users. Today is no different.
Shared in a a series of Tweets this afternoon, Pwn20wnd announced the launch of unc0ver versions v4.1.0 and 4.1.1, with the latter being the newest:
Those who’ve been keeping close tabs on the jailbreak community as of late should be keenly aware of Brandon Azad’s oob_timestamp exploit, which made iOS 13.0-13.3 support for A12(X)-A13 devices via the unc0ver jailbreak possible. As wonderful as it is, the oob_timestamp exploit isn’t without its shortcomings, such as memory leaks.
Given the aforementioned circumstances, a series of Tweets shared early this morning by renowned hacker Jake James may be considered great news for the jailbreak community:
The unc0ver jailbreak only just picked up official support for iOS 13.0-13.3 on A12(X)-A13 devices this past weekend. Given just how young the new support is, it’s not overly surprising to learn that there were some bugs that needed to squashed.
In a Tweet shared just this afternoon, Pwn20wnd announced the release of an updated version of the unc0ver jailbreak dubbed version 4.0.3 with important bug fixes:
The unc0ver jailbreak received official support for iOS 13.0-13.3 on A12(X)-A13 devices over the weekend thanks to Brandon Azad's OOB Timestamp tfp0 exploit, but from what we can gather, the release wasn’t without its initial flaws as a plethora of users reported issues when trying to jailbreak versions of iOS older than that of 13.3.
Fortunately for those affected by the aforementioned issues, Pwn20wnd has released yet another update for unc0ver to address them, this time bringing the jailbreak tool up to version 4.0.2. The hacker announced the update via Twitter just this afternoon:
Those who’ve keenly waited for the unc0ver jailbreak to officially support A12-A13 devices running iOS 13.0-13.3 devices by way of Brandon Azad’s oob_timestamp tfp0 exploit will be happy to know that the wait is finally over.
In a Tweet shared just this afternoon, project lead developer Pwn20wnd launched unc0ver v4.0.0 with support for the aforementioned device types and firmware versions:
Pwn20wnd issued a build of the updated unc0ver jailbreak tool with support for Brandon Azad’s oob_timestamp tfp0 exploit on A12(X)-A13 running iOS 13.0-13.3 to internal beta testers earlier this week. While many anticipated a public beta launch shortly after all the positive comments shared by internal beta testers, a bug was later discovered that delayed any sort of public release.
Fortunately for those waiting to use the new unc0ver on their compatible device(s), patience is almost certainly a virtue. In a Tweet shared Friday evening by Pwn20wnd, we learn how the pesky bug that delayed the initial public release of the renewed unc0ver jailbreak tool had been resolved:
Apple must’ve caught wind about Pwn20wnd’s fast-paced progress on updated the unc0ver jailbreak for iOS 13.0-13.3. Not even a few hours after internal beta testers hyped the project on Twitter with the #unc0ver hashtag, Apple officially closed the signing window for iOS 13.3 to prevent downgrades from iOS 13.3.1.
Apple’s swift blow to iOS downgrading on Wednesday was somewhat out of character for the company because it transpired much earlier in the day than usual. While Apple regularly unsigns older firmware, the abruptness of iOS 13.3’s unsigning after Pwn20wnd’s slurry of announcements regarding unc0ver suggests that Apple intended to contain the jailbreak situation before it could reach the masses.
Hot off the heels of a plethora of teasers that have been shared over the course of the past couple of weeks, Pwn20wnd has officially commenced an internal beta testing phase for the unc0ver jailbreak with iOS 13.0-13.3 support on A12(X)-A13 as of Wednesday afternoon – a feat made possible with Brandon Azad’s oob_timestamp tfp0 exploit.
The news surfaced by way of Pwn20wnd’s official Twitter account, which earlier this morning noted that unc0ver would soon move into the internal testing phase. A few short hours later, internal testing officially began:
There’s been a ton of hype recently regarding Pwn20wnd updating the unc0ver jailbreak with official support for iOS 13.0-13.3 on A12(X)-A13 devices as of late, a feat only possible with Brandon Azad’s new oob_timestamp tfp0 exploit. But just how far along has the tool’s development come? A good question, and presumably one that has already been answered.
According to a series of Tweets shared by Pwn20wnd Tuesday afternoon, it would seem that tweak injection has been updated to work flawlessly on A13 devices (it was already working on A12[X]):
There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.
Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support: