Just yesterday, talented security researcher and iPhone hacker iBSparkes teased what appeared to be Saurik’s Cydia package manager running on an iPhone SE with iOS 12.4 installed on it, which was a particularly noteworthy feat given that all public jailbreak tools at the time of this writing only support up to iOS 12.1.2.
The teaser raised several questions, such as whether iBSparkes’ latest exploit would also support Apple’s upcoming iOS 13 software update. Fortunately, we might now have an answer to that question, as iBSparkes shared another teaser just this morning of Cydia running on an iPhone 8 (iPhone 10,4) running the first iOS 13 beta:
Each of the latest jailbreak solutions, be it the Electra Team’s Chimera tool or Pwn20wnd’s unc0ver tool, only support iOS versions 12.0-12.1.2. That said, a teaser shared just this morning by talented security researcher iBSparkes tends to be particularly exciting.
In the Tweet, iBSparkes shares a screenshot of what appears to be the all-too-familiar Cydia package manager running on an iPhone SE (iPhone 8,4) with the iOS 12.4 beta installed:
It was only two weeks ago that security research @iBSparkes shared
an iOS 11.0-12.1.2 exploit dubbed machswap with the general public, and
just a few days later, hacker and unc0ver lead developer Pwn20wnd integrated
the new exploit into his unc0ver jailbreak tool for A7-A9(X) devices
running iOS 11.0-12.1.2. Fortunately, the fun isn’t stopping there.
As it would seem, @iBSparkes has been working on a newer exploit dubbed machswap2, which works in similar ways and supports A7-A12(X) devices running iOS 11.0-12.1.2. Perhaps more importantly, Pwn20wnd got it working with unc0ver, which means the jailbreak tool will soon support both the machswap or machswap2 exploits:
PsychoTea’s new machswap kernel exploit for A7-A11 devices running iOS 11.0-12.1.2 has been recognized as a seriously fast and reliable exploit for modern jailbreak tools. In fact, it’s much smoother than some of those that are already being used, such as v3ntex by tihmstar.
A Tweet shared over the weekend by hacker and unc0ver lead developer Pwn20wnd appears to praise the machswap exploit, and furthermore reveals that the hacker is actively implementing it into the unc0ver jailbreak tool:
In case you missed it, renowned hacker PsychoTea released a noteworthy kernel exploit called machswap for A7-A9 devices running iOS 11.0-12.1.2 on Friday. But rather than slamming on the brakes at the realization of his new exploit, the hacker instead went for the accelerator pedal; consequently, we now have a new and improved exploit that seems viable for jailbreaking.
In a Tweet shared just this weekend, we learn that the machswap exploit has picked up official support for A10-A11 devices in addition to those A7-A9 devices that were previously supported. That said, the machswap exploit is now viable for most devices that can run iOS 12: