Software

Chimera jailbreak for iOS 12 updated to version 1.6.0 with an extensive change log

Chimera Banner Image.

The Chimera Team released an unexpected update for its iOS 12-centric Chimera jailbreak tool this Christmas eve, officially bringing it up to version 1.6.0.

Chimera Team lead developer CoolStar announced the latest Chimera update via the official Sileo / Odyssey / Chimera Discord channel late last night, being sure to include an extensive list of changes present in the updated release.

iOS 11-based Electra jailbreak updated to v2.0 with improved bootstrap, tweak injection, & more

Earlier in the month, Chimera Team lead developer CoolStar announced a fresh version of the iOS 12-centric Chimera jailbreak tool with support for the Procursus bootstrap, libhooker tweak injection, and a whole host of back-ported improvements that derived from the newer Odyssey jailbreak. Now, it seems the older iOS 12-based  Electra jailbreak tool is receiving a similar treatment.

As shared early this morning in CoolStar’s official Sileo / Odyssey / Chimera Discord server, the Electra jailbreak has been officially updated to version 2.0 with an upgraded Chimera bootstrap with libhooker tweak injection and other miscellaneous improvements:

KernBypass kernel-level jailbreak detection bypass updated to v0.0.5 with iOS 14.2 support & more

Matrix code hacked iPhone.

Earlier this year, iOS developer XsF1re garnered a substantial amount of attention from the jailbreak community after releasing the FlyJB kernel-level jailbreak detection bypassafter releasing the FlyJB kernel-level jailbreak detection bypass — a tool that was basically meant to amount to a way for jailbreakers to go undetected by App Store apps that would traditionally bar access to those with pwned handsets.

Soon after, XsF1re pulled the project, citing a loss of confidence, but later reinstated it as FlyJB X upon developing improvements to make the bypass more reliable. Still, it wasn’t without its shortcomings. Over the weekend, however, iOS developer Ichitaso updated his own kernel-level jailbreak detection bypass dubbed KernBypass (unofficial) to version 0.0.5, and from what we can gather, it just might be slightly superior.

NitoTV open-sources ‘vpnd’ project, enabling VPNs to run on jailbroken Apple TVs

About a month ago, Guardian Firewall VPN founder and CEO Will Strafach, a former member of the Chronic Dev Team, shared a particularly exciting announcement in that nitoTV (now going by @freenitoTV on Twitter) had gotten VPN connections working on the Apple TV platform for the very first time; albeit with a jailbreak.

The aforementioned jaw-dropping feat demanded tons of complicated hackery, but after lots of research, development, testing, and refinement, the project, officially dubbed “vpnd,” is now available for jailbreakers who might want to try their hand at configuring a VPN connection on their own Apple TV.

Chimera jailbreak updated to v1.5.1 with more bug fixes and improvements

Chimera Banner Image.

If you’ve been paying attention to the Odyssey Team’s Discord channel or Twitter page recently, then you’ve likely witnessed the sudden priority shift to the iOS 12-centric Chimera jailbreak – a notable departure from the team’s typical precedence, the iOS & iPadOS 13-centric Odyssey jailbreak.

The sudden attention to Chimera is no coincidence, as Chimera Team lead developer CoolStar had long envisioned back-porting the Odyssey Team’s successes with the Procursus bootstrap and libhooker tweak injection to Chimera. The team officially made it happen with Chimera v1.5 this week, and they’re out with yet another update this Wednesday evening in the form of Chimera v1.5.1:

Chimera jailbreak updated to v1.5, supports up to iOS 12.4.9 & adds Procursus bootstrap

As iOS 12-using jailbreakers might recall, the Chimera Team issued a new public beta of its Chimera jailbreak tool earlier this week with Procursus bootstrap and full libhooker tweak injection integration and a plethora of backported improvements from the iOS & iPadOS 13-centric Odyssey jailbreak tool.

Early Wednesday morning, however, the Odyssey Team took to Twitter to announce that Chimera version 1.5 had been officially released to the general public without the ‘beta’ asterisk attached to the name:

Team unc0ver announces plan to launch Substitute v2.0 with speed & performance gains

The unc0ver Team has been extraordinarily silent  despite FreeTheSandbox and ZecOps releasing a new tfp0 exploit with support for iOS & iPadOS versions 13.5.1-13.7recently , but that silence was broken this Sunday evening following a rather intriguing announcement.

The announcement, shared in a Tweet by the unc0ver Team and retweeted by unc0ver lead developer Pwn20wnd reveals exactly what the team has been working on all this time — a reworked version of Substitute:

Substrate Safe Mode updated to support jailbroken iOS 14 devices

If your jailbreak depends on Cydia Substrate for tweak injection, then now would be a good time to launch your preferred package manager and refresh your sources. This is especially the case if you’re enjoying the perks of a pwned version of iOS or iPadOS 14 by way of the resilient checkra1n jailbreak.

Upon doing so, those jailbreakers should find an updated release of Substrate Safe Mode ready to be installed, subtly dubbed version 0.9.6005.

Checkra1n jailbreak update adds Safe Mode improvements, partial HomePod support, & more

Hot off the heels of everything going on with the Odyssey jailbreak and the newly released exploit for iOS 13.5.1-13.7, the checkra1n team seemingly appeared from out of nowhere Friday evening with an unexpected update for its bootrom exploit-powered jailbreak tool, checkra1n.

The checkra1n team announced the release of the new update, dubbed version 0.12.1, via Twitter just minutes ago:

ZecOps & FreeTheSandbox release tfp0 exploit for iOS 13.5.1-13.7

As promised, following security researcher 08Tcw3BB’s much anticipated presentation at HITB CyberWeek 2020, affiliated software security firm ZecOps has officially released an exploit for iOS & iPadOS 13.5.1-13.7.

The announcement, shared this Thursday afternoon via the ZecOps Twitter account, links to a blog post on the firm’s own website that discusses the exploit, how it works via a proof of concept, and how an attacker could use it: