Software

Sileo port for checkra1n discontinued, future update could Frankenstein the checkra1n bootstrap

At the end of 2019, the Sileo Team launched a botched tool that could be used to port the Sileo package manager onto the bootrom exploit-based checkra1n jailbreak. The launch wasn’t as seamless as some would have hoped, lacking synergy with the official checkra1n installer app. Moreover, it uninstalled Cydia and checkra1n resources in place of Sileo and its own dependencies with seemingly no obvious way of reverting.

Those who’ve been following the progress of Sileo for checkra1n closely may have noticed a peculiar Tweet by way of the Sileo Team’s official Twitter account early Thursday morning:

Pwn20wnd says unc0ver could support iOS 13.0-13.3 on A12(X)-A13 devices

There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.

Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support:

Pwn20wnd touts notable progress on iOS 13.3 support in unc0ver jailbreak

If you’re avidly following the latest developments in the jailbreak community as of late, then you might be excited to learn that hacker and unc0ver lead developer Pwn20wnd has made swift and substantial progress on implementing Brandon Azad’s newly-released oob_timestamp tfp0 exploit for iOS 13.3 into the unc0ver jailbreak.

Throughout the past hour, Pwn20wnd has shared a plethora of status updates regarding his progress. Perhaps one of Pwn20wnd’s most notable Tweets was that he had successfully bypassed the mitigations in place by Apple to trump his codesigning bypass, which is claimed to be “the biggest part of the jailbreak on A12(X),” and apparently, on A13 too:

Complications and progress as Pwn20wnd tests the new oob_timestamp exploit

The release of Brandon Azad’s oob_timestamp exploit yesterday afternoon meant that Pwn20wnd could finally get to work on adopting support for the unc0ver jailbreak. On the other hand, a plethora of Tweets shared early Saturday morning suggest that doing so could be a lot more work than initially thought.

While Pwn20wnd has every intention of updating the unc0ver jailbreak to support iOS 13.3 on A12(X)-A13 as planned, it seems that the biggest complication would be the impractical amount of work needed to support each and every individual firmware version between iOS 13.0 and 13.3 on each and every device type:

Brandon Azad officially releases OOB Timestamp exploit for iOS 13.0-13.3

Several days ago, hacker and iOS security researcher Brandon Azad took the jailbreak community by storm when he said he would soon be releasing a new kernel exploit proof-of-concept targeting the iPhone 11 on iOS 13.3. It didn’t take long after that for unc0ver jailbreak lead developer Pwn20wnd to add that unc0ver would likely receive an update incorporating the new exploit.

The teasers have awakened a brand-new audience in the jailbreak community, namely those handling Apple’s latest handsets like the iPhone 11 and variants of the iPhone 11 Pro. But all that hype aside, Azad officially released his new kernel exploit proof of concept Friday afternoon, and he’s calling it OOB Timestamp:

Checkra1n team launches PongoKit for checkm8-vulnerable iOS devices

The checkra1n team is best known for their checkm8 bootrom exploit-based checkra1n jailbreak tool, which just yesterday picked up support for Linux after being macOS-only for several months. We’ve known for quite some time that the checkra1n team intended to delve into more than just jailbreaking with the checkm8 bootrom exploit, and the fruits of such research are finally starting to surface.

The checkra1n team took to Twitter early Thursday morning to announce the initial release of PongoKit, a highly experimental and developer-only SDK that should help permit the deployment of other platforms on checkm8 vulnerable iOS devices:

Pwn20wnd reveals plan to update unc0ver for iOS 13.0-13.3 with Brandon Azad’s exploit

If you’ve been following along with trends in the jailbreak community recently, then you’ve undoubtedly caught wind of hacker and security researcher Brandon Azad’s plans to release a tfp0 exploit proof-of-concept targeting the iPhone 11 on iOS 13.3.

The news, announced just yesterday, has good implications for jailbreaking. It means that jailbreaks could potentially be devised for devices running iOS 13.3, perhaps even other handsets of the A13 variety. But who will make them?

Brandon Azad plans to release a new exploit for iPhone 11 on iOS 13.3

Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?

Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3:

Fugu: An early concept open source jailbreak project based on checkm8

Matrix code hacked iPhone.

Checkra1n has long enjoyed its prestigious status of being the first and only jailbreak tool to take advantage of the checkm8 bootrom exploit, but could that change in the near future?

A curious new posting shared just this evening on /r/jailbreak appears to detail a new jailbreak tool dubbed Fugu that is being dubbed the “first open-source jailbreak tool based on the checkm8 exploit” by its creator Linus Henze. This eye-popping development certainly grabbed our attention, but a closer look at the project's GitHub page reveals the fine print:

Hacker teases successful jailbreak on third iOS 13.3.1 beta

It’s no secret that the checkra1n jailbreak tool the jailbreak community by storm. But despite being unfixable by Apple, it’s still always comforting to see a newfangled jailbreak demonstration, especially when it happens on Apple’s latest firmware and when checkra1n isn’t the method of pwnage.

A Tweet with an embedded video demonstration shared Monday afternoon by Twitter user @08Tc3wBB appears to demonstrate an iPhone X on iOS 13.3.1 beta 3 being jailbroken with the assistance of an unknown side-loaded jailbreak app.