CoolStar teases jailbreak untether after achieving arbitrary code execution post-reboot

Untethered jailbreaks are something of a rarity these days, with most modern jailbreaks being either semi-tethered or semi-untethered variants instead. But a teaser by security researcher Linus Henze just one week ago manifested at least some hope that the community could witness one again soon, at least for the likes of iOS & iPadOS 14.5.1 and below.

And speaking of untethered jailbreaks, Odyssey Team lead developer CoolStar announced via the Sileo / Taurine / Odyssey Discord channel Monday evening that they had successfully achieved arbitrary code execution in a native iOS/iPadOS application after conducting a full reboot of the device. This is, of course, the hallmark feature of an untethered jailbreak.

Linus Henze demos untethered jailbreak on iPhone 12 Pro Max with iOS 14.5.1

For the past several years, the overwhelming majority of jailbreaks have been semi-untethered, meaning that you could still use a handset hacked liberated by said tools after a reboot, albeit in a non-jailbroken state.

The lack of untethered jailbreaks — or those that remain fully jailbroken following a reboot — has been a pain point for jailbreakers for as long as anyone can remember. For that reason, a Tweet shared by @LinusHenze Monday afternoon might be of particular interest…

Pangu Team demos working iOS 14 jailbreak at Mosec 2020

Apple’s upcoming iOS & iPadOS 14 software updates aren’t slated to be released until sometime this Fall, but that hasn’t stopped prominent jailbreak community hackers from getting their hands dirty with the developer pre-releases and working their usual magic.

The first example of an iOS 14 jailbreak was shared by the checkra1n team mere days after Apple teased the update at WWDC 2020, but this was expected as checkra1n utilizes a hardware-based bootrom exploit that can’t be patched with a software update. Early this morning, however, the Pangu Team took the stage at Mosec 2020 to demonstrate a working jailbreak of their own on the iOS 14 platform.

Understanding untethered, semi-untethered, semi-tethered, and tethered jailbreaks

If you’ve been poking around in the jailbreak community for as long as I have, then you’ve undoubtedly witnessed a plethora of different jailbreak types. Among the most popular in this community are untethered, semi-untethered, semi-tethered, and tethered, each of which exhibit different attributes that every jailbreaker should be aware of.

We understand that some are new to jailbreaking, but even those who’ve been around as long as I have might have some confusion between the different types. For this reason, we’ve compiled a quick guide to help everyone understand what each of these different jailbreaks are and how they behave.

Jake Blair demos ‘spicy’ untethered jailbreak for iOS 11.x, provides no ETA

While there’s been a lot of news encompassing progress on the iOS 12 jailbreak as of late, that hasn’t hindered third-party iOS 11-centric projects from making historic progress. One of the latest involves an untethered jailbreak for handsets running iOS 11.x.

Indeed, while it might seem too good to be true at first glance, iOS developer Jake Blair Tweeted a demonstration video from YouTube Monday afternoon showcasing his “spicy” untethered jailbreak on what appears to be an unknown iteration of iPad mini:

Hacker demos untethered jailbreak running on iPhone 5 with iOS 10.2.1

The jailbreak community has been anything but quiet lately. We’ve seen things ranging from jailbreaking the new flagship iPhone XS Max, to updating untethered bootrom exploits for the legacy iPhone 3GS, to releasing a new jailbreak tool for firmware 1.1 on the original iPod touch; and now, something else of interest has surfaced.

In a curious video shared by YouTube user doras2 over the weekend, we discern what appears to be a fully-untethered jailbreak running on a 32-bit iPhone 5 handset with iOS 10.2.1 installed on it: