Hacker and unc0ver lead developer Pwn20wnd revised the unc0ver v3.0.0 pre-release again on Thursday with a slew of bug fixes and improvements. The latest version of the unc0ver v3.0.0 pre-release is now beta version 38.
Pwn20wnd announced the update via Twitter Thursday morning, noting that it would implement fixes to the v1ntex exploit, among other things:
Just under two weeks ago, hacking guru tihmstar released v1ntex, a voucher_swap-like exploit for 4K devices that contributed to iOS 11.4.x support in both the Electra and unc0ver jailbreaks. But just this morning, tihmstar released another exploit dubbed v3ntex, which allegedly supports iOS 12 devices.
Tihmstar shared his exciting announcement via Twitter Monday morning with proof of the exploit, adding that he only tested his v3ntex exploit on an iPhone 6 running iOS 12.1.2 and that it could likely still do with some improvements:
Hacker and unc0ver lead developer Pwn20wnd appears to have been busy this weekend, revising the unc0ver v3.0.0 pre-release jailbreak tool at least five more times since Saturday afternoon. Betas 22-26 include the brand-new rootfs remount that surfaced yesterday afternoon compliments of hacker and software tinkerer @MiscMisty.
Pwn20wnd took to Twitter this morning to announce the bulk of those revisions and elucidate what they represent:
It was only yesterday that hacker and unc0ver lead developer Pwn20wnd
official support for tihmstar’s
v1ntex exploit to the unc0ver v3.0.0 pre-release, but another revision
issued just this morning delivers some important v1ntex-related bug fixes and refinements.
Citing the changelog from Pwn20wnd’s official GitHub
repository, the 21st beta of the unc0ver v3.0.0 pre-release sports
the following changes:
On Thursday, the Electra Team pushed another update for the iOS 11-centric Electra jailbreak tool. The latest update, dubbed version 1.3.2, bundles both the Cydia and Sileo package managers right out of the box, a move toward gradually weaning Electra users away from Cydia as Sileo transitions into its final beta preview stages.
The Electra Team shared the news via Twitter just this afternoon, elucidating the Cydia/Sileo situation in further detail:
It was only a couple of hours ago that the Electra Team pushed two back-to-back updates for the Electra jailbreak tool, but those versions are already obsolete. The team just pushed another update to their iOS 11-centric jailbreak tool, bringing the version number up to 1.2.7.
The Electra Team announced the update earlier this evening via Twitter, elucidating how it was released to resolve a bug with tihmstar’s v1ntex exploit that would sometimes cause a kernel panic on certain devices:
The Electra Team pushed two subsequent updates to the Electra jailbreak tool Thursday evening with bug fixes and improvements, bringing the version number of iOS 11-centric tool to 1.2.6. The updates came just hours after Electra picked up support for tihmstar’s new v1ntex exploit.
The Electra Team announced the new updates via Twitter, adding that they would resolve problems users were experiencing on A7 and A8 devices concerning post-exploitation failures on iOS 11.2-11.4.1 and app crashing issues on iOS 11.4.x:
It didn’t take long after tihmstar released his voucher_swap-like v1ntex exploit with support for 4K devices, for the Electra Team to roll out an update to Electra with official support for A7[X] and A8[X] devices. Version 1.2.3 is now the latest iteration of Electra available to the public.
The Electra Team made the announcement on Twitter Thursday morning, explaining that they had replaced tihmstar’s threadm1ll exploit with the v1ntex variety for A7[X] and A8[X] devices, a move that makes Electra universally-supported among all devices running iOS 11.0-11.4.1:
Just a couple of days ago, security researcher Brandon Azad released his voucher_swap exploit for 16K devices (A9[X], A10[X], A11[X]), but the exploit didn’t support 4K devices (A7[X], A8[X]), resulting in some devices being unsupported by the recent updates to the Electra and unc0ver jailbreaks.
On a more positive note, hacking guru tihmstar seems to have a solution. Thursday morning, he Tweeted his version of the voucher_swap exploit, subtly named v1ntex. Astonishingly, the exploit supports 4K devices, whereas Brandon Azad’s exploit did not: