New exploit could seriously improve iOS 12 & 13 jailbreak reliability and speed

It’s been a bit since we talked about the Odyssey jailbreak last given how it’s for firmware that’s around 4 years old, but since quite a few people still use jailbroken devices on iOS & iPadOS 13 today, it seemed imperative to mention interesting developments that could come to the Odyssey jailbreak in the foreseeable future.

@MasterMike88 discusses the new exploit for iOS 12 and 13.

According to a series of posts shared by @MasterMike88 on X (formerly Twitter), a new and currently unnamed exploit that harnesses the same vulnerability used by the puaf_physpuppet technique from the Kernel File Descriptor (KFD) exploit strives to make some older jailbreaks better in almost every way.

From what we can gather, the new exploit was compiled by @staturnzdev and has already been used to build a modified version of the Odyssey jailbreak for iPhones and iPads running iOS & iPadOS 13.0-13.7.

Staturz shows off speedy new iOS 12 and 13 exploit.

It’s also worth noting that the exploit may also be viable on certain versions of iOS 12, which means it could potentially be used to craft a modified version of the Chimera jailbreak for iOS 12.0-12.5.7 as well.

The unnamed exploit won’t benefit iOS & iPadOS 14 or anything newer since tfp0 is no longer viable on these firmware versions.

So what’s the point of all this? According to @MasterMike88, the new exploit brings near-100% reliability and lightning-fast 100-millisecond exploit execution to the table. This means that users could go from non-jailbroken to jailbroken faster than ever before.

An updated build of the Odyssey jailbreak that uses the new exploit isn’t yet available for public consumption, and there isn’t even an ETA for when that might happen. Still, it’s great to see these improvements because older exploits aren’t always 100% reliable and may take multiple tries to get jailbroken.

Are you excited to see this fine-tuning of older popular jailbreak tools? Let us know your thoughts in the comments section down below.