TotallyNotSpyware v2 is a new re-jailbreaking utility for iOS 12 devices initially jailbroken via Chimera

If you still have an iOS 12 device laying around that you keep jailbroken with the now legacy Chimera jailbreak, then you might be interested in a newly released project called TotallyNotSpyware v2.

TotallyNotSpyware v2

In a post shared to social media platform 𝕏 (formerly Twitter) over the weekend, iOS developer wh1te4ever announced the release of a re-jailbreak utility that harnesses the power of a WebKit exploit for this process for devices that were initially jailbroken with Chimera on iOS 12.

Citing the project’s GitHub page, where the source code is available to anyone who wants to learn from it, TotallyNotSpyware v2 supports handsets equipped with A7, A8, A9, and A10 chips that run iOS versions 12.0-12.5.x.

The one caveat to TotallyNotSpyware v2 is that it isn’t a jailbreak in and of itself, so you will need to have jailbroken your iOS 12 device with Chimera at least once before using it. One you have, you can use this WebKit-based re-jailbreaking utility on your device instead of running the Chimera jailbreak again after a reboot when your device re-enters a jailed state.

For those wondering why this is required, the answer is simple: Chimera is a semi-untethered jailbreak, so while the jailbreak app remains on your device for as long as your sideloading software can keep it signed, you need to re-run the jailbreak after every reboot to return into a jailbroken state.

TotallyNotSpyware v2 is simply another method to get back into a jailbroken state, and it’s arguably more convenient than using Chimera for this process since you must constantly re-sign the Chimera jailbreak app, while TotallyNotSpyware v2 is accessible from any mobile web browser like Safari on a supported device without any signed apps required.

The developer noted in a separate X post that they’ve tested TotallyNotSpyware v2 on iOS 12.0.1, 12.1.1, 12.1.4, 12.3.1, 12.4.1, and 12.4.2 on iPhone 6s, iOS 12.5.7 on iPhone 5s, and iOS 12.2 on iPad Air (1st generation). They also warned that multiple attempts may be required to successfully trigger the WebKit exploit, as it’s not 100% reliable.

For those who want to give it a try, the 𝕏 post that we linked above has the live link to the website you need to access the WebKit exploit and re-jailbreak your initially Chimera-jailbroken device.

Are you going to be giving TotallyNotSpyware v2 a try? Let us know why or why not in the comments section down below.