unc0ver

Stay up-to-date with the latest news and releases of unc0ver, a semi-untethered jailbreak for all devices that support iOS and iPadOS 11.0 to 14.3.

Latest unc0ver build seeded to internal testers fixes bug that delayed public release

Pwn20wnd issued a build of the updated unc0ver jailbreak tool with support for Brandon Azad’s oob_timestamp tfp0 exploit on A12(X)-A13 running iOS 13.0-13.3 to internal beta testers earlier this week. While many anticipated a public beta launch shortly after all the positive comments shared by internal beta testers, a bug was later discovered that delayed any sort of public release.

Fortunately for those waiting to use the new unc0ver on their compatible device(s), patience is almost certainly a virtue. In a Tweet shared Friday evening by Pwn20wnd, we learn how the pesky bug that delayed the initial public release of the renewed unc0ver jailbreak tool had been resolved:

Critical bug fix for Substrate Safe Mode released for checkra1n and unc0ver users

If you’re using a modern jailbreak that uses Cydia Substrate as its primary means of tweak injection, be it checkra1n or unc0ver, then today might be a good time to fire up your preferred package manager and refresh your sources.

Substrate Safe Mode appears to have been updated to version 0.9.6003 with a critical bug fix. The checkra1n team shared the announcement in a Tweet delivered early Friday morning:

Planning to use unc0ver to pwn your iOS 13.0-13.3 A12(X)-A13 device? Get AltStore now

The unc0ver jailbreak is so close to publicly supporting iOS 13.0-13.3 on A12(X)-A13 that we can almost taste it. Support for Brandon Azad’s new oob_timestamp exploit was pushed into internal beta testing yesterday afternoon, and according to Pwn20wnd, unc0ver could be publicly available in the next 24 hours or so if everything goes smoothly.

Assuming you managed to downgrade to iOS 13.3 from iOS 13.3.1 before Apple stopped signing it yesterday or already had some version of iOS 13 installed between 13.0-13.3, you’re probably wondering what you can do to prepare your jailbreakable handset. If that’s the case, then we’d advise setting up AltStore on your Mac or PC.

Apple stops signing iOS 13.3 as updated unc0ver jailbreak nears public release

Apple must’ve caught wind about Pwn20wnd’s fast-paced progress on updated the unc0ver jailbreak for iOS 13.0-13.3. Not even a few hours after internal beta testers hyped the project on Twitter with the #unc0ver hashtag, Apple officially closed the signing window for iOS 13.3 to prevent downgrades from iOS 13.3.1.

Apple’s swift blow to iOS downgrading on Wednesday was somewhat out of character for the company because it transpired much earlier in the day than usual. While Apple regularly unsigns older firmware, the abruptness of iOS 13.3’s unsigning after Pwn20wnd’s slurry of announcements regarding unc0ver suggests that Apple intended to contain the jailbreak situation before it could reach the masses.

Unc0ver enters internal testing with support for A12(X)-A13 running iOS 13.0-13.3

Hot off the heels of a plethora of teasers that have been shared over the course of the past couple of weeks, Pwn20wnd has officially commenced an internal beta testing phase for the unc0ver jailbreak with iOS 13.0-13.3 support on A12(X)-A13 as of Wednesday afternoon – a feat made possible with Brandon Azad’s oob_timestamp tfp0 exploit.

The news surfaced by way of Pwn20wnd’s official Twitter account, which earlier this morning noted that unc0ver would soon move into the internal testing phase. A few short hours later, internal testing officially began:

Pwn20wnd says unc0ver could support iOS 13.0-13.3 on A12(X)-A13 devices

There's been no shortage of news updates and teasers from team unc0ver as Pwn20wnd works ever-so-carefully to integrate Brandon Azad’s oob_timestamp tfp0 exploit into the jailbreak tool. But while some of his Tweets have been more optimistic than others, one of those shared this Sunday afternoon is particularly exciting for those waiting for support on A12(X)-A13 devices.

Initially, Pwn20wnd had planned to support all versions of iOS 13.0-13.3 for all affected devices, but that tone changed on Saturday when the unc0ver lead developer noted that this wouldn’t be practical given all the work that it would necessitate and the fact that checkra1n already supports the bulk of those devices. Fortunately, those sporting A12(X)-A13 devices may still be able to look forward to such support:

Pwn20wnd touts notable progress on iOS 13.3 support in unc0ver jailbreak

If you’re avidly following the latest developments in the jailbreak community as of late, then you might be excited to learn that hacker and unc0ver lead developer Pwn20wnd has made swift and substantial progress on implementing Brandon Azad’s newly-released oob_timestamp tfp0 exploit for iOS 13.3 into the unc0ver jailbreak.

Throughout the past hour, Pwn20wnd has shared a plethora of status updates regarding his progress. Perhaps one of Pwn20wnd’s most notable Tweets was that he had successfully bypassed the mitigations in place by Apple to trump his codesigning bypass, which is claimed to be “the biggest part of the jailbreak on A12(X),” and apparently, on A13 too:

Complications and progress as Pwn20wnd tests the new oob_timestamp exploit

The release of Brandon Azad’s oob_timestamp exploit yesterday afternoon meant that Pwn20wnd could finally get to work on adopting support for the unc0ver jailbreak. On the other hand, a plethora of Tweets shared early Saturday morning suggest that doing so could be a lot more work than initially thought.

While Pwn20wnd has every intention of updating the unc0ver jailbreak to support iOS 13.3 on A12(X)-A13 as planned, it seems that the biggest complication would be the impractical amount of work needed to support each and every individual firmware version between iOS 13.0 and 13.3 on each and every device type:

Brandon Azad officially releases OOB Timestamp exploit for iOS 13.0-13.3

Several days ago, hacker and iOS security researcher Brandon Azad took the jailbreak community by storm when he said he would soon be releasing a new kernel exploit proof-of-concept targeting the iPhone 11 on iOS 13.3. It didn’t take long after that for unc0ver jailbreak lead developer Pwn20wnd to add that unc0ver would likely receive an update incorporating the new exploit.

The teasers have awakened a brand-new audience in the jailbreak community, namely those handling Apple’s latest handsets like the iPhone 11 and variants of the iPhone 11 Pro. But all that hype aside, Azad officially released his new kernel exploit proof of concept Friday afternoon, and he’s calling it OOB Timestamp:

Pwn20wnd touts progress on PAC-less tweak injection on iOS 13

If you’ve been following the jailbreak community as of late, then you’ve undoubtedly caught wind of Pwn20wnd’s plethora of recent announcements regarding the potential synergy between the unc0ver jailbreak tool and Brandon Azad’s yet-to-be-released tfp0 exploit.

Azad’s exploit was initially revealed to work on the iPhone 11 running iOS 13.3, and according to Pwn20wnd, it should also be viable on A12(X) devices and with all firmware versions between iOS 13.0-13.3. At the same time, Pwn20wnd cited three notable hurdles that would need to be dealt with if tweak injection was to work in the PAC-less implementation on iOS 13 via unc0ver.

Last chance to downgrade to iOS 13.3 on A12/A13 for potential jailbreak eligibility

The news that hacker and iOS security researcher Brandon Azad would be releasing a tfp0 exploit POC for the iPhone 11 on iOS 13.3 took the jailbreak community by storm, and it didn’t take long before unc0ver lead developer Pwn20wnd responded with plans to update unc0ver when it gets released.

Many questions have been circulating about whether this exploit would work on older devices or whether it would support older versions of iOS. Fortunately, Pwn20wnd has taken to Twitter to answer many of these questions and to prepare the jailbreak community for great things to come.

Pwn20wnd reveals plan to update unc0ver for iOS 13.0-13.3 with Brandon Azad’s exploit

If you’ve been following along with trends in the jailbreak community recently, then you’ve undoubtedly caught wind of hacker and security researcher Brandon Azad’s plans to release a tfp0 exploit proof-of-concept targeting the iPhone 11 on iOS 13.3.

The news, announced just yesterday, has good implications for jailbreaking. It means that jailbreaks could potentially be devised for devices running iOS 13.3, perhaps even other handsets of the A13 variety. But who will make them?