After much anticipation, the Dopamine jailbreak tool by Lars Fröder (@opa334) for arm64e devices running iOS & iPadOS 15.0-15.4.1 (previously known as Fugu15 Max) was officially released to the masses Tuesday evening.
After much anticipation, the Dopamine jailbreak tool by Lars Fröder (@opa334) for arm64e devices running iOS & iPadOS 15.0-15.4.1 (previously known as Fugu15 Max) was officially released to the masses Tuesday evening.
Just yesterday, Linus Henze published a proof of concept (PoC) demonstrating kernel bug CVE-2023-28206, which Apple patched in iOS & iPadOS 16.4.1 because it could purportedly grant arbitrary code execution by an app on an affected device.
If you’ve been patiently waiting for a jailbreak on iOS & iPadOS 15.0-15.4.1 that wasn’t only intended for developers, then you might be in for a treat very soon.
If you’re one to stay on the lowest possible firmware and avoid software updates because you’re hopeful that a jailbreak could eventually come for your iPhone or iPad, then you’ve proven your wisdom. But that won’t stop a badge from appearing on your Settings app at some point after your device learns that it has a pending software update.
If you’ve been paying any attention to the jailbreak community lately, then you’d be pretty hard-pressed to have never heard of palera1n. It's a pretty big deal these days.
Once upon a time, iOS developer Lars Fröder, or more colloquially known by the jailbreak community as @opa334 on Twitter, released a revolutionary app called TrollStore.
The MacDirtyCow bug, also known as CVE-2022-46689, has opened Pandora’s box for Apple on iOS & iPadOS 15.x-16.1.2 because it allows people to make system customizations on their non-jailbroken iPhones and iPads that they technically shouldn’t be allowed to make. It all works by sideloading a special app that exploits this bug.
By now you’ve probably heard about the MacDirtyCow bug for iOS & iPadOS 16.0-16.1.2. Shortly after Google Project Zero security researcher Ian Beer reported CVE-2022-46689 to Apple late last year, security researcher Zhowei Zhang created a rough draft of a bug that developers now actively exploit to make operating system modifications that ordinarily wouldn’t be possible without jailbreaking.
Developers are making great use of the MacDirtyCow bug present on iOS & iPadOS 15.x-16.1.2 devices, which allows sideloaded or perma-signed apps to perform tasks that would typically only be possible with a jailbreak.
Those searching for the next interesting way to customize their iPhone may enjoy the new TrollLock Reborn add-on based on the MacDirtyCow hack by iOS developers @haxi0sm and @dedbeddedbed.
Apple’s iCloud Activation Lock feature prevents unauthorized users from acquiring your device, restoring it as new, and using it as their own. Unfortunately, users can be locked out of their own device by this feature after forgetting a password or buying an iCloud locked device from the internet.
The palera1n team this week released version 1.4.1 of its checkm8 bootrom exploit-based jailbreak tool for A9-A11 chip-equipped handsets running iOS or iPadOS 15.0-16.x, all while one team member demonstrated the tool’s upcoming and previously-teased GUI (graphical user interface).