There’s a new jailbreak tool in town, but before you jump to any conclusions and run to grab that dusty iOS or iPadOS 15 device you’ve been hanging onto, let’s just clear the air really quick – the tool in question is only intended for 32-bit iOS 9 devices.
Exploit
Linus Henze to demo ‘Fugu15’ on iOS 15.4.1 at the Objective by the Sea conference this October
There’s been a lot of doom and gloom in the jailbreak community lately given the challenges associated with jailbreaking iOS & iPadOS 15. In fact, even Odyssey Team lead developer CoolStar has been on record discussing how iOS & iPadOS 15.1.1 would likely be the last firmware they develop a jailbreak for because of how much more difficult Apple appears to be making things.
Odyssey Team previews upcoming Cheyote jailbreak for iOS & iPadOS 15.0-15.1.1
The Odyssey Team’s upcoming iOS & iPadOS 15.0-15.1.1 jailbreak is well underway, and as a token of excitement this Sunday afternoon, the team took to Twitter to show off the interface of said jailbreak, which appears as if it will be going by the name of Cheyote.
iosrouter pushes a modified build of the current unc0ver jailbreak app with permanent signing capabilities
You may recall earlier this week when we showed you a modified version of the unc0ver jailbreak app provided by iOS developer ichitaso with integrated permanent signing capabilities made possible by a new PoC by security researcher Zhuowei Zhang.
CoolStar posts another status update on iOS 15 jailbreak progress
The Odyssey Team’s upcoming iOS & iPadOS 15.0-15.1.1 jailbreak, albeit rootless, is perhaps one of the community’s most sought-after releases in 2022. Well into the Month of July of 2022, many are wondering where the Odyssey Team is at with the release. Fortunately, lead developer CoolStar took to the Sileo / Taurine / Odyssey Discord channel Monday evening to share a status update.
Ichitaso bakes Zhuowei Zhang’s permanent signing PoC into modified version of unc0ver jailbreak app (for iOS 14.0-14.3 only)
The powerful PoC released just a couple of weeks ago by security researcher Zhuowei Zhang took many by surprise after it was found to grant permanent signing for sideloaded apps.
Nick Chan demos & releases PoC for iOS 14.x untether with unsandboxed code execution as root
Following an absolutely bonkers 4th of July weekend for Taurine users thanks to a new trick for keeping the Taurine jailbreak app signed indefinitely, it seems like things only appeared to get more interesting thanks to some additional research by Twitter user Nick Chan (@riscv64).
Zhuowei Zhang shares powerful PoC that allows indefinite app signing on iOS 14.0-15.4
Apart from the checkra1n jailbreak, just about all of the jailbreak tools released in recent memory come in the form of a sideloadable app, which needs to be signed using your free or paid Apple Developer account or a third-party signing service.
CoolStar teases Sileo running on iOS 15.1 via tihmstar’s private checkm8-based jailbreak
The wait continues for an iOS & iPadOS 15 jailbreak, but fortunately, Odyssey Team lead developer CoolStar took to Twitter late last night with a particularly thought-provoking Tweet that may raise hope levels for those waiting.
Project Zero security researcher Ned Williamson teases kernel vulnerability in iOS & iPadOS 15.4.1 and older
Google Project Zero security researcher Ned Williamson took to Twitter Wednesday afternoon to share details on what appears to be a new kernel-level vulnerability proof-of-concept (PoC) for a recent version of iOS & iPadOS.
New ‘openpwnage’ jailbreak released for iOS 9.x on 32-bit devices, currently in beta
While many are waiting for a jailbreak for the newest hardware and software combinations available today, we’ve witnessed an uptick in the number of legacy jailbreaks for older device and firmware combinations over the past several months.
CoolStar juggles possibility of using Åkerblom’s kernel exploit to support up to iOS 14.8.1 via Taurine jailbreak
Security researcher John Åkerblom took everyone by surprise in April after releasing a kernel exploit for iOS & iPadOS 15.0-15.1.1. Setting this exploit apart from the one initially released by b1n4r1b01 was how it could be adapted to support the latest versions of iOS & iPadOS 14, up to and including 14.8.1.