.Good news for all the jailbreak enthusiasts! Luca Todesco, famous hacker and checkra1n jailbreak member, announced on Twitter a working full exploit and PAC (Pointer Authentication Codes) bypass for iOS devices’ running on iOS 14.0.1 and iPadOS 14.0.1. If you are wondering what are PAC, they were introduced on A12 devices to prevent Return-Oriented-Programming and Jump-Oriented-Programming.
Check out how to Jailbreak Your iPhone [Checkra1n] with Android Phone.
Initially, Luca Todesco, as per his admission, accidentally spotted a local privilege escalation bug. After that, it took him only three days to come forward with a working full exploit with PAC bypass. As of now it is unclear, whether or not Lucas will release the exploit for other jailbreak tools like UnC0ver and Odyssey.
Contents
Full Exploit & PAC Bypass for iOS 14.0.1
As of now, the iOS and iPadOS 14 devices that can be jailbroken must be running on A9 or A9X processors. Good news is that in the screenshot shared by Lucas Todesco on Twitter, he uses an iOS device running on A13 chip with latest iOS 14.0.1. Currently, the Apple devices running on A13 chip are iPhone 11, 11 Pro, 11 Pro Max, and the new iPhone SE. So, this can be hailed as a good beginning for the development of a full-fledged jailbreak for iOS 14.
Check out Ra1nbox – Portable Checkra1n Jailbreak – No PC.
Is there a possibility of iOS 14 Jailbreak with this exploit?
There are no clear indications from Lucas Todesco as to what he plans to do with the exploit. He can release the exploit for other jailbreak teams to include in their code. Else, he can develop a new jailbreak tool specifically for iOS 14. Whatever the case might be, this new exploit has heightened the optimism of the jailbreak community. Stay tuned with us for more updates on iOS 14.0.1 jailbreak.
Check out the following interesting posts as well:
- CumBox – Turn Your Raspberry Pi into a Checkra1n Jailbreak Dongle.
- 18 Best Cydia Alternatives (Download) – No Jailbreak Required.