![]() While checkm8 is a powerful BootROM exploit, it does not affect the SEP. For instance, if you boot an iPhone in DFU mode and the SEP (Secure Enclave Processor) gets a request to decrypt user data, it causes a kernel panic. ![]() ![]() The reason being that Apple uses a new mitigation technique in SEPOS on devices with the A10 chip and above. On the other hand, iPhone models with the A11 Bionic chip – iPhone 8, 8 Plus, and X – will be addressed in a future update. Nevertheless, the developer team is working on adding support for iPhone 7, 7 plus, and other devices. Only iPhone and iPad models with the A9/A9X chip are compatible at the moment. However, support for newer devices seems to be limited at the moment. The latest build brings support for iOS 14.0 as well as tvOS 14.0. It is developed by Luca Todesco and the rest of the Kim Jong Cracks team. Based on the infamous checkm8 exploit, checkra1n is a semi-tethered jailbreak tool designed for iOS 14.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |