In today's video I created for you the patch some of you have been asking me to create, the iPhone 10.1 Beta 1 Setup.app Patch for iPhone 6 CFW iCloud Bypass. In this video I also disassemble the patched app and show you exactly how you can do it yourself. Of course, takes some knowledge but you can find what you need on my channel if you want to start iOS Reverse Engineering.
iOS 10.x made ROOT FS access possible on iPhone 6 because the DMG files are NO LONGER ENCRYPTED with AES keys which means that everybody can browse through the files and copy the original, put them in the disassembler, find the desired function to patch and patch it. I think we should thank Apple for that.
Although iOS 10.x has unencrypted KernelCache on all supported devices, iPhone 7 and 7 Plus (including the Jet Black iPhone 7) have a strange kernel. See, the file appear to be encrypted in some way, but it is not. Actually, they changed the compression container format making it unusual for the existing tools, but it is not encrypted (in the way it used to be back on 9.x).
iPhone 6's Kernel is unencrypted and can be handled by most of iOS kernel tools published like Joker if you are interested in taking a look.
If you want to see the features of iOS 10.1 Beta 1 or you are interested in a Jailbreak (approximate) ETA, check out my video right here:
The Setup.App Patch: //goo.gl/pznei6
New iOS SHSH Status Service I made: //status.fce365.info/