iOS 13.1.2 / 13.0 / 12.x CheckRa1n JAILBREAK / CFW With CheckM8 Exploit (JAILBREAK Forever)

In today’s video, we’re discussing the very first major project done using the CheckM8 SecureROM (BootROM) exploit for iPhone 4S up to iPhone X released by @axi0mX a few days ago. This project called CheckRa1n seems to be a very ambitious jailbreak project aimed at iOS 13.1.2 and lower. Big names working on this include axi0mX, Siguza, Luca Todesco, littlelailo, iH8Sn0w, and many others. A major jailbreak project like none in the past couple of years which will definitely make history.

The CheckM8 exploit itself works on iPhone X, iPhone 8 / 8 Plus, iPhone 7 / 7 Plus, iPhone 6S / 6S Plus, iPhone SE, iPhone 6 / 6 Plus, iPhone 5S, iPhone 5C, iPhone 5 and iPhone 4S, on all iOS versions supported by these devices. And of course, this exploit cannot be patched, so these devices will be jailbreakable on any iOS version forever.

The CheckRa1n project seems to contain two components: a computer program currently working on macOS, and an on-device component which shows a text-based user interface before the phone even boots to the home screen. They seem to have coded a bootloader-like low-level program that runs on the device and listens to the CheckRa1n via USB. Once detected, the computer part of CheckRa1n uploads the patches to the iOS device thus jailbreaking it. This is very similar to RedSn0w Jailbreak back in the days. Of course, such a jailbreak is tethered.


▽ Resources ▽
Our Jailbreak Forum
How To Use CheckM8 BootROM Exploit For CFW / Jailbreak (iOS 13, iOS 12, iOS 11 PWNED DFU Mode)
iOS 12.4 / 12.0 A12 Unc0ver JAILBREAK: How Fix Most Un0cver / Cydia Errors / Problems
Unc0ver Jailbreak for A12
iOS 12.4 Compatible Tweaks

GeoSn0w

About GeoSn0w

C#, C, Objective-C Programmer | Beginner iOS Security Researcher | Content Creator | Web Developer I like to bring the latest news from the iOS / iDevice / Jailbreak battlefield to you in a beautiful manner :) I hope you like the site. If you do, don't forget to check out my channel :)