0:00
what's going on youtube gsm right here
0:02
so in today's video we're going to do a
0:03
quick recap on what's currently going on
0:05
with the ios 15 jailbreak and of course
0:10
14.8 and 14.6 and so on so if you're not
0:14
in the loop and of course it's been a
0:15
while since i made an update i'm going
0:17
to tell you exactly on which version to
0:19
stay for the moment and of course what
0:21
developments have happened in the
0:22
community this video is brought to you
0:23
by any trans a software that allows you
0:25
to drag and drop files directly from
0:27
your computer to your device manage your
0:29
photos music videos and apps and of
0:31
course switch data from a device to
0:32
another definitely check it out in the
0:34
link below so for those of you who
0:36
haven't been in the loop for a while and
0:38
of course i haven't made an update for
0:40
jailbreak stuff in a while because there
0:42
isn't much new ios 15.1.1 and ios 15.1
0:46
are currently the latest signed versions
0:48
and of course 15.1.1 may not be
0:50
available for all devices now the 15.1.1
0:54
is a minor version so if you're running
0:56
15.1 and you update the 15.1.1 there
0:59
shouldn't be much of a problem in terms
1:01
of jailbreaking 15.1.1 basically just
1:04
patches a bug with calls dropping on
1:06
some devices like the iphone 13 and so
1:08
on now if you're running ios 14.3 14.2
1:12
and so on you can jailbreak of course
1:13
with uncover but the ant-tether is not
1:16
currently available for that if you want
1:18
to use the amp tether you can use it on
1:20
14.4 14.5 and 14.5.1 but not 14.3 for
1:25
the moment there were plans to update
1:27
the fugu 14 which is the anteater
1:29
created by linus hensey and integrated
1:31
non-cover to work with 14.3 but that
1:34
never happened so for now if you're
1:36
running 14.3 or lower you cannot use the
1:39
amp better now if you're running 14.6 or
1:41
newer you're going to have to wait for
1:43
another exploit of course if your device
1:45
is check rain compatible you can use
1:47
check rain all the way up to ios 14.8
1:49
point something but if you have an a12
1:51
or 813 or a14 device and so on you're
1:53
going to have to wait for that now here
1:55
on my website you can go here to ios
1:57
signing status select your device and
1:59
you're going to be able to see which ios
2:00
versions are signed so 15.1 is currently
2:03
signed and available now for 14.8 and
2:06
lower you're going to need to wait for
2:07
an exploit that works on ios 14. not a
2:10
huge problem because there probably will
2:12
be one released anyways however if
2:14
you're running 15.0 to 15.0.2 or even
2:17
15.1 that's where the problems begin
2:20
because as i said in my other videos ios
2:22
15 introduces a brand new mitigation
2:24
that makes it harder for jailbreak
2:26
developers to remount the file system
2:28
which is necessary if you want to
2:29
install cydia and so on so that would
2:32
have to be patched as well right now for
2:34
ios 15 we rely on the following bugs to
2:37
be released in the future the first one
2:38
is this one by brighty up which has been
2:40
demonstrated back on november 2nd and
2:42
this one got kernel read and write
2:44
privileges which would be definitely
2:45
usable for jailbreak purposes but the
2:47
problem is it works on 15.1 as well
2:50
which is currently the latest version
2:52
which means that if we get to see this
2:54
bug released it will be after ios 15.1
2:57
gets patched because right now as it
2:59
stands this bug is very likely zero days
3:01
so of course they wouldn't release it
3:03
because it works on the latest version
3:04
and the other one is this one here by
3:08
which is ios 15 code execution zero day
3:11
but right now they don't have any plans
3:13
to release it because they're still
3:14
analyzing to see if it's a real
3:15
vulnerability so they post it in here
3:17
quote still analyzing to see if this is
3:19
a real vulnerability once finished if
3:21
it's worth i will start the responsible
3:23
disclosure process now responsible
3:25
disclosure means that they're going to
3:27
tell apple about the vulnerability and
3:29
wait for apple to release a new ios
3:30
version in order to patch it after that
3:32
they can make it publicly available so
3:34
if this turns out to be like a really
3:36
exploitable bug they will release it but
3:39
in the future after they go through the
3:40
irresponsible disclosure process so with
3:43
this in mind what should you do if
3:44
you're waiting for uncover to be updated
3:46
for your device well at first use blob
3:48
saver by airsquared here i made videos
3:51
here on the channel in order to save
3:52
your blobs if you save your blobs you
3:54
are able to do some sort of free
3:56
movement between ios versions now if you
3:58
don't know how to do that you can
4:00
definitely go ahead here on the sep and
4:02
basement chart and see exactly how to
4:03
use future restore and which sub
4:05
versions are compatible with which
4:07
devices i keep a listing here with all
4:09
compatible devices and so on and i also
4:11
have here a tutorial on how to use
4:13
future restore to downgrade or upgrade
4:15
unsigned ios it should be pretty
4:17
detailed and there is also a video
4:19
attached down below in here if you want
4:21
to know exactly how to use those in
4:23
order to downgrade or upgrade but in
4:25
short if you save your blobs using
4:27
airsquared blob saver or any other tool
4:29
but this one supports a12 and newer
4:31
you're basically able to upgrade or
4:33
downgrade when a jailbreak is available
4:35
as long as there is an exploit for your
4:37
ios version which is actually quite
4:39
great so if you're running 15.1 you're
4:41
running the worst version that you can
4:42
be on for the moment it's the newest and
4:45
of course it will take the most time to
4:47
get a bug right now it's currently
4:49
signed and nobody will release an
4:50
exploit for a signed version because
4:52
that would be releasing zero day even
4:54
after it stops being signed it can take
4:56
a few months for a version to get a bug
4:58
so yeah it's definitely not the best
5:00
version but if you're already there
5:01
there's not much you can do however if
5:03
you're running 15.0 15.0.1 or 15.0.2
5:07
definitely stay there and save your
5:09
blobs for 15.1 if any of these
5:11
vulnerabilities get released you might
5:13
be able to use that but then if you're
5:14
running 14.8 or lower down to 14.6 do
5:18
not update the ios 15. put off updating
5:20
to ios 15 for as long as you can because
5:23
once you do that it complicates things
5:25
for jailbreak purposes at least for a
5:27
while so yeah it's the waiting game once
5:29
again the uncovered jailbreak was
5:31
updated finally to support 14.5.1
5:34
and lower after a long wait on 14.3 you
5:36
can now jailbreak 14.5 14.5.1 14.4 as
5:40
well but that's unfortunately as far as
5:42
the bug goes so we need a new bug in
5:44
order to support the newer versions like
5:46
14.6 and so on so i will definitely keep
5:49
you updated here on the channel with any
5:51
news but right now this is where we're
5:53
at we're waiting for a new bug to be
5:54
released yup thank you for watching imgs
5:56
now till the next time subscribe to stay
5:58
updated and peace out