0:00
what's going on youtube gsm right here
0:02
so in today's video we're talking about
0:03
the ios 15 jailbreak and some
0:05
developments that happened in the
0:07
community some good news but also some
0:09
explanations so the series is brought to
0:11
you by any trans a software that allows
0:13
you to backup the data on your device on
0:15
your icloud and media library and so on
0:17
drag and drop fast your device from your
0:18
computer and easily back up photos music
0:21
videos and apps definitely check it out
0:22
in the link below so a couple of days
0:24
ago back on november 11th the elcomsoft
0:26
company posted this quote ios 15.1 bfu
0:30
acquisition with unknown passcode thanks
0:32
to checkmate incoming elcomsoft ios
0:34
forensic toolkit update so they posted a
0:37
login here basically extracting data
0:39
from the iphone without a passcode and
0:42
that was on ios 15.1 which as you
0:45
probably know has root fs completely
0:47
sealed and many other security features
0:49
so elcomsoft is basically a company that
0:51
does forensic research and they create
0:53
tools for forensic investigators and
0:55
stuff like that they have a mobile
0:56
bundle which contains all this kind of
0:58
software for extracting data from you
1:00
know sealed devices or password locked
1:03
devices and so on these are not exactly
1:04
for the general public however what they
1:06
did in here is actually one of the first
1:08
things to happen on ios 15.1 because as
1:11
you probably know not even check works
1:13
properly on ios 15.1 or 15 for that
1:17
matter and the reason ios 15 is not
1:19
jailbroken yet with checkrain which as
1:21
you probably know cannot be patched is
1:23
because the team hasn't got to it yet
1:26
now i've got some information from some
1:27
people in the community that apparently
1:29
some of the members of the czech reign
1:31
team are taking their exam at their
1:33
university or whatever so they don't
1:35
have time to work on check range but
1:37
that has not been verified so it may not
1:39
be correct anyways the check ring theme
1:41
posted no news no update lately so as
1:43
you can see from here if you go here on
1:45
the check ring with the official twitter
1:47
the last relevant update is 0.12.4
1:50
so will we have checkrain updated
1:52
anytime soon my guess is that yes
1:55
because as you can see it's still
1:56
possible to do stuff on ios 15.1 with
1:59
the checkmate exploit well granted this
2:01
is not a jailbreak this is data
2:03
exfiltration but it's still using
2:04
checkmate in the background the same
2:06
core component that is being used by
2:08
checkrain which means that it's still
2:10
possible to use checkpaint in order to
2:12
jailbreak ios 15 just not at this moment
2:15
so what exactly do they need to overcome
2:17
in order to create a jailbreak for
2:21
point zero point two and fifteen point
2:23
one well for those of you who are
2:24
unaware ios 15 introduced a major
2:27
security feature compared to ios 14.8 or
2:30
older and that is the sealed root ss
2:32
which means that if you try to remount
2:34
the root file system something that all
2:36
the jailbreaks do at some point in the
2:38
jailbreak process in order to be able to
2:40
install cydia and you know jailbreak
2:42
files and stuff the device will actually
2:44
panic and reboot in dfu mode which means
2:46
that you will not be able to use the
2:47
device anymore so that is the biggest
2:49
problem with check rain right now that's
2:51
the issue they have to somehow overcome
2:54
check crane also tries to remount the
2:55
root file system when it tries to
2:57
jailbreak and that of course is not
2:58
compatible with the new ios 15 security
3:01
and it will indeed fail but yeah
3:03
chickering doesn't work on ios 15 for
3:05
that exact reason and probably many
3:08
others but that is the biggest issue
3:10
with chick rain right now it needs to
3:12
overcome the root of s being sealed so
3:14
that can take time now what elcomsoft
3:16
did in here the data extraction doesn't
3:18
actually require root fsp mounting but
3:21
it's still using checkmates so it's
3:23
still a great feat of engineering
3:24
because they were able to actually do
3:26
this you know extract the data from a
3:27
locked device without a passcode so that
3:30
actually raises the question how safe
3:32
are the checkrain devices on the iphone
3:34
10 8 and 8 plus you cannot even set a
3:37
passcode because a jailbreak would fail
3:38
and for the rest of the devices tools
3:40
like this can easily outsmart your
3:42
passcode so yeah the check ring
3:44
compatible devices are easily turning to
3:46
be not very reliable and not very secure
3:49
anymore thanks to the checkmate exploit
3:51
but that is indeed what powers check
3:53
range so yeah for those of you
3:54
interested in check rain that's exactly
3:56
what they need to fix the root fs being
3:59
sealed but unfortunately that may take
4:01
time we have no update from check rain
4:03
but at the same time other companies
4:04
seem to be doing progress for example
4:06
elcom softing here on the ios 15.1 with
4:09
checkmate so the battle is not lost yet
4:12
but check rain definitely needs to
4:14
update their tools because they don't
4:15
work by default so please do not try
4:17
checkrain on ios 15 and wait for an
4:20
update so yeah congrats to elcomsoft for
4:22
doing that that's actually a pretty
4:24
interesting feat of engineering
4:25
extracting passcode protected data from
4:27
a device without the passcode is
4:29
actually quite interesting especially
4:30
since they use their own build tools so
4:33
yeah definitely props to them and let's
4:34
hope for a check rain update in the near
4:37
future thank you for watching imgsnow