0:00
what's going on youtube gs9 here so in
0:02
today's video i have some news for those
0:04
of you waiting for a jailbreak it seems
0:06
that some progress is being made towards
0:08
an ios 15 jailbreak so let's get into it
0:10
this video is brought to you by phone
0:12
rescue a software that allows you to
0:13
recover lost data from your device or
0:15
from backups or icloud backup and so on
0:17
if you have important photos or contacts
0:19
and so on that might be in there it's
0:21
worth a try it can also fix various
0:23
issues with the device and even recover
0:25
the screen time passcode if you forgot
0:27
it check the program out in the link
0:29
below so a lot of people seem to be
0:30
tagging me into posts like this lately
0:33
this one was made back on 15th of may
0:35
and this one was made back on 11th of
0:38
may both of which are from the same
0:40
developer this person over here i never
0:42
heard of them before they seem to be
0:43
japanese and also interested in
0:45
jailbreaking in ios and stuff like that
0:47
it's not a developer that i know or that
0:49
i've seen tools released by before but
0:51
they seem to be using code that is
0:53
publicly available like code by sheena
0:55
520 over here for ios 15 am fit task
0:58
controller in order to build a tool
0:59
either a jailbreak or a file manager an
1:02
sandboxed file manager with exploit so
1:05
back on may 15 they posted this quote
1:07
got read write for var containers on ios
1:12
jailbreak and they posted a screenshot
1:14
from what appears to be xcode and lldb a
1:17
debugger on ios in which they showed
1:19
that they are able to write a specific
1:21
file to a specific location they also
1:23
posted back on may 11 this over here
1:25
quote successfully on sandbox on ios
1:28
15.1 but almost read-only hashtag
1:30
jailbreak with another screenshot from
1:32
xcode which is great so it appears that
1:34
they are working on building something
1:36
that can write outside of normal app
1:38
containers that could be something like
1:40
fauza or files escape but that can also
1:42
be transformed into a jailbreak but from
1:44
what i can understand on their profile
1:46
most of their posts are basically in
1:48
japanese so not a lot can be understood
1:50
but they seem to use multicast bytecopy
1:53
and desk race and so on so these are
1:55
publicly available exploits but also
1:57
techniques from sheena 520 over here
2:00
which have been posted back on april
2:02
17th so what they're building is
2:04
probably something based on those but
2:06
they also seem to have issues with mv
2:08
and so on so they are thinking of
2:10
developing a file manager rather than a
2:12
jailbreak so i don't know a lot of
2:13
people ask me about this and tag me on
2:15
these posts like this person over here
2:17
thank you for tagging me into this it's
2:19
quite interesting it seems like this
2:20
person is a new developer they managed
2:22
to get a successful on sandbox on the
2:25
var containers which is great this seems
2:27
to be their latest achievement they got
2:28
rid right to the var containers on 15.1
2:31
which is good and the reason is 15.1 is
2:34
that 15.1 and 15.1.1 are basically the
2:37
latest versions that the exploit which
2:39
is currently available supports 15.7 new
2:41
word is not supported and a lot of
2:43
techniques are broken on that as well
2:45
but if you're waiting for a jailbreak i
2:47
wouldn't hold my breath for anything
2:48
released by this developer not because
2:50
they may not be capable but because they
2:52
seem to have a lot of issues with mv and
2:54
so on so they seem to be learning
2:56
they're not very experienced with
2:58
jailbreak development so that may take a
3:00
lot of time if you want a jailbreak i
3:02
would definitely say wait for uncover in
3:04
taurine especially for taurine they have
3:06
an entire team behind it and they still
3:08
get a lot of issues with amphi so yeah
3:11
it will take time however it's nice to
3:13
see new developers being interested in
3:15
ios and stuff like that and developing
3:17
jailbreaks and using the publicly
3:19
available exploits people are always
3:21
complaining that there are a lot of
3:23
exploits but nobody uses them well now
3:25
they do so that's actually great if
3:27
you're interested in a jailbreak
3:28
definitely stay below 15.2 that's what
3:31
taurine recommends and that's what i
3:33
recommend as well past ios 15.2 things
3:35
get even more complicated and while a
3:38
jailbreak will be released eventually it
3:40
will take more time but yeah this
3:41
developer did get an important
3:43
achievement into getting rid right for
3:45
the vore containers on ios 15 that's
3:47
good for jailbreak purposes but it's not
3:49
a full jailbreak they're still messing
3:51
with empty which god knows is not an
3:52
easy task so i'm going to keep you
3:54
updated if anything comes from that
3:55
thank you for watching i'm just now