0:00
what's going on youtube json right here
0:02
today i have something great for those
0:04
of you who are waiting for the mandy
0:05
chord jailbreak i'm going to show you
0:07
exactly how it looks like the code and
0:10
the jailbreak on a device so recently
0:13
the main developer of the manticore team
0:14
our opponent posted this which is a
0:16
picture with manticore jailbreak which
0:18
does show an important fact about this
0:20
jailbreak the fact that it will allow
0:22
you to select whichever package manager
0:24
you want on your device so you will be
0:27
able to get syria you will be able to
0:28
get silio you will be able to get zebra
0:31
and even installer 5. so this will be in
0:33
the settings and it's actually nice
0:35
there will not be any war on package
0:37
manager with the manticore jailbreak you
0:39
will be able to run whatever you feel
0:41
like and that's actually a great thing
0:43
the manticore jailbreak was recently
0:45
released as open source it's not
0:47
complete yet but it is now available as
0:49
open source i am one of the developers
0:51
in here i joined recently they did
0:53
actually do a great job with this chill
0:56
break there are still some things to be
0:57
done here for example the jailbreak the
0:59
implementation i'm currently working on
1:00
that and the bootstrap package manager
1:02
installation but that's really simple to
1:05
do however the manticore jailbreak will
1:07
definitely be a great one in my opinion
1:09
because it's actually centered around
1:11
the user not around some crazy fight
1:14
between developers and so on this one
1:16
will include any package manager you
1:18
feel like this one will support all the
1:19
tweaks so no artificial restrictions for
1:22
the user just because we don't get along
1:24
with whatever developer so that's
1:26
actually great initially in the test run
1:28
the jailbreak will support 14.3 and
1:30
lower because it's based on securavarosa
1:32
but once a kernel exploit gets released
1:34
it will be popped into the manticore
1:36
jailbreak so that the jailbreak can be
1:38
updated for 14.4 14.4.1 14.4.2 14.5 and
1:43
so on all the way up to probably 14.7
1:46
14.7.1 currently is signed we don't have
1:49
any kernel vulnerabilities and neither
1:51
we have any hopes for a kernel
1:52
vulnerability for 14.7.1
1:55
anytime soon that's particularly the
1:57
reason why uncover hasn't been updated
1:59
in ages and why taurine hasn't been
2:02
updated in ages for new versions is
2:04
because we don't have any new kernel
2:06
vulnerability that we can use it's about
2:08
the time we should get some because at
2:10
this point many vulnerabilities have
2:12
their disclosure time expiring so they
2:15
can indeed be released to the public
2:17
they pass the 90 days but we don't have
2:19
anything new for the moment in terms of
2:21
vulnerabilities so if you want to try
2:23
the manticore jailbreak as it is right
2:24
now to see the progress to see the code
2:26
and so on you go here on github you can
2:28
press code and then download zip or if
2:30
you're using git you can get clone
2:32
recursive this repository here but the
2:34
download zip would probably work as well
2:36
remember to get the amphit2 branch here
2:39
that's the one we're currently working
2:40
on then you can unpack it and of course
2:42
if you want to compile it yourself you
2:44
can do that another advantage of the
2:46
manticore jailbreak would be the fact
2:47
that it's completely open source not
2:50
partially not closed source is
2:52
completely free and open source which
2:54
means that if you do not believe that
2:56
our ipa file is trustworthy and you want
2:59
to check every single line of code that
3:01
you're going to run on your device for
3:03
backdoors or security risks or whatever
3:05
you can do that and you can still
3:06
compile the jailbreak and run it without
3:08
having to trust us you can of course
3:10
open it in xcode i'm going to trust and
3:12
open here and of course i'm going to run
3:14
it on my test device so when you open
3:16
the project it looks something like this
3:18
here in the jailbreak you have the
3:20
jailbreak.mm file containing most of the
3:22
jailbreak logic and then here of course
3:24
you have the offset finder and then
3:26
various utilities including p-list
3:28
utilities and so on but we also have
3:30
snappy or lip snappy created by sam
3:32
bingner this one is for the apfs
3:34
snapshots it's basically used for
3:36
remount and 4d snapshots then in the
3:39
view controller here you have the
3:40
standard ui stuff you know buttons and
3:43
functions that call the jailbreak and
3:44
whatever but most things that interest
3:46
you are probably here in the
3:47
jailbreak.mm in the ansib.c which
3:50
handles the amfid bypass root fs in here
3:52
which is the root of s3 mount and then
3:54
various utilities and kernel utilities
3:56
like set platform binary give
3:58
credentials to a process at an address
4:00
execute with credentials and so on so
4:02
various calls to get privileges or to
4:05
spawn a process with whatever
4:07
credentials or entitlements so this is
4:09
the most important part of the jailbreak
4:11
this is everything you need to know
4:12
about the jailbreak and if you want to
4:14
compile it you go here on the signing
4:16
capabilities i'm going to say
4:18
com.geo.jb and it says creating
4:20
providing profile and that's it and i'm
4:22
going to say the same in here j b and it
4:25
should fix that error so at this point
4:27
if you don't have any red errors here on
4:29
the signing in capabilities then you
4:31
will be able to run it on your device
4:33
and here of course you can see the
4:34
deployment target i'm going to set it
4:36
all the way down to 13.0 for my case to
4:38
be able to run it on that phone and
4:40
there you go but do keep in mind this
4:42
works with secular rosa so 14.3 all the
4:44
way down to 14.0 now as you can see it
4:47
compiles fine so we did not leave
4:50
anything behind you do have the entire
4:52
code base in here no missing frameworks
4:54
and stuff like that so now we can
4:56
install the jailbreak and we will be
4:58
able to see it in action so you can see
5:00
here manticore jailbreak seems to work
5:02
fine seems to load and this isn't here
5:03
yes that it is indeed incompatible but
5:06
that's because this device is running
5:09
however the jailbreak is currently in
5:11
development so that's understandable as
5:13
well so you can see here only package
5:15
management we would basically have the
5:17
option to install whichever package
5:19
manager we want and also we have the
5:21
normal settings like restore root fs
5:23
disable updates max memory limit load
5:25
tweaks load diamonds and even disable
5:27
screen time and so on so it's basically
5:29
your standard taurine or uncovered
5:31
settings but this is how the jailbreak
5:33
will look like though i should probably
5:34
fix this font it shouldn't be black even
5:36
if the device is not compatible yes this
5:38
one will only work on 14.0 and up not
5:42
13.4 which is currently what i'm running
5:44
here however yes that's how the
5:45
jailbreak is coming along it's currently
5:47
work in progress but you do have the
5:49
full coding here if you want to check it
5:51
out or if you want to investigate so i
5:53
would definitely recommend it to try it
5:55
out once it gets released because this
5:57
is going to be a fully open source
5:58
jailbreak as well as the pawn my
6:00
jailbreak which is already open source
6:02
in there so definitely looking forward
6:04
for this jailbreak but yeah thank you
6:05
for watching imgs now till the next time