Jailbreaking generally refers to the removal of iOS software restrictions on Apple devices by means of software exploits. Jailbreaking affords root access to the iOS file system, allowing users to install tweaks and utilities that provide extensive functionality to iOS.
Jailbreak tools vary from jailbreak to jailbreak. Some tools consist of tiny utilities that must be executed from a Mac or Windows machine, while other jailbreak methods can be executed right on device without needing to connect to a computer.
Jailbreaks have been released for all iOS hardware categories, including the iPhone, iPad, iPod touch, and Apple TV. The most recent Apple TV jailbreak, made available for the 4th generation Apple TV, required users to stay on an earlier version of tvOS. Of all iOS-related devices to date, only the third-generation Apple TV never saw a jailbreak during its lifetime.
Since jailbreaking takes advantage of security vulnerabilities, Apple works hard to patch these vulnerabilities. Once a vulnerability is patched, a new version of iOS is released and the signing window for previous susceptible versions are closed, making it impossible for users to upgrade or downgrade to the vulnerable version of iOS.
Cydia, a third-party app and tweak resource, is frequently mentioned in the same breath as jailbreaking, although it has nothing to do with the exploits responsible for the jailbreak itself. Cydia is by far the most popular way for jailbroken users to acquire apps and tweaks to modify their jailbroken devices.
The most recent jailbreak is from Chinese hacking team, Pangu. Pangu’s jailbreak works with iOS versions 9.3.3, 9.3.2, 9.3.1, 9.3, 9.2.1, and 9.2. The Pangu jailbreak is available for the iPhone, iPad, and iPod touch. At the moment, Pangu’s official iOS 9.3.3 jailbreak is Windows-only, and available in Chinese.
How To Jailbreak Your iPhone: Step-by-Step Guide
Apple as a company has always focussed on security and data privacy and this has lead to making iOS more secure than ever. But this comes with the cost of taking away the freedom of modifying the iOS with any third-party apps or tools. Apple provides too many limitations on iOS devices and there is no other way you can get freedom back without jailbreaking. This is one of the most common questions among iPhone users, “how to jailbreak your iPhone?”
The thing is, it’s an easy process, and with the right tutorial and simple steps, you can jailbreak your iPhone alone without anyone’s help. You can do anything you want with a jailbroken iPhone and use it like it’s in your complete possession. Here in this post, we are going to show you exactly how to Jailbreak your iPhone so that you can have full-on control over your iPhone by minimizing restrictions.
Also read: Apple Mobile Price List In India
What is Jailbreaking?
Generally, Apple does not let you run third-party/unrecognized software or unsigned codes that are not officially allowed by the company. It results in losing control over your own smartphone. Unlike Android smartphones, you cannot use whatever app you want on your iPhone device regardless of its version. But jailbreaking your iPhone removes all the restrictions from your device, and you can do whatever you want; that too includes installing third-party software programs, modifying the user-interface, and enjoying these services.
Also Read: How To Record Calls On iPhone!
Jailbreaking your iPhone means installing any theme or application you want to enhance the look of your iPhone as well as its functionality. Basically, jailbreaking requires you to install an application on your iOS device that will let you run jailbreak apps, themes, and tweaks on your iPhone. So, if you can’t find your favorite app or theme on Apple Store, then you can learn how to jailbreak your iPhone to do the trick.
If you want to install Jailbreak apps on your smartphone, you can visit Cydia or any trusted App Store. But you should also know that there are a few different types of jailbreaking. Before you decide to jailbreak your iPhone device, we want you to check out the following section.
Also Read: What Is Jailbreaking An iPhone? Should You Do It In 2020?
Types of Jailbreaking
Usually, there are four different types of jailbreak processes for iOS devices.
Tethered: You can try tethered-jailbreak your iPhone temporarily at the time of the single boot. If you switch off your phone and restart it again, you will need to jailbreak your phone again using your PC. And the process will require you to use the boot tethered feature of a related tool. But if you don’t re-jailbreak your iPhone again, it will be stuck in the Recovery Mode.
Semi-tethered Jailbreak: During this jailbreak process, your iPhone will boot without a patched kernel, which won’t be able to run any modified code, and it nearly does not work in tweaking or jailbreaking apps. You will have to use any jailbreak software to go with the patched kernel.
Untethered Jailbreak: In the Untethered jailbreak, you will be able to restart your phone, but the kernel will stay patched, and you can still use the jailbroken version even after restarting your device.
Semi-untethered Jailbreak: It is somewhat similar to the previous jailbreaking process, but your iPhone will remain not-jailbroken after a reboot. Semi-untethered jailbreak will let you jailbreak your phone using an app on your device only, and you won’t require an additional computer to do the method.
Also Read: How To Voice Tweet On Your iPhone!
How to Jailbreak Your iPhone?
If you have decided to jailbreak your phone, this section will help you. However, please check out the version of your iPhone and follow the steps carefully to avoid any unnecessary hassles.
- Make sure to backup your data before starting the process. In case things go south you should have backup of your data.
- This process although is completely safe, but can brick your device i.e your device could go completely dead and would be as good as a brick in case the process fails. Contact customer care in case you are facing any issues with the device
- Once you have Jailbroken your iPhone, the warranty of your iPhone is void now. In case you wish to visit the service center for any support, you need to remove jailbreak from your device to claim the warranty.
- Last but not the least, this guide is for informational purposes and we at Cashify won’t be responsible for any data or device loss.
Method 1: Use Unc0ver Jailbreak
To use Unc0ver for jailbreaking, you need to make sure that your iPhone version is up-to-date. You can check out your version from https://unc0ver.dev on the Compatible page then follow the below steps to jailbreak your iPhone using Mac.
Unc0ver is supported in the below iPhone models and iOS versions-
- iPhone 6, iPhone 6 Plus with iOS 11 – iOS 12.4.1
- iPhone 6s, iPhone 6s Plus, iPhone SE (2016) with iOS 11 – iOS 13.5
- iPhone 7, iPhone 7 Plus with iOS 11 – iOS 13.5
- iPhone X, iPhone 8, iPhone 8 Plus with iOS 11 – iOS 13.5
- iPhone XS, iPhone XS Max, iPhone XR with iOS 13.5.1, iOS 13.6, iOS 13.6.1
- iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, iPhone SE (2020) with iOS 13.5.1, iOS 13.6, iOS 13.6.1
Also Read: 20 Best Tips And Tricks For Your iPhone 12 And 12 Pro
Follow the below steps now to jailbreak your iPhone-
Step 1: Download and install AltStore on your Mac from https://altstore.io
Step 2: Open the AltStore app by double-clicking on its icon from your Desktop
Step 3: Click on the AltServer icon and select the select Install Mail Plugin option
Step 4: Enable AltPlugin from the Mail app application folder
Step 5: Now connect your iPhone with your Mac computer using a USB drive
Step 6: Then click on the AltStore icon and choose your iPhone
Step 7: Sign in with your Apple ID and click on the Install button
Step 8: Go to Device management from Settings>General, click on your Apple ID, and tap on Trust twice to install Unc0ver on your iPhone.
Step 9: Visit https://unc0ver.dev from a web browser on your iPhone and download the v5.3.1 version of Unc0ver. Then install it on your iPhone.
Step 10: Open Unc0ver on your iPhone and click on the blue Jailbreak button
Step 11: Tap, OK; when the process is complete, it will reboot your device. If it does not, you do it yourself.
Step 12: Run the Jailbreak tool once again in Unc0ver
Step 13: Click on Jailbreak and tap, OK.
Also Read: 5 Hidden Features For Your iPhone You Never Knew
Method 2: Use Checkra1n Jailbreak
If the Unc0ver jailbreaking technique does not work, then Checkra1n may. Look at this section to find out how to jailbreak your iPhone using Checkra1N.
Again, make sure that your iPhone is running the latest version of iOS. Since Checkra1 is a semi-untethered jailbreaking process, you need to reboot your iPhone to use the technique. Then you will require an additional Mac or Linux device to complete the jailbreaking.
Chekra1n is supported by the below version of iOS and iPhone model:
- iPhone X, iPhone 8, iPhone 8 Plus with iOS 12.3 – iOS 13.7
Now, follow the steps below to jailbreak your iPhone using Checkra1n-
Step 1: Visit https://checkra.in/releases/0.11.0-beta from your Mac web browser
Step 2: Click on Download for MacOS or Linux if you are using one
Step 3: Install it on your computer using the installation file and following the instructions
Step 4: Connect your iPhone with the Mac
Step 5: When you open Checkra1n on your Mac, make sure your iPhone is being detected by the semi-untethered jailbreaking app
Step 6: Click on the Start button to begin the jailbreak process
Step 7: Click on Options and check the “Allow untested iOS/iPadOS/tvOS versions” point
Step 8: Click Next to send your iPhone to the recovery mode
Step 9: Again, click Start
Step 10: Put your device in the DFU mode by following the instructions
Step 11: Release the power button and continue to hold the home button on your iPhone
Step 12: After this, when you open Checkra1 on your iPhone, it will help you install Cydia to use tweaks and jailbreak apps.
However, if you’re using one of these below iPhone models that is running with the below-mentioned iOS version, you must use Electra Jailbreak to have full control of your iPhone.
- iPhone 6, iPhone 6 Plus with iOS 11 – iOS 11.4.1
- iPhone 6s, iPhone 6s Plus, iPhone SE (2016) with iOS 11 – iOS 11.4.1
- iPhone 7, iPhone 7 Plus with iOS 11- iOS 11.4.1
In the case of old models of iPhone, running with old iOS versions, use Yalu jailbreak. Check the below points to learn about the supported iPhone models and versions for this software.
- iPhone 6, iPhone 6 Plus with iOS 10 – iOS 10.3.4
- iPhone 6s, iPhone 6s Plus, iPhone SE (2016) with iOS 10 – iOS 10.3.4
- iPhone 7, iPhone 7 Plus with iOS 10 – iOS 10.3.4
Also Read: iPhone 12 Mini vs iPhone SE
Does Jailbreaking Void My iPhone’s Warranty?
If you read Apple’s support document, you will see that they have stated that they may deny the required services for an iPhone, which has installed any kind of unauthorized software. That means if you jailbreak your iPhone, you may not get support or a warranty from Apple. Still, if the warranty is more important in your case than jailbreaking, you can restore the device to its factory settings to remove the traces of jailbreaks. Hence, you can avoid voiding your iPhone’s warranty.
Also Read: 11 Camera Tips And Tricks For iPhone
Is Jailbreaking iPhone Legal?
The U.S. Library of Congress has made jailbreaking your iPhone, tablet, smartTV, etc., legal by withdrawing the Digital Millennium Copyright Act (DMCA) from these devices. Therefore, you can change your software without trying to breach the copyright. Still, if you take advantage of jailbreaking by streaming torrents and movies illegally, you will break the law and be charged for copyright issues.
For the latest smartphone news, stay tuned to Cashify. We also allow you to compare mobile phones so you can find out the better phone before buying.
- 1st Oct 2021
Thinking to buy iPhone 12? Well, I would be happy to tell you that this is the perfect time to buy iPhone. We all know that the annual Flipkart and Amazon sale is going to start in just a few hours. So sit tight and read this article to know how to buy iPhone 12…
- 1st Oct 2021
We all have been waiting for the annual Flipkart and Amazon sale. If you are looking to buy an iPhone 11 this would be the perfect time to get one for yourself. In this article, we’ll tell you how you can get a brand new iPhone 11 for just Rs 25,499*. But first, let us…
- 17th Sep 2021
The OnePlus 9R was launched in April as a reasonable and appealing option for smartphone users who did not want to spend more than Rs 40,000. Then the 2021 launches rolled down, and the OnePlus 9R was no longer as competitive as it had been– it had simply become the most affordable way to get…
- 13th Sep 2021
The IPL 2021 resumption matches have been scheduled to kick off from September 19, 2021. When it comes to the location, the matches will be held in the United Arab Emirates (UAE). Now, as the IPL 2021 schedule and stadium information are out of the way, let us talk a bit about the matches. The…
- 1st Sep 2021
In this article, we will be talking about a very popular Apple phone which is the iPhone 11. There is a huge confusion revolving around whether one should buy this iPhone in 2021 or not? Hence, we will be talking about 5 reasons that make buying the iPhone 11 worth it even in 2021. Also…
Removal of limitations from Apple's iOS devices
On Apple devices running iOS operating systems, jailbreaking is a privilege escalation executed to remove software restrictions imposed by the manufacturer. Typically it is done through a series of kernelpatches. A jailbroken device permits root access within the operating system and provides the opportunity to install software not available through the iOS App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement, and strongly cautions device owners from attempting to achieve root access through exploitation of vulnerabilities.
While sometimes compared to rooting an Android device, jailbreaking is the bypass of several types of Apple prohibitions for the end user. Since it includes modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting), the concepts are different.
One of the reasons for jailbreaking is to expand the feature set limited by Apple and its App Store. Apple checks apps for compliance with its iOS Developer Program License Agreement before accepting them for distribution in the App Store. However, their reasons for banning apps are not limited to safety and security and may be regarded as arbitrary and capricious. In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that "contain content that ridicules public figures." To access banned apps, users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple, such as user interface customization and tweaks.
Since software programs available through APT and or Installer.app (legacy) are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customization options for iOS and its features and other apps (commonly called tweaks). Users install these programs for purposes including personalization and customization of the interface by tweaks developed by developers and designers, adding desired features such as access to the root file system and fixing annoyances, and making development work on the device easier by providing access to the filesystem and command-line tools. Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character input systems because they are easier to use than Apple's.
In some cases, jailbreak features are adopted by Apple and used as inspiration for features that are incorporated into iOS.
|Adopted Feature||Jailbreak Tweak|
|iOS Version||Description||Title||Developer||Originally released for|
|5.0||Emoji support||Vmoji||Vintendo/ManChild Technologies||iOS 4|
|Keyboard shortcuts||Xpandr||Nicholas Haunold||iOS 4|
|Delete individual calls||Call Delete||IArrays||iOS 4|
|7.0||Control Center||SBSettings||BigBoss||iOS 2|
|Translucent Notification Center||BlurredNCBackground||Phillippe||iOS 5|
|8.0||Interactive Notifications||LockInfo||David Ashman||iOS 4|
|biteSMS||biteSMS Team||iOS 5|
|Third-Party Keyboards||Fleksy Enabler||Sea Comet||iOS 6|
|Predictive Text||PredictiveKeyboard||Matthias Sauppe||iOS 7|
|9.0||Cursor Control||SwipeSelection||Kyle Howells||iOS 4|
|Lowercase Keys in Keyboard||ShowCase||Lance Fetters||iOS 4|
|10.0||Drawing on Messages||Graffiti||IanP||iOS 5|
|Floating Notification Center||Floater||Skylerk99||iOS 8|
|Bubble Notifications||WatchNotifications||Thomas Finch||iOS 8|
|Clear All Notifications||3D Touch to Clear Notifications||MohammadAG||iOS 8|
|Stickers in Messages||StickerMe||Alexander Laurus||iOS 8|
|Separate Control Center Pages||Auxo||A3Tweaks||iOS 9|
|11.0||Cellular Data Control||SBSettings||BigBoss||iOS 2|
|Customizable Control Center||CChide/CCSettings||plipala||iOS 8|
|Colored Controls||Cream||CP Digital Darkroom||iOS 8|
|One-Handed Keyboard (iPhone)||OneHandWizard||TheAfricanNerd, sharedRoutine||iOS 8|
|Low Power Mode in Control Center||CCLowPower||Cole Cabral||iOS 10|
|Notification design tweaks||CleanNotification10||Ayden Panhuyzen||iOS 10|
|13.0||Dark Mode||Eclipse||Guillermo Morán||iOS 7|
|Download manager in Safari||Safari Plus||BigBoss||iOS 8|
|Redesigned volume HUD||Melior||SparkDev||iOS 7|
|Ultrasound||Ayden Panhuyzen||iOS 11|
|Wi-Fi/Bluetooth settings in Control Center||WeatherVane||ATWiiks||iOS 11|
|Unlimited app download limit on Mobile Data||Appstore Unrestrict||iJulioverne||iOS 11|
|Third-party Controller Support||nControl||Kevin Bradley||iOS 12|
|14.0||Hide apps from Home screen||Poof||BigBoss||iOS 6, possibly older|
|Compact Call Interface||CallBar||Elias Limneos||iOS 7|
|App Library||Vesta||SparkDev||iOS 13|
|Changing CarPlay background||Canvas||Leftyfl1p||iOS 13|
|Picture in Picture on iPhone||Titan||TheSaltaCracka||iOS 13|
|Home Screen Widgets||HSWidgets||dgh0st||iOS 13|
|Smaller Siri||SmallSiri||Muirey03||iOS 13|
|15.0||Separation Alerts||Proximitus||LaughingQuoll||iOS 11|
|Low Power Mode (iPad)||LPMPad||iCraze||iOS 13|
|Focus||PureFocus||Dave Van Wijk||iOS 13|
|Notification Priority||Contacy||XCXiao||iOS 13|
|Redesigned Notifications||Quart||LaughingQuoll||iOS 13|
Jailbreaking also opens the possibility for using software to unofficially unlock carrier-locked iPhones so they can be used with other carriers. Software-based unlocks have been available since September 2007, with each tool applying to a specific iPhone model and baseband version (or multiple models and versions). This includes the iPhone 4S, iPhone 4, iPhone 3GS, and iPhone 3G models. An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to install Cydia the iPad baseband.
Installation of malware
Computer criminals may jailbreak an iPhone to install malware or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company Hacking Team, which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.
On iOS devices, the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking, therefore, allows the installation of pirated applications. It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software. However, the installation of pirated applications is also possible without jailbreaking, taking advantage of enterprise certificates to facilitate distribution of modified or pirated releases of popular applications.
A package manager or package-management system is a collection of software tools that automates the process of installing, upgrading, configuring, and removing computer programs. For jailbreaks, this is essential for the installation of third-party content. There are a few package managers specifically for jailbroken iOS devices, of which the most popular are Cydia, Sileo, Zebra and Installer 5.
Security of the device
Upon jailbreaking the device, a lot of the built-in security is lost due to the vast amount of kernel patches that go into building the tool. Security structures like Apple Mobile File Integrity, Sandbox, Read-Only Root File system and trusted apps get disabled or otherwise tampered with, in order to achieve the goals of the jailbreaking tool. This, in turn, creates potential security issues for the jailbreak user.
Jailbreak users are also often forced to stay on an inferior iOS version that is no longer supported by Apple, because newer versions usually cannot be jailbroken right away. This has the potential to introduce security issues because for these older versions there are known security vulnerabilities, exploits and exploit proof of concepts published.
In March 2021, jailbreak developer GeoSn0w has released a tweak called iSecureOS which could alert the users of security issues found on their devices. The application works akin to an antivirus software, in that it scans the files on the user device and check them against a database of known malware or unsafe repos.
In June 2021, ESET Research has confirmed that malware did exist on one of the piracy repositories in the jailbreak community. The malware actively targeted iSecureOS to try to bypass the detection, but updates to the security app have been quickly released and have mitigated the malware.
Comparison to Android rooting
Jailbreaking of iOS devices has sometimes been compared to "rooting" of Android devices. Although both concepts involve privilege escalation, they do differ in scopes.
Where Android rooting and Jailbreaking are similar is that both are used to grant the owner of the device superuser system-level privileges, which may be transferred to one or more apps. However, unlike iOS phones and tablets, nearly all Android devices already offer an option to allow the user to sideload 3rd-party apps onto the device without having to install from an official source such as the Google Play store. Many Android devices also provide owners the capability to modify or even replace the full operating system after unlocking the bootloader.
In contrast, iOS devices are engineered with security features including a "locked bootloader" which can not be unlocked by the owner to modify the operating system without violating Apple's end-user license agreement. And on iOS, until 2015, while corporations could install private applications onto corporate phones, sideloading unsanctioned, 3rd-party apps onto iOS devices from sources other than the App Store was prohibited for most individual users without a purchased developer membership. After 2015, the ability to install 3rd-party apps became free for all users; however, doing so requires a basic understanding of Xcode and compiling iOS apps.
Jailbreaking an iOS device to defeat all these security restrictions presents a significant technical challenge. Similar to Android, alternative iOS app stores utilizing enterprise certificates are available, offering modified or pirated releases of popular applications and video games, some of which were either previously released through Cydia or are unavailable on the App Store due to these apps not complying with Apple developer guidelines.
Types of jailbreaking tools
Many different types of jailbreaks have come out over the years, differing in how and when the exploit is applied.
When a jailbroken device is booting, it loads Apple's own kernel initially. The device is then exploited and the kernel is patched every time it is turned on. An untethered jailbreak is a jailbreak that does not require any assistance when it reboots up. The kernel will be patched without the help of a computer or an application. These jailbreaks are uncommon and take a significant amount of reverse engineering to create. For this reason, untethered jailbreaks have become much less popular, with none supporting recent iOS versions.
A tethered jailbreak is the opposite of an untethered jailbreak, in the sense that a computer is required to boot. Without a computer running the jailbreaking software, the iOS device will not be able to boot at all. While using a tethered jailbreak, the user will still be able to restart/kill the device's SpringBoard process without needing to reboot. Many early jailbreaks were offered initially as tethered jailbreaks.
This type of jailbreak allows a user to reboot their phone normally, but upon doing so, the jailbreak and any modified code will be effectively disabled, as it will have an unpatched kernel. Any functionality independent of the jailbreak will still run as normal, such as making a phone call, texting, or using App Store applications. To be able to have a patched kernel and run modified code again, the device must be booted using a computer.
This type of jailbreak is like a semi-tethered jailbreak in which when the device reboots, it no longer has a patched kernel, but the key difference is that the kernel can be patched without using a computer. The kernel is usually patched using an application installed on the device without patches. This type of jailbreak has become increasingly popular, with most recent jailbreaks classified as semi-untethered.
History of tools
JailbreakMe and AppSnapp
A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it, and soon a jailbreak-only game app became available. In October 2007, JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod touch, and it included Installer.app as a way to get software for the jailbroken device.
In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.
The iPhone Dev Team, which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod touch, newly including Cydia as the primary third-party installer for jailbroken software. PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.
In November 2008 the iPhone Dev Team released QuickPwn to jailbreak iPhone OS 2.2 on iPhone and iPod touch, with options to enable past functionality that Apple had disabled on certain devices.
After Apple released iOS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac. It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.
purplera1n & blackra1n
George Hotz developed the first iPhone unlock. In 2009, he released a jailbreaking tool for the iPhone 3GS on iPhone OS 3.0 called purplera1n, and blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod touch and other devices.
In October 2010, George Hotz released limera1n, a low-level boot ROM exploit that permanently works to jailbreak the iPhone 4 and is used as a part of tools including redsn0w.
Spirit and JailbreakMe
Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010. Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iOS 3.2. In August 2010, comex released JailbreakMe 2.0, the first web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1). In July 2011, he released JailbreakMe 3.0, a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3). It used a flaw in PDF file rendering in mobile Safari.
Chronic Dev Team initially released Greenpois0n in October 2010, a desktop-based tool for jailbreaking iOS 4.1 and later iOS 4.2.1 on most devices including the Apple TV, as well as iOS 4.2.6 on CDMA (Verizon) iPhones.
As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod touch (3rd and 4th generation). As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod touch models that support iOS 5.1.1.
The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S. In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod touch models that support iOS 5.1.1, including jailbreaking the third-generation iPad for the first time.
The hackers together called the evad3rs released an iOS 6.X jailbreak tool called "evasi0n" available for Linux, OS X, and Windows on Monday, February 4, 2013, at noon Eastern Standard Time. Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.
In April 2013, the latest versions of Sn0wbreeze was released, which added the support for tethered jailbreaking on A4 devices (i.e. devices not newer than the iPhone 4, iPad (1st generation), or iPod touch (4th generation)).
evasi0n7 and p0sixpwn
On December 22, 2013, the evad3rs released a new version of evasi0n that supports jailbreaking iOS 7.0.x, known as evasi0n7. On December 30, 2013, winocm, ih8sn0w and SquiffyPwn released p0sixspwn for untethering devices on iOS 6.1.3 – 6.1.5. Initially, it was necessary to jailbreak tethered using redsn0w and install p0sixpwn at Cydia. A few days later, on January 4, 2014, the same team released a version of p0sixpwn for jailbreaking using a computer.
iOS 7.1 patched the exploits used by evasi0n7, and on June 23, 2014, Pangu, a Chinese untethered jailbreak was released for iOS 7.1.
On October 22, 2014, Pangu Team released Pangu8 to jailbreak all devices running iOS 8–8.1. The first versions did not bundle Cydia, nor was there an iOS 8 compatible version of Cydia at the time.
On November 29, 2014, TaiG team released their jailbreak tool called "TaiG" for devices running iOS 8.0–8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2. On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0–8.4.
On 10 September 2015, 6 days before iOS 9 was released, iH8sn0w had demonstrated a working exploit on his Twitter page, linking to a YouTube video.
On October 14, 2015, Pangu Team released Pangu9, their jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.
On July 17, 2016, Pangu Team released Pangu93, a semi-untethered jailbreak tool for iOS 9.2–9.3.3. It was the first semi-untethered jailbreak and at the same time made within a sideloaded app, and included support only for 64bit devices.
On mid-March 2017, jk9357 (aka @REALKJCMEMBER), part of the KJC (Kim Jong Cracks) hacking team released the first semi-untethered jailbreak for 32bit devices on 9.1–9.3.4. This jailbreak made use of some of the Pegasus vulnerabilities.
yalu+mach_portal and extra_recipe
On December 21, 2016, well-known hacker Luca Todesco released a beta semi-untethered jailbreak tool for iOS 10.1 known as yalu+mach_portal for select 64-bit iOS devices. The jailbreak made use of Ian Beer's, of Google Project Zero, mach_portal exploit. This version is extremely unstable and was only meant for developers. On January 26, 2017, with help from Marco Grassi, a more stable version for iOS 10.2 was released, eventually supporting all 64-bit iOS devices except for the iPhone 7 and 7 Plus, which is only supported by the older, more unstable version for 10.1.1. This jailbreak made use of Ian Beer's, of Project Zero, extra_recipe exploit. Both jailbreaks are installed through a computer application known as Cydia Impactor, which allows signing of apps not in the App Store. Todesco said that the newer version would be eventually updated to support the iPhone 7 and 7 Plus up to iOS 10.1.1, however, he left the jailbreaking scene on March 28, abandoning both jailbreaks before it was released.
On August 6, 2017, Siguza and tihmstar released the semi-untethered Phoenix jailbreak for 32-bit devices on iOS 9.3.5.
On September 19, 2017, tihmstar released EtasonJB, a jailbreak for all 32-bit devices on iOS 8.4.1. An exploit was found so that users of the 9.3.5 Phoenix jailbreak could downgrade to 8.4.1 without the use of SHSH blobs as 8.4.1 is an unsigned version of iOS.
On October 15, 2017, the hacker Abraham Masri (known on Twitter as @cheesecakeufo) released the Saïgon jailbreak for all 64-bit devices on iOS 10.2.1.
On December 6, 2017, Abraham Masri released Houdini, the first semi-jailbreak for iOS 10, compatible with iOS 10.x up to 10.3.2 for all 64-bit devices. The application allows installation of themes, resolution changes etc. from basic Cydia repos. It is untethered, but it needs to run the exploit again to install content. The tool has been updated to beta revision 1, adding the compatibility with iOS 11 up to 11.1.2.
On December 11, 2017, Ian Beer released async_wake, an iOS 11.0 up to 11.1.2 exploit that allows tfp0. The exploit has been updated and it has allowed jailbreak apps on jailed devices such as FilzaJailed, FilzaEscaped (which allows root access on a jailed device), MTerminal-Jailed by Ayden Panhuyzen (which allows the execution of commands on a jailed device) and Torngat by 1GamerDev (a tweak manager that can set a boot logo, change resolution, disable OTA updates and more on a jailed device).
On December 23, 2017, Abraham Masri released to.panga, an iOS 11 up to 11.1.2 WIP jailbreak for developers based on the async_wake exploit by Ian Beer. It has Cydia included but since the jailbreak used a KPPless exploit, Cydia and Substrate have to be rewritten. Abraham Masri has since stated that the project wouldn't be updated due to other tools with the same goal.
On December 24, 2017, tihmstar released h3lix, a semi-untethered jailbreak for all 32-bit devices, compatible with all iOS 10 versions.
Shortly after the release of h3lix, tihmstar and Siguza released doubleH3lix, a semi-untethered jailbreak for 64bit devices (excluding the iPhone 7) on iOS 10.x.
On December 26, 2017, the hacker Jonathan Levin (known on Twitter as @Morpheus____) released LiberiOS, a WIP developer-only jailbreak based on the async_wake exploit by Ian Beer for iOS 11.0 to iOS 11.1.2. Jonathan Levin later stated that LiberiOS would not be officially released with Cydia.
On January 29, 2018, Zimperium, whose goal is to assess issues and locate a possible iOS sandbox escape, released two crucial bugs, one of which is a major vulnerability that leads to execution of arbitrary code on different crucial daemons, found in iOS 11.2 up to 11.2.2. The second bug is a full relative (ASLR bypass) control on the stack in CoreBluetooth, that leads to memory corruption (also on 11.2 – 11.2.2).
On February 26, 2018, developer CoolStar (known on Twitter as @CStar_OW) released a public version of the Electra jailbreak for iOS devices on 11.0–11.1.2. This jailbreak uses a KPPless exploit. As Cydia Substrate had not been updated for iOS 11, Electra uses a Substrate alternative known as Substitute.
On June 6, 2018, Abraham Masri released an update to Houdini, the first semi-jailbreak. The tool has been updated to beta 3 revision 1, adding the compatibility with iOS 11 up to 11.3.1.
On July 6, 2018, developer CoolStar updated the Electra jailbreak for iOS devices on 11.0–11.3.1 (it previously only supported up to 11.1.2). It continued to use a KPPless exploit and Substitute in place of Cydia Substrate.
On August 17, 2018, developer Ben Sparkes released a public version of Meridian, a jailbreak for iOS versions 10.x on all 64-bit devices.
Totally Not Spyware and JakeBlair420
On September 3, 2018, a web-based jailbreak called "Totally Not Spyware" was released by an unknown user named "JakeBlair420". It eventually came out that it was developed by FoxletFox, Ben Sparkes, littlelailo, siguza, stek29, and was based on the works of 5aelo, Ian Beer, Niklas B, Jamie Bishop, Luca Todesco, REALKJCMEMBER, Sam Bingner, sticktron, theninjaprawn, tihmstar, and xerub. It used a WebKit-based exploit to bootstrap either Meridian or doubleh3lix.
unc0ver iOS 11
On October 14, 2018, former Electra team member and developer Pwn20wnd (known on Twitter as @Pwn20wnd) released a public version of the unc0ver jailbreak for iOS devices on 11.0–11.4.1. This jailbreak uses the three KPPless exploits provided by Ian Beer for iOS 11 (async_wake, empty_list and multi_path). Sam Bingner, Pwn20wnd's associate, also worked with Jay Freeman, the original developer of Cydia, to get Cydia Substrate reupdated to iOS 11. It was released on December 17, 2018.
Osiris Jailbreak for iOS 12
On February 1, 2019, developer (GeoSn0w) released the very first proof of concept for a jailbreak compatible with iOS 12.0 to iOS 12.1.2, called Osiris Jailbreak / OsirisJailbreak12. It was a developer-only jailbreak meant to demonstrate how a basic jailbreak can be achieved on iOS 12 using the new tfp0 kernel exploit released at that time by Google Project Zero security researcher, Brandon Azad. OsirisJailbreak12 has then been released as Open Source on GitHub, but remained developer-only and thus incomplete.
unc0ver iOS 12
On February 22, 2019, developer (Pwn20wnd) released a public update for the unc0ver jailbreak for iOS devices on 12.0–12.1.2. This version of unc0ver uses exploits provided by tihmstar and SorryMyBad for iOS 12 (v1ntex, v3ntex, and voucher_swap). Pwn20wnd once again worked with Jay Freeman to get Cydia and Cydia Substrate updated to work on iOS 12.
On April 29, 2019, the Electra team released Chimera, a public jailbreak for iOS 12.0–12.1.2, which included support for all devices, including devices with A12 chips, which had major security reinforcements compared to other devices. This jailbreak uses Substitute, an alternative to Cydia Substrate, to allow tweaks to run.
On June 12, 2019, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 12.1.2–12.2. The jailbreak did not support A8 and A7 devices to begin with, but support for those devices has now been added for iOS 12.1.2–12.2.
On August 18, 2019, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 12.4 following a mistake by Apple that reintroduced the vulnerabilities patched in 12.3. This version of unc0ver used the sock_puppet exploit, developed by Ned Williamson and the sock_port exploit, developed by Jake James.
checkm8 and checkra1n
On September 27, 2019, security researcher (axi0mX) released an exploit for some iPhone bootroms dubbed checkm8 (read as checkmate), that executes when the device is started up, and cannot be patched by Apple. This exploit affects A5-A11 (iPhone 4s–iPhone X) devices, and due to the nature of the exploit it supports any iOS version running on these supported devices. According to the developer, an exploit this powerful has not been released since 2010. Although checkm8 is purely an exploit tool, and not a jailbreak tool, a semi-tethered jailbreak has been achieved as of September 27, 2019, and a beta version of checkra1n, a jailbreak tool that uses checkm8 has been released for macOS and Linux, with a windows version in the works.
On December 9, 2019, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 12.4.1. This version of unc0ver used the AppleAVE2Driver exploit, developed by 08Tc3wBB, who submitted/sold the exploit to ZecOps for the Task-For-Pwn 0 Bounty.
On January 22, 2020, tihmstar released EtasonATV, a jailbreak for Apple TV (3rd generation Rev A) on iOS 8.4.1–8.4.4.
On January 28, 2020, tihmstar released a public update to the EtasonATV jailbreak, to add support for Apple TV (3rd generation).
unc0ver iOS 13
On February 15, 2020, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 13.0–13.3 for A12 and A13 devices. The jailbreak did not support A11 and below devices to begin with, but has since been updated to do so.
On May 20, 2020, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 13.3.1-13.5 for all devices that support that version range.
On June 9, 2020, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 13.5.5~b1.
unc0ver iOS 14
On February 27, 2021, developer (Pwn20wnd) released a public update to the unc0ver jailbreak, to add support for iOS 14.0-14.3 for all devices that support that version range, alongside 12.4.9-12.5.1 and 13.5.1-13.7
By device and OS
|Device||OS||Release date||Jailbreak date||Jailbroken|
|iPhone 2G||iPhone OS 1.0||June 29, 2007||July 10, 2007||11||(no name)||iPhone Dev Team|
|iPod touch||September 5, 2007||October 10, 2007||35||JailbreakMe||niacin and dre|
|iPhone 3G||iPhone OS 2.0||July 11, 2008||July 20, 2008||9||PwnageTool||iPhone Dev Team|
|iPod touch (2nd generation)||September 9, 2008||January 30, 2009||143||redsn0w||iPhone Dev Team and Chronic Dev Team|
|iPhone OS 3.0||June 17, 2009||June 19, 2009||2||PwnageTool||iPhone Dev Team|
|iPhone 3GS||June 19, 2009||July 3, 2009||14||purplera1n||George Hotz|
|iPad||April 30, 2010||May 3, 2010||3||Spirit||comex|
|iOS 4.0||June 21, 2010||June 23, 2010||2||PwnageTool||iPhone Dev Team|
|iPhone 4||June 24, 2010||August 1, 2010||38||JailbreakMe 2.0||comex|
|Apple TV (2nd generation)||September 1, 2010||October 20, 2010||49||PwnageTool||iPhone Dev Team|
|iPad 2||March 11, 2011||July 5, 2011||116||JailbreakMe 3.0||comex|
|iOS 5.0||October 12, 2011||October 13, 2011||1||redsn0w||iPhone Dev Team|
|iPhone 4S||October 14, 2011||January 20, 2012||98||Absinthe||pod2g, Chronic Dev Team, iPhone Dev Team|
|iPad (3rd generation)||March 16, 2012||May 25, 2012||70||Absinthe 2.0||pod2g, Chronic Dev Team, iPhone Dev Team|
|iOS 6.0||September 19, 2012||September 19, 2012||0||redsn0w||iPhone Dev Team|
|iPhone 5||September 21, 2012||February 4, 2013||136||evasi0n||evad3rs|
|iPod touch (5th generation)||October 23, 2012||February 4, 2013||104||evasi0n||evad3rs|
|iPad (4th generation)||November 2, 2012||February 4, 2013||94||evasi0n||evad3rs|
|iPad Mini||November 2, 2012||February 4, 2013||94||evasi0n||evad3rs|
|iOS 7||September 18, 2013||December 22, 2013||95||evasi0n7||evad3rs|
|iPhone 5C||September 20, 2013||December 22, 2013||93||evasi0n7||evad3rs|
|iPhone 5S||September 20, 2013||December 22, 2013||93||evasi0n7||evad3rs|
|iPad Air||November 1, 2013||December 22, 2013||51||evasi0n7||evad3rs|
|iPad Mini 2||November 12, 2013||December 22, 2013||40||evasi0n7||evad3rs|
|iOS 8||September 17, 2014||October 22, 2014||35||Pangu8||Pangu Team|
|iPhone 6||September 19, 2014||October 22, 2014||33||Pangu8||Pangu Team|
|iPhone 6 Plus||September 19, 2014||October 22, 2014||33||Pangu8||Pangu Team|
|iPad Air 2||October 22, 2014||October 22, 2014||0||Pangu8||Pangu Team|
|iPad Mini 3||October 22, 2014||October 22, 2014||0||Pangu8||Pangu Team|
|iPod touch (6th generation)||July 15, 2015||July 16, 2015||1||TaiG, PP Jailbreak||TaiG, PP Jailbreak|
|iOS 9||September 16, 2015||October 14, 2015||28||Pangu9||Pangu Team|
|iPhone 6S||September 25, 2015||October 14, 2015||19||Pangu9||Pangu Team|
|iPhone 6S Plus||September 25, 2015||October 14, 2015||19||Pangu9||Pangu Team|
|iPad Mini 4||September 9, 2015||October 14, 2015||35||Pangu9||Pangu Team|
|iPad Pro||November 11, 2015||March 11, 2016||121||Pangu9||Pangu Team|
|Apple TV (4th generation)||September 9, 2015||March 23, 2016||196||Pangu9||Pangu Team|
|iPhone SE (1st generation)||March 31, 2016||July 24, 2016||115||PPJailbreak||PPJailbreak, Pangu Team|
|iOS 10||September 13, 2016||December 21, 2016||99||Yalu||Luca Todesco|
|iOS 11||September 19, 2017||December 26, 2017||98||LiberiOS, Electra, Unc0ver and Osiris Jailbreak (developers only)||Jonathan Levin, Pwn20wnd, CoolStar, GeoSn0w|
|IOS 12||September 17, 2018||February 22, 2019||158||unc0ver, Chimera, checkra1n, and Osiris Jailbreak (developers only)||Pwn20wnd, CoolStar, sbingner, Ian Beer, Brandon Azad, Jonathan Levin, PsychoTea, xerub, ninjaprawn, stek29, GeoSn0w|
|IOS 13||September 19, 2019||October 13, 2019||24||unc0ver, Odyssey and checkra1n||Pwn20wnd,CoolStar, sbingner, Ian Beer, Brandon Azad, Jonathan Levin, PsychoTea, xerub, ninjaprawn, stek29|
|Apple A10 and below (officially supported)|
Apple A11 (preliminary support)
|iOS 14||September 16, 2020||September 21, 2020||5||checkra1n||qwertyoruiop, argp, axi0mX, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, sbingner, Siguza|
|Apple A14 and below||iOS 14||September 16, 2020||February 27, 2021||164||unc0ver, Taurine||Pwn20wnd, CoolStar, Sam Bingner, Siguza, Jake James, Ubik, Dennis Bednarz, exDeveloper|
Table of tools
|JailbreakMe 3.0||July 5, 2011||||1||4.2.6||4.2.8|
4.3 – 4.3.3[a]
|Seas0npass||October 18, 2011||2nd generation Apple TV||4.3||5.3|
|4.3 – 5.3|
|redsn0w 0.9.15 beta 3||November 1, 2012||1||1||4.1||6.1.6|
|iPhone Dev Team|
|Absinthe 2.0.4||May 30, 2012||1||5.1.1||Yes||pod2g, Chronic Dev Team, iPhone Dev Team|
|evasi0n||February 4, 2013||6.0||6.1.2||Yes||pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)|
|evasi0n7||December 22, 2013||5||7.0||7.0.6||Yes||pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)|
|p0sixspwn||December 30, 2013||6.1.3||6.1.6||Yes||winocm, iH8sn0w, and SquiffyPwn|
|Pangu||June 23, 2014||5||7.1||7.1.2||Yes||dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)|
|Pangu8||October 22, 2014||5||8.0||8.1||Yes||windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)|
|TaiG||November 29, 2014||8.0||8.4||Yes||TaiG|
|PPJailbreak||January 18, 2015||8.0||8.4||Yes||PanguTeam and PPJailbreak|
|Pangu9||October 14, 2015||9.0||9.1||Yes||PanguTeam|
|Pangu9||March 23, 2016||4th generation Apple TV||9.0||9.0.1||Yes||PanguTeam|
|LiberTV||March 3, 2017||4th generation Apple TV||9.1||10.1||Semi-Untethered||Marco Grassi, Luca Todesco, Jonathan Levin|
|LiberTV 1.1||December 24, 2017||4th & 5th generation (4K) Apple TV||11.0||11.1||Semi-Untethered||Marco Grassi, Luca Todesco, Jonathan Levin|
|PPJailbreak||July 24, 2016||9.2||9.3.3||Semi-Untethered||PanguTeam and PPJailbreak|
|mach_portal + Yalu||December 22, 2016||Pro||10.0.1||10.1.1 (depends on device)||Semi-Untethered||Luca Todesco|
|yalu102||January 26, 2017||6||10.0.1||10.2||Semi-Untethered||Luca Todesco and Marco Grassi|
|Phœnix||August 6, 2017||9.3.5||Semi-Untethered||Siguza and tihmstar|
|Etason||September 19, 2017||8.4.1||Yes||tihmstar|
|Saïgon||October 15, 2017||10.2.1||Semi-Untethered||Abraham Masri|
|h3lix||December 24, 2017||10.0||10.3.4||Semi-Untethered||tihmstar|
|Meridian||January 4, 2018||10.0||10.3.3||Semi-Untethered||Sparkey, Ian Beer, Siguza, xerub, stek29, theninjaprawn, ARX8x, cheesecakeufo, FoxletFox, Sticktron, nullpixel, arpolix, EthanRDoesMC, CydiaBen, Comsecuris UG, Brandon Saldan, Lepidus, Cryptic, Samg_is_a_Ninja, M1sta|
|g0blin||January 13, 2018||10.3||10.3.3||Semi-Untethered||Sticktron, Siguza, Ian Beer, windknown, Luca Todesco, xerub, tihmstar, saurik, uroboro, Abraham Masri, arx8x, PsychoTea, Cryptic|
|Spyware.lol||September 7, 2018||iPod Touch (6th Gen)||10.0||10.3.3||Semi-Untethered||JakeBlair420|
|LiberiOS||December 25, 2017||11.0||11.1.2||Semi-Untethered||Marco Grassi, Luca Todesco, Jonathan Levin, Ian Beer|
|Electra1112||January 12, 2018||11.0||11.1.2||Semi-Untethered||CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, stek29, angelXwind, comex, isklikas, and goeo_, DHowett, and rpetrich|
|Electra1131||July 7, 2018||11.0||11.4.1||Semi-Untethered||CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, Brandon Azad, stek29, Jamie Bishop, Pwn20wnd|
|ElectraTV||July 12, 2018||4th generation Apple TV||11.0||11.4.1||Semi-Untethered||nitoTV|
|unc0ver||October 13, 2018||11.0||13.5.5~b1 (excludes 13.5.1)||Semi-Untethered||Pwn20wnd, Sam Bingner, Ian Beer, Brandon Azad, Jonathan Levin, xerub, sparkey, stek29, theninjaprawn|
|Chimera||April 30, 2019||12.0||12.5.1||Semi-Untethered||Coolstar, Jamie Bishop, tri'angle, ninjaprawn, Brandon Azad, PsychoTea, Ayden Panhuyzen, Umang Raghuvanshi, aesign|
|checkra1n||November 10, 2019||12.0+||14.5||Semi-Tethered||argp, axi0mx, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza, haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini, Cellebrite, et al.|
|EtasonATV||January 22, 2020||3rd generation Apple TV||7.4+||Yes||tihmstar|
|Odyssey||August 28, 2020||All iPads that support iOS 13||iPhone 6s or newer||7||13.0||13.7||Semi-Untethered||CoolStar, Hayden Seay, 23Aaron, Tihmstar|
|unc0ver||February 27, 2021||A14 and below that support iOS 14||A14 and below that support iOS 14||A10 and below that support iOS 14||14.0||14.3||Semi-Untethered||Pwn20wnd, Sam Bingner, Siguza, Jake James, Ubik, Dennis Bednarz, exDeveloper|
|Taurine||April 1, 2021||A14 and below that support iOS 14||A14 and below that support iOS 14||A10 and below that support iOS 14||14.0||14.3||Semi-Untethered||CoolStar, tihmstar, Diatrus, 23 Aaron, ModernPwner, pattern-f|
History of exploit-disabling patch releases
Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original evasi0n iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Bootrom exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.
On July 15, 2011, Apple released a new iOS version that closed the exploit used in JailbreakMe 3.0. The German Federal Office for Information Security had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or malware unwillingly downloaded by iOS users clicking on maliciously crafted PDF files. Before Apple released a fix for this security hole, jailbreak users had access to a fix published by the developer of JailbreakMe.
On January 27, 2015, Apple released iOS 8.1.3 that patched up the exploits used in jailbreak for iOS 8.0–8.1.2. It was not possible to jailbreak until the iOS 8.3 update.
On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.
On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.
On October 21, 2015, seven days after the Pangu iOS 9.0–9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.
On August 4, 2016, Apple released iOS version 9.3.4 to patch the semi-untethered jailbreak for 64-bit devices.
On August 25, 2016, Apple released iOS version 9.3.5 to patch three important vulnerabilities used for the secret jailbreak from the Pegasus Malware from the NSO Group.
On January 23, 2017, Apple released iOS 10.2.1 to patch jailbreak exploits released by Google for the Yalu iOS 10 jailbreak created by Luca Todesco.
On December 2, 2017, iOS 11.2 was released and included a patch to the async_wake exploit by Ian Beer of Google Project Zero.
On May 29, 2018, iOS 11.4 was released, including a patch to 2 exploits (empty_list and multi_path) by Ian Beer of Google Project Zero.
On January 22, 2019, iOS 12.1.3 was released, including a patch to an exploit (voucher_swap), found independently by both Brandon Azad of Google Project Zero, and Zhuo Liang of Qihoo 360 Nirvan Team.
On May 13, 2019, iOS 12.3 was released, including a patch to an exploit (sock_puppet) by Ned Williamson of Google Project Zero. However, on the 18th of August 2019, it became known that Apple accidentally reintroduced these vulnerabilities in iOS 12.4, making it possible to jailbreak 12.4 with the same exploits as pre-12.3 versions.
On August 26, 2019, Apple released the 12.4.1 update, re-patching the exploit (sock_puppet) by Ned Williamson of Google Project Zero.
On November 10, 2019, a group of developers released a jailbreak named "Checkra1n", which exploits the chips found in devices ranging from A5-A11 devices. This was the first jailbreak to feature a bootrom exploit in a decade. The tool utilizes the "Checkm8" exploit developed by Axi0mX.
On December 10, 2019, Apple used DMCA takedown requests to remove posts from Twitter. The tweet contained an encryption key that could potentially be used to reverse engineer the iPhone's Secure Enclave. Apple later retracted the claim, and the tweet was reinstated.
On June 1, 2020, Apple released the 13.5.1 update, patching the 0 day exploit used by the Unc0ver jailbreak.
The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting digital rights management (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.
International treaties have influenced the development of laws affecting jailbreaking. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software, but member states vary on the implementation of the directive.
While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one. Apple has also regularly (though possibly somewhat jokingly) thanked jailbreak communities for detecting security holes in iOS release notes.
Apple's support article concerning jailbreaking claims that they "may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software." Therefore, anyone who is jailbroken, warranty or not, may or may not get support from Apple considering assistance with jailbreaking.
In 2010, Electronic Frontiers Australia said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply. These laws had been strengthened by the Copyright Amendment Act 2006.
In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with DRM protection, with exceptions including software interoperability. Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.
There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive, but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.
India's copyright law permits circumventing DRM for non-copyright-infringing purposes. Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012. India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.
New Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes. This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.
Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.
The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court. Competition laws may also be relevant.
The main law that affects the legality of iOS jailbreaking in the United States is the 1998 Digital Millennium Copyright Act (DMCA), which says "no person shall circumvent a technological measure that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking. Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally, and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets. It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning. It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.
In 2010, Apple announced that jailbreaking "can violate the warranty". This may be affected by the Magnuson–Moss Warranty Act.
Digital Millennium Copyright Act exemptions
In 2007, Tim Wu, a professor at Columbia Law School, argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun." Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA. Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.
In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.Apple had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010, that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects. The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013. In 2015, these exemptions were extended to include other devices, including tablets.
BigBoss (previously TheBigBoss.org) is a software repository and blog for jailbreaking. It publishes news on the topic and allows developers to host tweaks and other extensions. It was one of the first repositories to exist for the Cydia package manager, launched in April 2008 by Sleepers Repository. It comes preinstalled with all copies of Cydia.
While the majority of the packages are for older iOS versions, it still receives a steady flow of new packages. While it was originally founded by pseudonymous developer and namesake, BigBoss, it is currently run by 0ptimo, who maintains it and ensures its reliability.
In addition to the news and software hosting website, BigBoss also distributed many utilities that ran on jailbroken devices. These included SBSettings, BossPrefs, BossPaper, Categories, and Flashlight.
On October 18, 2008, the site rebranded from Sleepers Repository to TheBigBoss.
On March 8, 2009, Cydia Store launched, allowing users to purchase software products from the repository. Previously, it had only consisted of free software.
In July 2014, the website was hacked, leaking the entire database and collection of packages (including paid products).
In November 2017, other significant early Cydia Store repositories, ModMy and ZodTTD, shut down, making BigBoss one of the last original repositories standing.
In December 2018, the Cydia Store shut down, meaning that no new packages could be purchased.
Security, privacy and stability
The first iPhoneworm, iKee, appeared in early November 2009, created by a 21-year-old Australian student in the town of Wollongong. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an SSH service, which those users can leave in the default insecure state. In the same month, F-Secure reported on a new malicious worm compromising bank transactions from jailbroken phones in the Netherlands, similarly affecting devices where the owner had installed SSH without changing the default password.
In 2010 blogger John Gruber, who is close to Apple, said that users misunderstood some jailbreak exploits and that they were more serious than they appear. He commented that "it's odd how the press is mostly covering this as 'jailbreaking now more convenient' rather than 'remote code exploit now in the wild'", pointing out that the exploit allowed the creator of a malicious website to take control of iPhones accessing it. Restoring a device with iTunes removes a jailbreak. However, doing so generally updates the device to the latest, and possibly non-jailbreakable, version, due to Apple's use of SHSH blobs. There are many applications that aim to prevent this, by restoring the devices to the same version they are currently running whilst removing the jailbreaks. Examples are, Succession, Semi-Restore and Cydia Eraser.
In 2012, Forbes staff analyzed a UCSB study on 1,407 free programs available from Apple and a third-party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple's App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones. Also, a program available in Cydia called PrivaCy allows user to control the upload of usage statistics to remote servers.
In August 2015, the KeyRaider malware was discovered, affecting only jailbroken iPhones.
In recent years, due to the technical complexity and often rarity of legitimate jailbreaking software, most especially untethered jailbreaks, there has been an increase in fake websites which falsely claim to jailbreak iOS devices. These websites often ask payment or make heavy use of advertising, but have no jailbreak to offer. Others install a fake, lookalike version of the Cydia package manager. In some cases, users have been asked to download free-to-play apps or fill out surveys to complete a (non-existent) jailbreak.
- ^The Verizon CDMA iPhone 4 ran on iOS 4.2.5 to 4.2.10, with incremental updates being bugfixes that were simultaneously applied from 4.3.1 to 4.3.5.
- ^"Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on April 3, 2019. Retrieved March 12, 2019.
- ^Chris Foresman (December 13, 2010). "iPhone jailbreaker set to bring Cydia to Mac OS X". Ars Technica. Condé Nast. Archived from the original on August 21, 2011. Retrieved August 2, 2011.
- ^Steve Kovach (13 April 2013). "Frustration Builds With Apple's Inconsistent Rules For App Developers". Business Insider. Archived from the original on 6 August 2013. Retrieved 23 August 2013.
- ^Ryan Singel (April 15, 2010). "Apple App Store Bans Pulitzer-Winning Satirist for Satire". Wired. Archived from the original on March 26, 2011. Retrieved February 12, 2011.
- ^"Rejected Apps". imore.com. Archived from the original on 2014-07-15. Retrieved 2017-02-19.
- ^"Jailbreak! New Rules Allow Unapproved iPhone Apps". Fox News. 2015-03-27. Archived from the original on 2013-05-21. Retrieved 2012-12-07.
- ^ abAdam Dachis (March 14, 2011). "How to Get the Most Out of Your Jailbroken iOS Device". Lifehacker. Gawker Media. Archived from the original on December 25, 2015. Retrieved August 2, 2011.
- ^Jenna Wortham (May 12, 2009). "Unofficial Software Incurs Apple's Wrath". The New York Times. Archived from the original on December 22, 2013. Retrieved August 2, 2011.
- ^Zdziarski, Jonathan (2008). iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain. pp. 3–4. ISBN . Archived from the original on 2017-02-19.
- ^Landau, Ted (2009). Take control of your iPhone. p. 107. ISBN . Archived from the original on 2017-02-19.
- ^Nathan T. Washburn (May 4, 2012). "Apple Discovers a New Market in China: Rich Boyfriends". HBR Blog Network. Harvard Business Review. Archived from the original on November 9, 2012. Retrieved January 9, 2013.
- ^Manalo, Amboy. "60 iOS Features Apple Stole from Jailbreakers". Gadget Hacks. Retrieved 22 October 2020.
Jailbreak iOS 14 – iOS 14.7.1: Everything You Need to Know!
Looking to jailbreak your iPhone running iOS 14 – iOS 14.7? Here’s everything you need to know about jailbreaking it.
The first iOS 14 jailbreak tool was available soon after the OS was released Checkra1n jailbreak. However, Checkra1n only supports jailbreaking iOS 14 – iOS 14.3 and a limited number of devices, thereby limiting its usefulness. The Unc0ver team has been the first to come out with a proper iOS 14 jailbreak that works with the iPhone 11 and iPhone 12 series.
If you are wondering if jailbreaking your iPhone is still worth it, check out the top reasons why people jailbreak their iPhone in 2021.
Please find the latest iOS 14.7.1 – iOS 14 jailbreak status:
Checkra1n Jailbreak for iOS 14
Checkra1n, based on the checkm8 bootrom exploit, already supports jailbreaking iOS 14 – iOS 14.3. However, the problem is that the tool only works on older iPhones and iPads using the A10/A10X, A9, and older chips. This means it is currently only possible to jailbreak a handful of iPhones and iPads using checkra1n running iOS 14 – iOS 14.3:
- iPhone 7
- iPhone 7 Plus
- iPhone 6s
- iPhone 6s Plus
- iPhone SE
- iPad mini 4
- iPad Air 2
- iPad 5
- iPad Pro 1st gen
Checkra1n also supports jailbreaking iPhone X, iPhone 8, and iPhone 8 Plus, but the problem is that it requires one to turn off passcode, Face ID, and/or Touch ID. With Face ID/passcode set, jailbreaking an iPhone X/iPhone 8 will lead to stability issues. It does not support iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, or the latest iPhone 12, iPhone 12 mini, iPhone 12 Pro, and iPhone 12 Pro Max.
Checkra1n has so far received multiple updates to improve its iOS 14 – iOS 14.3 jailbreak support, but it is unlikely that the team will resolve the issues with iPhone X and iPhone 8 series.
Unc0ver iOS 14 – iOS 14.3 Jailbreak
Apart from Checkra1n, there’s the Unc0ver iOS 14 – iOS 14.3 jailbreak. It is based on a custom exploit that’s similar to the cicuta_verosa exploit as detailed by @ModernPwner. Unc0ver 6.0 for iOS 14 – iOS 14.3 is a full-fledged jailbreak since it supports tweak injection via Substitute and has Cydia for package management.
UnC0ver iOS 14 – iOS 14.3 jailbreak supports the following iPhones and iPad:
- iPhone 6s
- iPhone 6s Plus
- iPhone 7
- iPhone 7 Plus
- iPhone SE (2016)
- iPhone SE (2020)
- iPhone 8
- iPhone 8 Plus
- iPhone X
- iPhone XR
- iPhone XS
- iPhone XS Max
- iPhone 11 Pro
- iPhone 11 Pro Max
- iPhone 11
- iPhone 12 mini
- iPhone 12
- iPhone 12 Pro
- iPhone 12 Pro Max
- 2020 iPad Pro
- 2018 iPad Pro
- 2017 iPad Pro
- iPad Air 4
- iPad Air 3
- iPad Air 2
- iPad mini 5
- iPad mini 4
- 5th/6th/7th gen iPad
Basically, as long as you have an iPhone or iPad running iOS 14 – iOS 14.3, you can jailbreak it using the latest release of Unc0ver.
➤ Read: How to Jailbreak iOS 14 – iOS 14.3 on iPhone or iPad Using Unc0ver Jailbreak
Taurine Jailbreak for iOS 14 – iOS 14.3
Apart from Unc0ver, there’s also Taurine jailbreak from CoolStar and his team for iOS 14 – iOS 14.3. Taurine jailbreak for iOS 14 – iOS 14.3 uses Sileo as its default package manager, which is vastly superior to Cydia — the default package manager of Unc0ver. Additionally, it uses Libhooker for tweak injection, which offers granular control over each installed tweak.
You can find the steps to jailbreak your iPhone running iOS 14 – iOS 14.3 using Taurine jailbreak here. If your iPhone is already jailbroken using Unc0ver, you can switch over to Taurine jailbreak by following this guide.
You can also check out our post if you need to remove jailbreak from your iPhone if you face any issues.
Things You Must Do After Jailbreaking iOS 15
After you have successfully jailbroken your iPhone, check out the best iOS 15 jailbreak related posts to make the most of the iOS 15 jailbreak:
Can You Downgrade Your iPhone from iOS 14.4 to iOS 14 – iOS 14.3?
Sadly, Unc0ver jailbreak only supports iOS 14 – iOS 14.3. This is because Apple has patched the exploit detailed by @ModernPwner in iOS 14.4. Due to this, you will not be able to jailbreak your iPhone if it is running iOS 14.4 or iOS 14.5.
More importantly, since Apple is no longer signing iOS 14.3, there’s no way to downgrade your iPhone or iPad back to it. If you have the necessary SHSH blobs saved, you can upgrade your iPhone to iOS 14.3. However, doing this requires a jailbroken iPhone in the very first place.
Can You Jailbreak iOS 14.5 – iOS 14.7.1?
The circusa_exploit only works on iOS 14 – iOS 14.3. @ModernPwner did hint at another exploit for iOS 14.5 – iOS 14.5.1, but he has not revealed any more information about it yet. So it is not possible to jailbreak iOS 14.7.1 – iOS 14.4 currently.
Check out the latest news and updates about the iOS 14 – iOS 14.7.1 jailbreak below.
This post was last updated on July 31, 2021.
Is jailbreaking dead? No. A quick search on Twitter or on Reddit, and it’s obvious that the passion for jailbreaking continues to ebb and flow throughout the community. Jailbreaking isn’t dead as some may think, but no one can discount the fact that it’s entered a sustained lull.
Such a lull is normal for jailbreaking, as there have always been periods of downtime when no public jailbreak is available for the latest iOS firmware. Jailbreaking is cyclical. We’ve seen this happen time and again, and the same holds true for this latest lull.
However, as we get deeper into the overall iOS lifecycle, and as new abilities like sideloading become a reality, the motivation to jailbreak has lessened for many.
Jailbreaking originally sprung from an intense desire to run native applications on the iPhone, and we’ve long passed such a need. In fact, many of the motivations for jailbreaking have been addressed by Apple in the past few major iOS updates.
The state of jailbreak
The last widely-usable jailbreak was released back in October of 2015. That means that it’s been over six months since we last saw a public jailbreak released that really mattered. I’m not counting the iOS 9.1 jailbreak that was released back in March, because by then, most users were already upgraded to a later firmware version with no way to downgrade.
I’m also quick to dismiss the recent Apple TV 4 jailbreak. Although the efforts made to bring a tvOS jailbreak to reality are admirable, like the iOS 9.1 jailbreak for iOS, only a handful of users could actually benefit from it.
In the half-year or so since the last public release, there have been rumors of new jailbreaks, people posing as hackers pretending to have their own jailbreak, etc. The fact is that no one knows, despite what they may claim, when a jailbreak for iOS 9.3.1 or above will be released. The only people who know are the people doing the actual work, and perhaps a few close associates around them.
Given the current state of jailbreaking, sideloading has risen as an alternative of sorts. Of course, sideloading will never outright replace jailbreaking, but it can be a nice alternative for specific applications. For example, Extensify continues to be popular amongst former jailbreakers, and tools like UnlimApps’ ppsideloader, continue to thrive as well. There’s even a dedicated Reddit community based on sideloading iOS apps.
Throughout the entire down period, there have been quite a few substantial and meaningful jailbreak tweaks released. In the following video, I take a look at five such jailbreak tweaks that are worth trying. All of the listed tweaks are free except for LiveRinging, which is $1.99.
- LiveRinging – brings video to your incoming call screen.
- IGExperiments – access Instagram’s new white layout and more.
- Marquee – bring scrolling to long folder names.
- SwipyFolders – perform gestures on SpringBoard folders.
- TinyPlayer Lite – a tiny music player that can be invoked with Activator.
As long as there are still hackers that are willing to invest time packaging exploits in a way that users can take advantage of, then jailbreaking will always be here. The only way that jailbreaking will die is if the hackers creating the tools pack up their bags and go home.
Although it’s still possible that we could see a tool for iOS 9.3.x, it’s more likely that hackers are holding off for an iOS 10 jailbreak. That is, of course, unless iOS 10 fixes an exploit that they use.
What about you? Do you still jailbreak? Participate in our poll above and let us know.
FTC: We use income earning auto affiliate links.More.
Check out 9to5Mac on YouTube for more Apple news:
You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channelSours: https://9to5mac.com/2016/05/10/the-state-of-jailbreaking-may-2016-plus-5-jailbreak-tweaks-youvideo/
Come on, I'll take pity on you. I lifted Polina in my arms, laid it across the bed and began kissing, on her tear-stained eyes, on the lips on the neck, on the nipples of. Her small breasts, on the scars, on the pubis, on the clitoris, on the vulva. Her hands gratefully tugged at my hair, and her body shook with suppressed sobs.
- Trellis room divider
- Johnson lifters ls
- Dbl hack
- Godog ball
- Wire fence kits
- Radioshack fort worth
- Djay apple music
- Mw server maintenance
- Star tours wiki
- Witness samples wiki
- Safest oil stock
- Pixelbook go used
But I would not be surprised if Angelica Vladimirovna does not even remember that you have a son at all. Vlada laughed with relief. Artemchik, dear. Angela remembers that you are, she remembers very well.