Since its first devices, Apple has offered numerous security systems to try to prevent the installation of unapproved software, limiting the installation of applications not present or available in the App Store to the process of unlocking your phones and tablets. However, this has also caused that, more or less quickly, fans have been creating different jailbreak programs such as Unc0ver, capable of bypassing restrictions and performing a jailbreak for iOS 11 and all later versions of the operating system to date.

This is the second major blow to Apple since 2015, when the arrival of the new kernel security feature Rootless and other initiatives to safeguard iOS made an appearance for the first time.

As the lead developer of Unc0ver explained to Wired, “This jailbreak basically just add exceptions to existing rules. It only allows you to read new jailbreak files and parts of the file system that do not contain user data. ” And it is that with increasingly complex protection systems, it is still curious that the methods used to skip us are increasingly simple, with notable cases such as the Denuvo of Doom Eternal.

As confirmed by early users, including researchers who tested it prior to release, all jailbreaks for iOS 11 and higher are working as intended. However, given that its development has been carried out in a completely stealthy way against Apple, and the consequent non-publication of its open source, the community has not yet had time to fully evaluate the jailbreak or Unc0ver’s claims about its protections. of security.

For their part, the developers of Unc0ver assure that this jailbreak tool not only affects the central iOS security model, but it’s based on a zero-day vulnerability that is still present in the versions of iOS 11, iOS 12 and iOS 13. And it is that as we saw with the latest jailbreak of iOS 12.4, this time we meet again with a tool that takes advantage of the company’s own mistakes from Cupertino.

However, the publication and great media impact of this tool will have already set off alarms within Apple, although according to the estimates of these developers, Apple would need a minimum of two to three weeks in order to prepare a solution and launch an effective patch.

In addition, if a backup of the device is made before installing the jailbreak, all traces of it can be deleted when returning to that backup. And it is that although the kernel modifications made by the jailbreak tool do not persist when you restart your device, the jailbreak files will remain in the system, greatly facilitating the restoration of the jailbreak simply by running the tool again.

So, at the moment these jailbreaks can still be done for iOS 11, under own responsibility, to unlock any iPhone 11 easily and “safely”. And it is that although the added utility of these jailbreaks is more than known, the process of releasing the terminals itself usually compromises their security, since it often involves opening vulnerabilities against the installation of malware.


Please enter your comment!
Please enter your name here