iOS 10.2.1 Jailbreak Is Now Possible Using Yalu102 And A Simple Mod
It’s now possible to jailbreak iOS 10.2.1 using yalu102 and a simple mod. Here’s everything you need to know about it.
The age old cat and mouse game between Apple and the jailbreakers appear to be continuing. We’ve recently been witness to Zimperium security researcher Adam Donenfeld publicizing his ziVA exploits ahead of his talk at this year’s Hack in the Box conference in Singapore. Having those privilege escalation exploits out in the world opens up new doors for talented individuals in the jailbreak community, including the possibility of an iOS 10.2.1 jailbreak, according to yalu102 developer Luca Todesco.
We haven’t heard as much from Italian developer and researcher Luca Todesco as we would have liked over the last few months. For one reason or another, he has decided to take a silent backseat in the community, instead preferring to watch what is unfolding and make the odd comment on it. This is one of those times when he has chosen to comment on taking to his official Twitter stream to announce that yalu102 tool for iOS 10.2 is capable of jailbreaking iOS 10.2.1 if a few amends are made to utilize Donenfelds ziVA exploits. He writes:
you can literally swap ViewController.m in yalu102 with the new exploit and pass tfp0 to exploit() and its gonna work on 10.2.1 unchanged.
The tweet essentially means that anyone with the necessary knowledge can download the yalu102 source code and interrogate it for the relevant files, which in this instance is the ViewController.m file. It would appear that the ViewController mentioned contains the current exploits used in yalu102 which are responsible for making the jailbreak possible on supported devices and firmware up to iOS 10.2. Making some relatively simple amends and utilizing the recently released Donenfeld’s ziVA exploits for iOS 10.3.1 and below firmwares would mean that yalu102 would actually work on devices running iOS 10.2.1.
Of course, it’s unlikely that the average device owner is going to be able to make head-nor-tail of the information shared by Adam Donenfeld to the extent that they are capable of updating the yalu102 source code to actually make use of these new exploits. It will take someone with the correct knowledge in that community to actually take the challenge on and then release updated version of the tool with the updated source capable of performing the required liberation on iOS 10.2.1.
As always, if anyone accepts that challenge, or if a new tool is released, we will be sure to bring you up to date immediately. Stay tuned.