Checkra1n Jailbreak latest update

Checkra1niOS 13

Written by:

Checkra1n Jailbreak is the latest jailbreak tool in the jailbreak community. At the moment of this article written, no public release for checkra1n jailbreak has been announced. But it is quite certain that it will be released soon when considering the latest updates.

Checkra1n jailbreak latest status update reveals that the jailbreak tool will be released soon. Official Checkra1n jailbreak Twitter page has released a teaser showing 3 iDevices with package managers.

checkra1n jailbreak latest update
checkra1n jailbreak latest update

In this image, it shows 3 devices. From left,

  1. iPhone  SE  running on iOS 13.1.2 with Zebra package manager, 
  2. iPod touch running iOS 13.1.3 with Cydia 
  3. iPhone X device with Cydia on Home Screen (with unknown iOS version).

So the summary of this pic is that axi0mX’s jailbreak is a success with various package managers on and with the latest firmware iOS 13.1. This checkra1n jailbreak update is a huge success and also provide answers for many questions.

Cydia will be the leading package manager for Checkra1n jailbreak and also Zebra package manager will play along with Cydia. Most jailbreak lovers asked this question, whether it will be Cydia or Sileo for checkra1n jailbreak. So it has been answered. 

Cydia was once the king of the package managers. But saurik, the mastermind of Cydia was in a pause while ago. Zebra is an alternative to Cydia, but it may not be as familiar to some jailbreakers as Cydia. Furthermore, none of the devices are running CoolStar’s Sileo package manager, and it seems that it will remained exclusive to the Chimera and Electra jailbreak solutions.

Sileo is the default package manager of Chimera developed by CoolStar. Chimera is the jailbreak tool released by the Electra team for iOS 12 – iOS 12.2 and iOS 12.4. It seems that this latest checkra1n jailbreak will not allow Sileo as a default package manager.

iOS 13.2 has been jailbroken by using this checkra1n jailbreak. This was done by qwertyoruiopz with an iPod which was running on iOS 13.2. This means iOS 13.2 jailbreak is signaling a green light and hopes are high for a jailbreak for iOS 13.2. Most important thing is Apple cannot fix this jailbreak and will be a permanent jailbreak once released.

Axi0mX and Jailbreak

Checkra1n jailbreak is a jailbreak tool developed by axi0mX and some other jailbreak developers. This jailbreak tool is based on checkm8 jailbreak exploit which was founded by axi0mx months ago. axi0mX managed to jailbreak iPhone X in two seconds. Then it displayed the verbose boot screen. The best thing is the OS was iOS 13.1.1 for this demo.

Checkra1n jailbreak team

  • axi0mX
  • ih8sn0w
  • jonseals
  • pshycotea
  • qwertyoruiop
  • nullpixel
  • xerub
  • siguza

The importance of this jailbreak is that it is an unpatchable jailbreak. That means this cannot be patched with any iOS version update. The jailbreak is done to the hardware core and cannot be patched by any iOS updates. This is the reason checkra1n will be permanent jailbreak. 

checkra1n jailbreak
checkra1n jailbreak

This exciting news made a blast of the jailbreak community as it did for the limera1n jailbreak a few years back. It was a jailbreak by Geohot for iOS 3.2.2 – 4.1. Development status of limera1n jailbreak is Deprecated at the moment. This also was based on limera1n Exploit and was an untethered jailbreak and unpatchable jailbreak for,

  • Phone 3GS
  • iPhone 4 (iPhone3,1)
  • iPod touch (3rd generation)
  • iPod touch (4th generation)
  • iPad
  • Apple TV (2nd generation)

Just as in checkra1n,

  • limera1n uses a bootrom exploit to achieve the tethered jailbreak and unsigned code execution.
  • limera1n uses a userland exploit to make it untethered, which was developed by comex’.s Packet Filter Kernel Exploit.

Axi0mX’s checkm8 jailbreak exploit has shown another way for firmware downgrades with software like ipwndfu. ipwndfu is an open-source jailbreaking tool for many iOS devices. It can be used to jailbreak and download without SHSH blobs. It also can be used to downgrade without SHSH blobs. This tool should be compatible with Mac and Linux. It won’t work in a virtual machine. Developers have warned the public that this is in beta stages and backup your data before performing any process plus have not given any warranty.

Checkra1n Jailbreak compatibility

Checkra1n Jailbreak is compatible with A4 – A11 devices. This means A11 Jailbreak is possible with checkm8 Jailbreak exploit along with A4 Jailbreak.

What are A4 devices

The Apple A4 is a 32-bit package on package (PoP) system-on-a-chip (SoC) designed by Apple Inc. On September 10, 2013, Apple A4 Chip was discontinued. This A4 chip was replaced by the Apple A5X processor in the iPad (3rd generation). Software updates for devices using this chip ceased in 2014, with the release of iOS 8.

A4 chip
A4 chip
  • iPad (1st generation): April 2010
  • iPhone 4: June 2010 (Black; GSM), February 2011 (Black; CDMA), April 2011 (White; GSM & CDMA models)
  • iPod Touch (4th generation): September 2010 (Black model), October 2011 (White model)
  • Apple TV (2nd generation): September 2010

What are A11 devices

A11 chip
A11 chip

The Apple A11 Bionic is a 64-bit ARM-based system on a chip (SoC), designed by Apple Inc. According to Apple, the chip has two high-performance cores which are 25% faster than the Apple A10. After A11, Apple A12 Bionic chip was the successor.

  • iPhone 8 and 8 Plus
  • iPhone X

Every device among these A4 – A11 device list will be under the control of checkra1n. This is easy in identification based on devices rather than based on iOS versions as this comes in the device base. Since this is based on bootrom exploit, the iOS version does not count and is based on iPhones/iPads.

A12 and A13 devices are not yet listed under this compatibility device list. Both this A12 and A13 jailbreak seems difficult to achieve for the different technology. The Apple A12 Bionic is a 64-bit ARM-based system on a chip (SoC) for iPhone XS, XS Max, XR and A13 is for iPhone 11 and iPhone 11Pro. This has a Microarchitecture of ARMv8.3-A.

Checkra1n Jailbreak download

This is the most important topic for jailbreak lovers. Download Checkra1n jailbreak has to wait a while until a firm public release announcement. Our page will bring all the details and checkra1n jailbreak release date with download links once it is decided to release.

There were some scam sites and scam jailbreak apps regarding checkra1n and the public were informed about those via social media. It is common to have these scams after a sudden boost and jailbreakers need to be alert for which websites and apps provide accurate details and accurate products.

Checkra1n Jailbreak installation methods

As usual, there will be several methods to install checkra1n jailbreak.

  1. Checkra1n jailbreak install without PC (online method)
  2. Checkra1n jailbreak install with PC (ipa method)

These 2 methods will be the most relevant methods to install this jailbreak once it’s released. There might be some more jailbreak apps or tweaks which assisted via checkm8 jailbreak exploit. If so, we will surely bring you those details. Those might be available in online method which will be super easy for users to download.

Our page will guide you through the installation process for both methods. Most of all, we will bring you checkra1n jailbreak free download links for your ease.

Special Thanks:

2 Replies to “Checkra1n Jailbreak latest update”

  1. Angelina says:

    axi0mX ( Checkm8 exploit developer), qwertyoruiopz (Luca Todesco), iHnow, jonseals, Pshycotea, nullpixel, Xerub, siguza, argp, gabe_k, jndok, Sferrini Here are the previous checkra jailbreak status from the official checkra jailbreak twitter account and developers account. 

  2. Patrick says:

    Checkra is also helpful because it makes it painfully obvious it has been used. A large Checkra logo displays during bootup. And the home screen will include the Cydia and Checkra apps, neither of which appear when an iDevice runs normally. And like all Checkm8-based jailbreaks, Checkra requires physical access to the vulnerable device and a reboot, which means user data and Touch ID and Face ID are inaccessible until the next time a PIN is entered to unlock the device. This means that remote exploits aren’t possible.

Leave a Reply

Your email address will not be published. Required fields are marked *