iOS 8.4 Jailbreak Preview (i0n1c)

Stefan Esserand reported that he found a vulnerability after the SyScan 2015 (Symposium on Security for Asia Network) security conference and today he published a video where he shows iOS 8.4 Jailbreak Preview.

If you are a Jailbreak follower, you may know i0n1c. His name is Stefan Esserand he is a German security researcher specialized in iOS operating system security that contributed on a very important exploit for iOS 4.3. He gave the exploit code to iPhone Dev Team (jailbreak tool developers) who used it for important jail-breaking tools (redsn0w and Pwnage).

In the iOS 8.4 Jailbreak Preview video Stefan starts by showing the Apple Watch pair screen – “If you have an Apple Watch, you can pair it with your iPhone here”. So, one cool thing we can see in the video, that developers who have downloaded and installed iOS 8.4 beta already did is the Apple Watch pair screen.

iOS 8.4 beta – Apple Watch pair screen

iOS 8.4 beta 1 Jailbreak Preview - Apple Watch Pair

Then Stefan show in the video new iOS 8.4 music app to make sure he was running iOS 8.4. And finally he navigates trough Cydia 1.1.16 running on iOS 8.4 jailbroken iPhone 6.

Cydia running on iOS 8.4 jailbroken device (Stefan Esserand’s iPhone)

Cydia Running on iOS8.4 beta

iPhone 6 (7,1) running iOS 8.4 and Cydia 1.1.16 (en-us)

iOS 8.4 beta 1 Jailbreak Preview . iPhone 7,1, iOS8.4, Cydia 1.1.16 (en-us)

Some experts think i0n1c will not release any jailbreak tool because we didn’t it for old iOS versions, but the true is that in the past he shared the exploit code. From my point of view these are exciting news because a exploit for iOS 8.4 was found after Apple fixed exploits found by TaiG and Pangu. Also Stefan named the video “iOS 8.4 beta Jailbreak Preview 1” so may be we is planing in sharing more videos and in the comments he is telling people to stay alert for more updates, so I believe the new iOS 8.3 and iOS 8.4 jailbreak tools will we available soon, let’s see ..

Here you can watch the full video

Leave a Reply

Time limit is exhausted. Please reload CAPTCHA.