How does it work?
It boots devices that require multiple patches. The first time you run it, it starts a ramdisk, dumps your onboard blobs, creates a fakefs (if using semi-links), installs the loader application, and patches your kernel.
Question
Need help?
If you need help, pleasejoin our Discord. Due to the proliferation of spam we have disabled questions and generally have difficulty responding. We feel much more comfortable on Discord.
Please, please, please provide the necessary information:
- iOS version and device (e.g. iPhone 7 15.1, iPhone 6s 15.3.1)
- Computer operation System and version (e.g. Ubuntu 22.04, macOS 13.0)
- Command you ran
- Full log in log folder
Warnings
- We are not responsible for any data loss. Users of the program will be held responsible if something goes wrong with their device. While nothing should happen, jailbreaking itself carries risks. If your device is stuck in recovery, run one of the following:
- futurerestore --exit recovery
- restore-n
Prerequisites
- checkm8 on iOS 15 or 16 (A8-A11) Vulnerable iOS devices
- Device must be on iOS 15.0-16.2
- Linux or macOS computer
- Requires Python 3 installed.
A10 and A11 devices
- On the A10 and A11, you must disable passcode while jailbroken.
- On iOS 16 A10, if you ever enabled passcode on 16, you must reset it via the Settings app/recover using computer
- On A10, this can be done in the future by implementing blackbird to solve.
- On A11, we don’t have SEP vulnerabilities yet.
The above is the detailed content of iOS 16.2 can also use palera1n to launch a new jailbreak tool. For more information, please follow other related articles on the PHP Chinese website!