Many potential jailbreakers have kept iOS or iPadOS 15.x on their devices despite having the option to upgrade to the newer and more attractive iOS 16 software update. The wait is testing the patience of many dissenters, but with so many people working on that or some form of iOS or iPadOS 15.x jailbreak, something has to materialize one way or another.
And that brings us to a somewhat eye-catching piece of news from Twitter user @itsnebulalol, who is currently posting a bio on Twitter, “Doing Cool Things with iOS – iPhone X, 15.4.1.”@itsnebulalol is the author of an experimental tethered jailbreak called Palara1n that supports specific versions of iOS and iPadOS 15 devices on A8-A11 devices, made possible by the venerable checkm8 bootrom exploit – the same power plant used for the checkra1n jailbreak.
In a tweet posted just this afternoon, @itesnebulalol shared that with the help of @mineekdev, support for the Sileo package manager and Substitute for Tweak Injection has been achieved on palera1n, albeit with a limited list of supported jailbreak tweaks that anyone can view. on the GitHub project page.
It appears that while Palara1n can be used to jailbreak A8-A11 devices running iOS and iPadOS 15.0-15.7, tweaks are currently only supported on iPhone 6 and 6 Plus and iPhone 7 and 7 Plus running iOS and iPadOS. 15.0-15.3.1. Support for new devices is expected to be added in the future, according to notes posted this afternoon on /r/jailbreak.
It is also worth noting that iPhones and iPads with A10 and A11 that users have jailbroken with palera1n will not be able to use a passcode or biometric authentication. This probably sounds eerily familiar if you’ve ever used checkra1n before, and there are currently no known workarounds.
Given the experimental nature of the palera1n jailbreak and the fact that it is still under development, it is not recommended for the average user. Instead, this is something that only developers and experienced people who know what to do in case of problems can mess with their personal compatible devices. Given how tethered to palera1n, users will need to connect to a computer each time they reboot their device.
On the GitHub page, the developer offers the following friendly advice:
What does it do?
It boots the device with AMFI patches. On first run, it will load a ramdisk which will dump your embedded blob and install Sileo and Substitute.
WARNING. On A11, a deep sleep error occurs when booting with palera1n, and the kernel panics or simply doesn’t wake up until a forced reboot, about a minute after being hibernated.
WARNING 2: I am NOT responsible for data loss. The user of this program takes responsibility if something happens to his device. While nothing should happen, jailbreaking itself comes with risks. If your device is stuck in the recovery process, run futurerestore --exit-recovery
or use irecovery -n
. Using this on iOS 16 makes your download more likely.
On A10 and A11, you must disable your passcode while in jailbreak state. On A10 this can be fixed in the future by implementing blackbird. On A11, we don’t have a SEP exploit yet. It can also break the camera when hacked.
The palera1n team has reserved the domainpalera.in, which corresponds to the checkra.in domain of the checkra1n team. The official website explicitly refers to palera1n as a “jailbreak for iOS 15.x developers”and offers a brief FAQ section that, at the time of this writing, still states that despite today’s news, no tweaks have been rolled out, so it’s a bit outdated.
Do recent events give us hope that we will soon see a public jailbreak of iOS and iPadOS 15? Be sure to let us know in the comments section below.