Skip to content

Jailbreak for arm64 devices on iOS 15.0+

License

Notifications You must be signed in to change notification settings

pengubow/palera1n

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

415 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

DocumentationInstallation GuideRequirementsSupport DiscordWebsite

Information

This is the official repo for the palera1n project, a jailbreak for arm64 devices on iOS 15.0+

  • Loader application used in palera1n can be found here.
  • palera1ns jbinit can be found here.
  • palera1ns custom PongoOS can be found here.

Website & credits can be found at https://palera.in (scroll down for credits).

Warnings

We are NOT responsible for any data loss, or the result of a device being bricked. The user of this program accepts responsibility should something happen to their device. While nothing should happen, jailbreaking has risks in itself.

  • If your device is stuck in recovery, please run futurerestore --exit-recovery, or use irecovery -n.

  • If you're unable to get out of recovery via these methods please restore with iTunes or Finder.

  • palera1n will never work in VirtualBox, VMware or any virtual machine that doesn't support PCI passthrough.

Requirements

  • A checkm8 vulnerable iOS device on iOS 15+ (A8 - A11)

    • On A11, you must disable your passcode while in the jailbroken state (on iOS 16, you need to reset your device before proceeding with palera1n).
  • USB-A cables are recommended to use, USB-C may have issues with palera1n and getting into DFU mode.

    Technical explanationThe BootROM will only enter DFU if it detects USB voltage, which boils down to checking whether a certain pin is asserted from the Tristar chip. The Tristar does this based on the cable's accessory ID, and apparently USB-A and USB-C cables have different accessory IDs, and the one of the USB-C cables makes the Tristar not assert the USB voltage pin.

  • A Linux or macOS computer

    • AMD CPUs (not AMD Mobile) have an issue [with (likely) their USB controllers] that causes them to have a very low success rate with checkm8. It is not recommended that you use them with palera1n.
      • If your device does not successfully jailbreak, try a computer with an Intel or other CPU
  • Apple Silicon Macs with USB-C

    • USB-C port on Apple Silicon Macs may require manual unplugging and replugging of the lightning cable after checkm8 exploit.
    • This problem may be solved by connecting via USB hub, though extensions can vary.

Need help?

Make sure you provide full details on your device, such as:

  • iDevice
  • iOS Version
  • Passcode enabled?
  • Logs, if panicked then send latest panic-full log from your iDevice.

Using -VvL would help with debugging.

Join the Support Discord

About

Jailbreak for arm64 devices on iOS 15.0+

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • C 92.7%
  • Makefile 5.7%
  • Assembly 1.6%