iOS 10.2.1 Jailbreak Is Now Possible Using Yalu102 And A Simple Mod

It’s now possible to jailbreak iOS 10.2.1 using Yalu102 and a simple mod. Here’s everything you need to know about it.

Yalu jailbreak is here with new hope for those looking for an iOS 10.2.1 jailbreak for their iPhones and iPad devices. It was a cat and mouse game between Apple and the jailbreakers in the past, which appear to be continuing. We have recently witnessed to Zimperium security researcher Adam Donenfeld publicizing his ziVA exploits ahead of his talk at this year’s Hack in the Box conference in Singapore.

These exploits out in the world opens up new doors for talented individuals in the jailbreaking community, including the possibility of an iOS 10.2.1 jailbreak, as per yalu102 developer Luca Todesco.

Currently, we haven’t much from this Italian developer and researcher Luca Todesco about jailbreak. For one reason or another, he has decided to take a silent backseat in the community, instead preferring to watch what is unfolding and make the odd comment on it. This was one of those times when he has chosen to comment on taking to his official Twitter stream to announce that yalu102 tool for iOS 10.2 is capable of jailbreaking iOS 10.2.1 if a few amends are made to utilize Donenfelds ziVA exploits. He writes:

you can literally swap ViewController.m in yalu102 with the new exploit and pass tfp0 to exploit() and its gonna work on 10.2.1 unchanged.

What actually the tweet means is that anyone with the necessary knowledge can download the yalu102 source code and interrogate it for the relevant files, which is the ViewController.m file. It would appear that the ViewController mentioned contains the current exploits used in yalu102 which are responsible for making the jailbreak possible on supported devices and firmware up to iOS 10.2.

Conclusion

Making some relatively simple amends and utilizing the recently released Donenfeld’s ziVA exploits for iOS 10.3.1 and below firmware would mean that yalu102 would actually work on devices running iOS 10.2.1.

However, the average device owner is not going to be able to make head-nor-tail of the information shared, they’re capable of updating the yalu102 source code to actually make use of these new exploits. Of course, it will take someone with the correct knowledge in that community to actually take the challenge on and then release updated version of the tool with the updated source capable of performing the required liberation on iOS 10.2.1.

As always, if anyone accepts that challenge, or if a new tool is released, we will be sure to bring you up to date immediately. Stay tuned.

(Source: @qwertyoruiopz [Twitter])

You may also like to check out: