/palera1n

iOS 15.0-16.5.1 semi-tethered checkm8 jailbreak

Primary LanguageCMIT LicenseMIT

Logo

DocumentationInstallation GuideRequirementsSupport DiscordWebsite

Information

This is the official repo for the palera1n project, a jailbreak for arm64 devices on iOS 15.0+

  • Loader application used in palera1n can be found here.
  • palera1ns jbinit can be found here.
  • palera1ns custom PongoOS can be found here.

Website & credits can be found at https://palera.in (scroll down for credits).

Warnings

We are NOT responsible for any data loss, or the result of a device being bricked. The user of this program accepts responsibility should something happen to their device. While nothing should happen, jailbreaking has risks in itself.

  • If your device is stuck in recovery, please run futurerestore --exit-recovery, or use irecovery -n.

  • If you're unable to get out of recovery via these methods please restore with iTunes or Finder.

  • palera1n will never work in VirtualBox, VMware or any virtual machine that doesn't support PCI passthrough.

Requirements

  • A checkm8 vulnerable iOS device on iOS 15+ (A8 - A11)

    • On A11, you must disable your passcode while in the jailbroken state (on iOS 16, you need to reset your device before proceeding with palera1n).
  • USB-A cables are recommended to use, USB-C may have issues with palera1n and getting into DFU mode.

    Technical explanationThe BootROM will only enter DFU if it detects USB voltage, which boils down to checking whether a certain pin is asserted from the Tristar chip. The Tristar does this based on the cable's accessory ID, and apparently USB-A and USB-C cables have different accessory IDs, and the one of the USB-C cables makes the Tristar not assert the USB voltage pin.

  • A Linux or macOS computer

    • AMD CPUs (not AMD Mobile) have an issue [with (likely) their USB controllers] that causes them to have a very low success rate with checkm8. It is not recommended that you use them with palera1n.
      • If your device does not successfully jailbreak, try a computer with an Intel or other CPU
  • Apple Silicon Macs with USB-C

    • USB-C port on Apple Silicon Macs may require manual unplugging and replugging of the lightning cable after checkm8 exploit.
    • This problem may be solved by connecting via USB hub, though extensions can vary.

Need help?

Make sure you provide full details on your device, such as:

  • iDevice
  • iOS Version
  • Passcode enabled?
  • Logs, if panicked then send latest panic-full log from your iDevice.

Using -VvL would help with debugging.

Join the Support Discord