Palera1n 2.0.0 beta 9 Updates
Information
Palera1n 2.0.0 beta 9 Updates – This is the official repo for the palera1n project, a jailbreak for arm64 devices on iOS 15.0+
- Loader application used in palera1n can be found here.
- palera1ns jbinit can be found here.
- palera1ns custom PongoOS can be found here.
Website & credits can be found at https://palera.in (scroll down for credits).
We are NOT responsible for any data loss, or the result of a device being bricked. The user of this program accepts responsibility should something happen to their device. While nothing should happen, jailbreaking has risks in itself.
If your device is stuck in recovery, please run futurerestore
--exit-recovery
, or useirecovery -n
.If you’re unable to get out of recovery via these methods please restore with iTunes or Finder.
palera1n will never work in VirtualBox, VMware or any virtual machine that doesn’t support PCI passthrough.
A checkm8 vulnerable iOS device on iOS 15+ (
A8
–A11
)- On
A11
, you must disable your passcode while in the jailbroken state (on iOS 16, you need to reset your device before proceeding with palera1n).
- On
USB-A cables are recommended to use, USB-C may have issues with palera1n and getting into DFU mode.
Technical explanation
A Linux or macOS computer
- AMD CPUs (not AMD Mobile) have an issue [with (likely) their USB controllers] that causes them to have a very low success rate with checkm8. It is not recommended that you use them with palera1n.
- If your device does not successfully jailbreak, try a computer with an Intel or other CPU
- AMD CPUs (not AMD Mobile) have an issue [with (likely) their USB controllers] that causes them to have a very low success rate with checkm8. It is not recommended that you use them with palera1n.
Apple Silicon Macs with USB-C
- USB-C port on Apple Silicon Macs may require manual unplugging and replugging of the lightning cable after checkm8 exploit.
- This problem may be solved by connecting via USB hub, though extensions can vary.
Make sure you provide full details on your device, such as:
- iDevice
- iOS Version
- Passcode enabled?
- Logs, if panicked then send latest
panic-full
log from your iDevice.
Using -VvL
would help with debugging.
Join the Support Discord