For the first time in over nine years we’re getting a brand new iOS bootrom exploit that works for modern iPhone devices. It is called Checkm8, and it has been been discovered and announced by a popular developer and hacker, axi0mX.

Since the early days of hackers and developers have looked at finding exploits on Apple’s iOS and at first they managed to do it fairly easy, as the Jailbreak scene was a huge one and there were tons of customization options for everyone to try and install on their iPhone devices. Now, the guy who found the “checkm8” exploit is the same one who a couple of years back found and released the “alloc8” exploit for the older iPhone 3GS model. Since the “alloc8” exploit was only for a really old iPhone, then the news didn’t get too big, as there weren’t too many models still in use.

Now, the Checkm8 exploit works for iOS 13.1.1 and for 11 different iPhone generations, as it is present on the iPhone 4S and on the newer iPhone X models. The exploit isn’t working for the latest iPhone models, but there are still millions of iPhone X and older users who can use the Checkm8 exploit in order to start customizing their phones once again.

Axi0mX has posted the exploit and the code used behind it on github here. He describes this exploit as being “unpatchable” as it is hardware-related, and unless Apple physically gets access to all their sold devices to replace the exploited part, then the “checkm8” exploit will continue to live on and allow iOS users to jailbreak their phones once again.

The “Checkm8” exploit by Axi0mX will always require physical access to the phone, as it cannot be remotely executed, and it only supports tethered jailbreaks – this means that you have to run the exploit every time you boot your iPhone device. Also, you should know that the exploit isn’g messing with the Secure Enclave and Touch ID protections. Everything we stated here tells that the Checkm8 cannot be used to install any malware, yet, and if your device has the exploit applied, then it will still be hard for someone to gain access to your data without knowing the PIN code. Keep an eye on our website, as we will soon post new info regarding axi0mX’s Checkm8 iOS 13.1.1 iPhone jailbreak exploit.