Wednesday, 1 May 2013

Status of iOS 6.1.3 Untethered Jailbreaking

A lot of iPhone / iPad users who have accidentally updated to the latest Apple firmware hope to hear good iOS 6.1.3 untethered jailbreak news. However, hackers haven’t released a new exploit that is capable of performing untethered jailbreak for this operating system yet.

The infamous Evasi0n tool can helps users with devices running iOS 6 and up to version 6.1.2. The Cupertino-based company patched some of the exploits discovered by these folks and their Evasi0n program became useless after the update launch.

Do hackers say when iOS 6.1.3 untethered jailbreak release date is? What do we know about its status? Let’s see what news we can share with you.

ios 6.1.3 untethered jailbreak status

Untethered Jailbreak for iOS 6.1.3: Rumors

We cannot make you happy as one of the hackers from the Evad3rs team, Pod2j tweeted that these folks were not working on the jailbreak people expected to see. They are currently waiting for another major release which is most likely iOS 7.

You should understand yourself that it is useless to develop iOS 6.1.3 jailbreak untethered since Apple can easily kill it with the next iOS 6.2 or iOS 7 release. It is better to save energy for this firmware presentation and release untethered iOS 7 jailbreak. Do you agree?

iOS 6.1.3 Untethered Jailbreak Status

If you still wish to jailbreak your iPhone you can do this using Redsn0w 0.9.15b3 program and Snowbreeze 2.9.14. They will give you tethered jailbreak only, but this is still a good solution to users who have iPhone 3GS and 4 models or iPod touch 4G running firmware v6.1.3.

Who will present us with the untethered jailbreak for the next mobile operating system? This might be the Evad3rs or Joshua Hill who is also working on jailbreak program development.

In case you haven’t upgraded to iOS 6.1.3 you might like to avoid this update and stay on iOS 6.1.2 which can be untethered jailbroken using Evasi0n jailbreak.

Original Post: iOS 6.1.3 Untethered Jailbreak Status

You can also read: