Pangu: untethered jailbreak for iOS 9.3.3 should not wait
After the creators of the jailbreak Pangu iOS 9.3.3 launched an official account on Reddit, we began to receive information that is called, firsthand. Earlier on Monday, Pangu said they did not plan to develop an exploit for 32-bit devices, and now it became known that users keep waiting for the release of the untethered version of the jailbreak.
Many of the comments asked questions about the utility Pangu, using the digital certificates of the developer. All interested in the question, will the jailbreak is “untethered”. As you know, hacking the iPhone and iPad this exploit involves the transfer device is in a jailbreak after each reboot. The so-called “semi-tethered” jailbreak. Of course, it is not necessary to connect the gadget to your PC as before, and you can run the application from the home screen of the mobile device. Nevertheless, it gives some discomfort when using devices.
Unfortunately, today it became clear that Pangu will not become unbound in the foreseeable future. According to the hackers, they have no plans to work in this direction. Maybe they moved the focus already on iOS 10 and are now looking for vulnerabilities in the new OS. At least it would be a reasonable explanation for this decision.
Note that because of the peculiarities of the exploit and the fact that it uses third-party accounts (Apple ID for certificates and download apps and bypass the App Store, Pangu will stop working after 7 days of the end of the limit set by Apple. After a week, users will have to update the jailbreak on the device using a utility on your computer.
If your device has a certificate with a validity of 7 days, you can use this guide to extend it to 1 year.