Alex
chazbae
Retired
Pretty interesting stuff if you ask me. From reading the comments over on the thread at /r/jb it appears that the iBoot exploit iH8sn0w found a while back still applies to the newer chips. Because this was done using that method some believe this won't see the light of day, at least it proves iOS and the devices are still vulnerable after the security increase in iOS 9.
"Poking into iOS 9 is fun. A little annoyed at some new things. But very surprised at how similar it is to iOS 8 internally.
Worth noting, iOS 9+ arm64 iDevices now enforce a checksum on __TEXT/DATA.const regions of the kernel through the use of TrustZone. Modifying said sections will cause the device to panic (either at kernel or EL3 will force a reboot if the kernel refused to gracefully panic). Essentially, it's KPP (Kernel Patch Protection). You can race it though if you want to play with things. Just be quick! ;P"
Just remember folks, this isn't a release and it won't be (ever). Until TaiG or another JB team can figure out a way to do this without iH8sn0w's method we won't be seeing a jailbreak for some time, keep your device safe, don't install any certs through Safari or download any infected files to your desktop.