- The latest version of the iOS is out, and it is very COVID-19-specific, with API additions and FaceID enhancements.
- Apple has introduced various health-related functions for tracking application developers to use.
- Simultaneously, a hacking team has announced that they’re close to releasing a jailbreak for iOS 13.5.
Apple has released the iOS 13.5 to the public after only a single week of “golden master” testing, which is indicative of the urgency that underpinned this particular update. Long story short, everyone is wearing a mask right now, so Apple had to push some Face ID enhancements that would help iPhone users unlock their phones with their faces while wearing a mask and even a pair of glasses. This is a fantastic demonstration of what’s possible by iPhones today, as Face ID will remain accurate, fast, and absolutely secure.
Besides the above, Apple has also introduced a set of key changes in the Exposure Notification API for the tracing system they are developing with Google, including the following things:
- Public health agencies can define what constitutes an exposure event.
- Public health agencies can determine the number of exposure events a person has had.
- Transmission risk of positive cases can be factored into the definition of an exposure event.
- Public health agencies can contact exposed users based on a combination of the API and data that users voluntarily choose to input into the app.
- Temporary Exposure Keys are now generated randomly instead of being derived from a tracing key.
- All metadata associated with Bluetooth is now encrypted to make it more difficult to identify a person.
- Option to automatically share health and other essential information from your Medical ID with emergency services when you place an emergency call (US only).
Other than that, there are fixes regarding the black screen that appears when trying to stream videos on some specific websites, as well as a share sheet issue where suggestions and actions weren’t loading properly.
We are going to release #unc0ver 5.0.0 with support for every signed iOS version on every device using a 0day kernel vulnerability from @Pwn20wnd in sponsorship with https://t.co/l4SDOTDUla very soon. Update your devices to 13.5 and follow our progress on https://t.co/cNIUANaJr2.
— unc0ver Team (@unc0verTeam) May 21, 2020
At the same time, the “unc0ver team” has announced that a zero-day kernel exploit in all Apple chips and iOS versions enables them to release a jailbreak that works on virtually all iPhone generations, even the latest iPhone SE 2020 and the iPhone 11 series. The hacking team is working on version 5.0.0 and is apparently performing its final stability tests, giving a completion percentage of 90%. This is an unexpected development, as the other popular jailbreaks like the Checkra1n can only unlock iPhone 8 and iPhone X devices. It means that unc0ver have discovered a new flaw, which Apple hasn’t patched yet. If only Apple were friendlier towards security researchers, they could have already received a tip about that zero-day flaw.