10-23-2019, 09:30 AM
In this video, we're going to start the process of CFW creation for iOS 13.1.3, #iOS 13.0, iOS 12.4.1 or even iOS 11 (any iOS version that works with CheckM8 compatible devices). And as we start, the first logical step is to be able to extract the decryption keys for iBEC, iBSS, and iBoot which need patching for a CFW to work. These files are packed inside an IM4P container which also contains the decryption key and IV, but these keys are encrypted themselves in a KBAG which can only be decrypted by the device's chip. While we cannot get access to the GID key, we can use CheckM8 exploit by @axi0mX to decrypt these.
This step is crucial in the process of CFW creation on iOS because if you cannot decrypt the files, you cannot patch them. The CheckM8 exploit released by @axi0mX is compatible with iPhone 4S all the way up to iPhone X on all iOS versions compatible with these devices, past present or future. So you can do this procedure on any supported iOS version. Keep in mind that the keys you obtain using #CheckM8 are usable for your iPhone model. For example, if you have an iPhone X and you extract the keys for iOS 13.1.3 iBoot, the keys will work on all iPhone X devices on that version. The GID key changes per CPU not per individual device.
This step is crucial in the process of CFW creation on iOS because if you cannot decrypt the files, you cannot patch them. The CheckM8 exploit released by @axi0mX is compatible with iPhone 4S all the way up to iPhone X on all iOS versions compatible with these devices, past present or future. So you can do this procedure on any supported iOS version. Keep in mind that the keys you obtain using #CheckM8 are usable for your iPhone model. For example, if you have an iPhone X and you extract the keys for iOS 13.1.3 iBoot, the keys will work on all iPhone X devices on that version. The GID key changes per CPU not per individual device.