Yalu (iOS)

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Yalu (formerly Yalu + Mach Portal) is a jailbreaking tool created by qwertyoruiop (Luca Todesco) And marcograssi. It supports iOS 10.1, 10.1.1, and iOS 10.2 on all 64-bit devices pre-iPhone 7 and iOS 10.1 and 10.1.1 on iPhone 7.[1]

The jailbreak is semi-untethered, and requires to be rerun upon reboot. However, the app certificate expires seven days after sideloaded using Cydia Impactor.


The jailbreak uses vulnerabilities released by Google's Project Zero.[2]

Yalu + Mach Portal[edit]

mach_portal was intended for developers. The final release for mach_portal is Beta 4.1, which the developer reported as broken.[1] Initially, Saurik's mobile substrate was not working. Later versions of mach_portal attempted to fix this, but it remained very unstable. Developers had to launch an app that had to be sideloaded using Cydia Impactor and wait for it to crash to activate it.


mach_portal only supported iPhone 7, iPhone 6s, and iPad Pro.


Yalu is the successor to mach_portal. It uses the same vulnerabilities that were patched in iOS 10.2.1. It was released for all 64-bit devices pre-iPhone 7.

Beta 1[edit]

Beta 1 verifies that mobile substrate works.

Beta 2[edit]

Beta 2 added support for iPhone 5s/SE and 6, which was not present in mach_portal.

Beta 3[edit]

Beta 3 fixes a glitch that users with an Apple Watch would experience.

Beta 4[edit]

Beta 4 patches the kernel, and forces Dropbear to use a more secure port instead of

Beta 5[edit]

Underneath Beta 5 of the Yalu download page, qwertyoruiop writes "Placebo Effect".[1]

Beta 6[edit]

Minor bug fixes are patched with this release.

Beta 7[edit]

Beta 7 adds support "for all iOS 10 64-bit devices".[1] Jailbreakers have reported the final release as stable.


  1. ^ a b c d "yalu.qwertyoruiop.com".
  2. ^ "965 - XNU kernel UaF due to lack of locking in set_dp_control_port - project-zero - Monorail". bugs.chromium.org. Retrieved 2017-03-13.