Ios 9.3 6 Jailbreak Untethered <2025-2026>
The last true untethered jailbreak for a 32-bit device was (Pangu9). Everything after 9.1 moved to semi-untethered because the exploits required to persist across reboots were burned by Apple or reserved for higher bounties. 3. The "OTA" Anomaly iOS 9.3.6 was not a full IPSW for most devices. It was an OTA (Over-The-Air) patch specifically for GPS and cellular radios. Because the update was small, it didn't fix the underlying tfp0 (task for port zero) exploits that Phoenix uses. However, it did break older untether attempts. No developer wasted time building an untether for a version that less than 0.1% of the iOS user base would ever install. Debunking the YouTube Fakes Search "iOS 9.3.6 jailbreak untethered" on YouTube today. You will see thousands of videos with a Download link in the description, a fake Cydia logo in the thumbnail, and a robotic voice claiming "100% working."
Key developers (tihmstar, Siguza, Luca Todesco) have publicly stated that they have no interest in developing an untether for 9.3.6. The effort required to weaponize a new iBoot bug or bootrom exploit for a 32-bit device is immense, and there are no financial incentives (bug bounties for old firmware are zero).
Let us explain why. The only functional jailbreak for iOS 9.3.6 is Phoenix , released by the Corellium Team (Siguza, tihmstar, etc.). Phoenix is a semi-untethered jailbreak. You install the Phoenix IPA via Cydia Impactor (now AltStore or Sideloadly). When you reboot, you lose the jailbreak. You must open the Phoenix app and press "Kickstart." 2. The Missing KPP Bypass On 64-bit devices, Apple introduced KPP (Kernel Patch Protection). iOS 9 on 32-bit devices does not have KPP, but it does have KASLR (Kernel Address Space Layout Randomization). While 32-bit devices are easier to exploit, untethered requires a bootrom-level exploit or a persistent kernel code injection that survives a reboot. ios 9.3 6 jailbreak untethered
Unless the bootrom exploit (which is permanent and untethered for checkm8 devices) is backported to iOS 9.3.6, it will never happen. However, checkm8 requires a computer to send the exploit every boot—ironically making it tethered in practice. Conclusion: Manage Your Expectations To summarize for the search engine crawlers and the desperate Reddit users landing on this page:
For the average user, this string of numbers and terms might look like gibberish. But for enthusiasts holding onto an iPhone 4s, iPad 2, or iPad 3, it represents the final frontier of legacy device customization. iOS 9.3.6 was never a flagship release; it was a quiet, critical update released in July 2019, long after iOS 11, 12, and 13 had taken over the world. The last true untethered jailbreak for a 32-bit
Have you found a workaround? Did a Chinese forum leak a tool? Share your experience in the r/LegacyJailbreak subreddit. But bring proof.
iOS 9.3.6 is a graveyard. But a jailbroken graveyard is still a fun place to visit. Just don't expect to live there without re-running a jailbreak app every time your battery dies. Apple has unsigned iOS 9.3.6 completely. If you are not already on that version, you cannot upgrade or downgrade to it. If you are on it, preserve your blobs immediately. Your device is a time capsule—cherish it, but don't hold your breath for an untether. The "OTA" Anomaly iOS 9
That safety net is worth the extra tap of "Kickstart." The jailbreak development community has moved on. The last untethered jailbreak for any version was iOS 9.0.2 , released over eight years ago by Pangu (which they quickly patched in 9.1).