Hacker Jake James has devised a new method for stopping app revocations on any iPhone, iPad, and iPod touch. Here’s how this method works.
Table of Contents
How App Revoke Bypass works
As you already know, Apple can revoke any app in an instant. This includes apps that you sign with an enterprise or developer certificate or install using a third-party App Installer such as TutuApp or Cyrus Installer.
This is where this new method comes in.
This App Revoke bypass stops all certificate revocations by Apple and gives you access to apps for one complete year with no revokes whatsoever.
It involves blocking your iOS device from communicating with Apple’s server. Once you block Apple’s server, they can no longer de-authenticate or revoke your sideloaded applications.
Remember, this is a bypass and not a complete solution to fully remove the limit set by Apple.
Why is this method useful?
Waiting for apps to be signed again is time-consuming and you never know when these apps could get revoked again. Blocking Apple’s servers mitigates the certificate revocation risk.
This bypass ensures that all your apps such as BobbyMovie, Snapchat++, Instagram++, SCOthman, etc remained signed and don’t get revoked again.
It supports all App Installers such as Cyrus Installer, TutuApp, AppValley, Tweakbox, and others.
You can use it on all iPhone, iPod, and iPad models running iOS 9, 10, and 11 firmware.
Here’s how you can employ this method to bypass Apple’s revoke limitations.
- iPhone, iPad, and iPod
- iOS 9, 10, 11 firmware
- Internet connection
- AdBlocker app from the App Store
Preparing your device
Before you move to onto the tutorial, follow these steps so as to make sure everything goes on smoothly hereafter.
- Perform a complete backup of your device with iTunes or by iCloud.
- If your applications are not revoked, you can jump to step 3 directly.
- If your applications are already revoked, you must start from the very beginning. Alternatively, you can also wait for the apps to be signed again and then proceed with step 3.
- If you only use WiFi on your device, you can skip the first method and follow the WiFi method.
- If you are on a 32-bit device, you must use the WiFi method only because most Adblockers aren’t compatible with 32-bit devices anymore. If you try to install a 64-bit app on your 32-bit device, you will get compatibility error.
How to stop App Revokes without jailbreak
Step 1 Open the Settings app on your device and navigate to Settings > Reset >Erase all Content and Settings.
Step 2 Restore from a backup you performed earlier.
Step 3 Install any AdBlock app from the official App Store. You are free to use whichever AdBlocker you want to. With that said, my recommendation is to use AdBlocker by FutureMind, which is very user-friendly and lets us block custom domains and servers.
You can download it from the link given below.
If you don’t want to purchase a paid application, use the following credentials and please don’t misuse them (thanks to Apple Geek Studios for providing these details for free) –
- Email – [email protected]
- Password – ZodiacTwitter9
Step 4 Navigate to Settings > Group and domains.
Step 5 Tap Add group and enter “Norevoke” as the name of this group.
Step 6 Select this group and tap Add domains.
Step 7 Add the URL of Apple’s server – ocsp.apple.com.
Step 8 Now slide up to enable the Adblocker and install its VPN configuration profile.
Step 9 Open this URL – ocsp.apple.com. If the website doesn’t load, the app revoke bypass is now in place and you are good to go.
Step 10 Remember, DO NOT close AdBlock from the App Switcher, you must keep it running at all times. If you close it, it will remove the app revoke bypass we have just set up above.
You can now use any signing service or apps signed with enterprise certificates with any WiFi network or cellular data.
This method applies to Apple TV, WiFi iPad, iPod touch or iPhone models where you only use WiFi for connecting to the internet.
Step 1 Connect to a WiFi network of your choice.
Step 2 Tap the “i” icon present next to it and set the DNS Address field to this value – 126.96.36.199.
Step 3 Now each time you connect to a WiFi network, reset its DNS address to the value given above.
Nesstool is a new Antirevoke alternative by Tutuapp. It effectively blocks all Apple servers that deal with certificates and revocations. Therefore, you can continue using your apps signed with an enterprise certificate.
How to stop App Revokes with jailbreak
unc0ver jailbreak comes with a native revoke protection system that works even in no-jailbreak mode. Furthermore, it supports all modern firmware versions beginning from iOS 11.0 up till iOS 12.1.2.
It has one major downside, though: you must be on a jailbreakable firmware version to actually run the exploit. If you have a compatible version, follow the guide given below.
Step 1 Firstly, install unc0ver jailbreak for iOS 12 and above. Be sure to check its compatibility with your device and operating system beforehand.
Step 2 Launch the app from your home screen and toggle on the Disable App Revokes option.
Step 3 Tap the Jailbreak button to kick off the exploitation process.
That’s all there’s to it! All your applications and hacked games will now stay signed forever (so long as you don’t upgrade your iOS version).
This is by far the simplest to activate this bypass method on your iPhone, iPad, and iPod touch. However, it does have one downside – it is compatible only with iOS 10 or above.
Therefore, you must have a jailbroken device running iOS 10.0-10.2 in order to get this tweak working. You can download this tweak from this link.
If you are a device that is running iOS 9 or an older version, you can follow the second method given below.
Edit Hosts file
This is yet another classic method that involves manually editing your “hosts” file.
For the uninitiated, “hosts” is a system file that maps hostnames to IP addresses. You can use this file to block access to websites simply adding the IP address of 127.0.0.1 to its domain name.
There’s no point in trying this method on iOS 9.2-9.3.3 running Pangu jailbreak because it blocks Apple’s server by default.
I will be demonstrating this process on my iPad mini running iOS 9.3.5. Now onto the tutorial.
Step 1 Open Cydia.
Step 2 Download Filza File Manager from BigBoss Cydia repo and open it from your home screen. You can also use iFile file manager, but I wouldn’t recommend doing so.
Step 3 Tap the [Root] button present under the FAVORITES section and navigate to /etc.
Step 4 Look for the hosts file present at this location.
Step 5 Open this file using the inbuilt text editor. To do this, tap on this file and select the “Text Editor” icon in the “Open with” prompt.
Step 6 With this file open, add this new rule at the end of this file.
Step 7 Save this file by tapping the Save button present in the top-right corner.
You are done for now but you must keep all your bases covered and activate this bypass on each reboot.
How to Reactivate the bypass after Reboot
This method works only until your device is left on. As soon as you reboot it, it will stop working. But we have a workaround for this as well. Here’s what you need to do.
Step 1 Turn on airplane mode before you switch off your iPhone, iPad, or iPod.
Step 2 Reboot your device.
Step 3 Open the AdBlock app.
Step 4 Disable airplane mode and immediately enable Adblock. Also, make sure it keeps running the background.
Step 5 Launch Safari web browser.
Step 6 Visit ocsp.apple.com and ensure it doesn’t load. If it loads, repeat the tutorial given above once again.
I don’t recommend you start any signed applications before ensuring that the bypass is in place and working.
Does this method work for you? Let us know in the comments section below. For more tutorials and guides, follow us on Facebook and Twitter.