They teased it a few days ago on Twitter and spent the next few finishing up with the remaining work. The website gives special thanks to Max Bazaliy and Luca Todesco, and credits jk9357 with extensive contributions and writing most of the post-exploit stuff. This a great step forward for the jailbreak community.

It is a semi-untethered jailbreak, so there is an app to side load with Impactor. The same limitations are inherent with this jailbreak as with the last one for iOS 10. Users will have to rely on the 7-day signing certificate limitation. Tweaks like Ext3ender aren't guaranteed to work, and will probably need to be updated. It would be best to hold off until the developers have some time to get their hands on the jailbreak.

The devices that this jailbreak has liberated are:

  • iPhone 4s
  • iPad 2
  • iPad 3
  • iPad Mini 1
  • iPod 5

There are a lot of users still on these devices either as secondary or primary drivers. With the news of the release, there will certainly be a lot of others dusting off old devices. The iPhone 4s is still arguably a good phone as a minimalist user, as long as it is set up right. With the release of Pheonix, all these devices are 'rising out of the ashes' so to speak. If users have blobs saved, they can downgrade to more usable firmware's or even use Coolbooter to dual boot.

The process for jailbreaking should be straightforward for anyone who has been following along with the community lately:

  • Download the IPA (direct link).
  • Download Cydia Impactor.
  • Connect your device to your computer.
  • Start Cydia Impactor and drag the IPA onto the top field.
  • Enter your Apple ID credentials.
  • On your device, go to "Settings > General > Device Management" and trust the certificate.
  • Run the app and tap on "Prepare For Jailbreak".
  • Wait for it to respring, then launch Cydia from the Home Screen.
  • Whenever you reboot, open the app again and tap on "Kickstart Jailbreak".
  • Whenever the app expires, install it again with Cydia Impactor.

Exploit might fail a few times if it does just try again.

It is looking more and more like semi-untethered jailbreaks are the future for the community. While they are not as good as the classic untethers the community has been used to in the past, they are better than nothing. Apple's security has become so sophisticated in recent years that attaining an untether seems impossible for public jailbreaks.

It should be noted that gsc virtual dependencies were missing from dpkg. Karen Psai, angelXwind, posted on Reddit announcing it to the community. It looks like Phoenix is using the BSD version of sed instead of the GNU version.

angelXwind on Reddit:

The cause of this appears to be a packaging mistake with Phœnix 1.0, where the BSD version of sed was included as opposed to the GNU version, which is the de facto standard used in jailbroken iOS environments (as established by /u/saurik ).

Do you have a 32-bit device? Are you going to jailbreak it with Phoenix? Sound off in the comments below.