One of the most important members of the jailbreak Team, Pangu, has recently posted an article explaining the technical security systems and the vulnerabilities found on iOS 9.2 and iOS 9.2.1.
In this post, Windknown gives detailed explanation of specific kernel exploits that could be used to jailbreak the iOD firmware. For those of you who have a knowledge of programming, specifically is concerned the code found in iOS, it might be interested to take a look at the details. The most interesting part, in my opinion, is that set out by the hacker at the end of the article.
A very rough translation would mention an activated vulnerability over the iOS sandbox, in this way would be the kernel can attack directly from the app to get the kernel permits. It goes on to say that, you should upgrade to the latest version of iOS, and does not recommend installing apps from unknown sources.
The last tip is made after careful reflection on the problem of “sideloading” of third-party app, now also easily possible on the latest versions of iOS.
The Italian hacker , Luca Todesco (qwertyoruip), recently shown a jailbreak untethered type for iOS 9.2.1, iOS 9.2 and iOS 9.3 beta reported yesterday.
Meanwhile, Crossmap seems to have found a way for users to upgrade to iOS 9.3 when it will become public and be able to downgrade, although Apple will prohibit this action, and continue to use the jailbreak iOS 9.2 in the event that it becomes available. Those who want to try can follow the step-by-step guide provided by the site. This should ensure that fans can get ready for the jailbreak, allowing them at the same time to be able to use the new features offered by Apple.(source: Pangu [Google Translate])