: It supported devices from the iPhone 5S to the iPhone X (A7–A11 chips) running iOS 12.0 up to iOS 14.8.1 .
When first debuted in November 2019, it was a breakthrough based on the "checkm8" bootrom exploit. However, the official development team struggled to release a native Windows version due to the complexities of writing a custom Windows kernel driver for the exploit. For years, Windows users had to rely on cumbersome workarounds like creating Linux bootable USB drives (such as Checkn1x) just to jailbreak their devices. The Arrival of iRemovalRa1n
Today, iRemovalRa1n v1.1 is remembered as the first tool to deliver a "one-click" native Windows experience for checkra1n users. However, its relevance has faded as newer tools like emerged to support newer firmwares, and newer devices (iPhone XR and up) remained immune to the checkm8 exploit it relied upon. checkra1n 0.12.3 beta checkra1n-for-windows-pc-iremovalra1n-v1-1-free-download
While the developer claimed these were false positives common in hacking tools, the community remained cautious. Some users on Reddit noted that while security experts like Siguza had seen early versions of the code, the final public release hadn't been fully verified as "safe". The Legacy of v1.1
The story of is a significant chapter in the iPhone jailbreaking community, marking a long-awaited shift for Windows users who had been sidelined from using the powerful checkra1n tool. The Missing Piece for Windows : It supported devices from the iPhone 5S
In April 2022, the team stepped in to bridge this gap by releasing iRemovalRa1n v1.1 . This was not an official checkra1n release but rather a native Windows port designed to work directly on a PC without needing Linux or a USB flash drive.
: While it functioned as a standalone jailbreak, it was primarily bundled with the iRemoval Pro tool to facilitate iCloud activation lock bypasses. Controversies and Community Reception For years, Windows users had to rely on
The tool’s release was met with both excitement and skepticism. Because the code was heavily (scrambled) to protect it from being stolen by other developers, many antivirus programs flagged it as a "Generic Trojan" or a "remote access backdoor".