UPDATE 10/1/21:

Kernbypass does not work well anymore. Try vnodebypass, which is an updated version of it.

Go here for info: https://pokerfraudalert.com/forum/sh...-October-2021)

You will need to UNINSTALL Kernbypass for vnodebypass to work. Instructions in doing so are in the above thread.

If you still want KernBypass, read below. I updated the file links to stuff locally stored on this server so you can still get the relevant files.

---------------------------------------------------------


Some programs detect when you have jailbroken your phone, and will refuse to run.

First, try to get a program from Cydia called "Liberty Lite", and that might do the trick.

However, some programs are written really well to detect the jailbreak at the kernel level, so Liberty Lite (and similar programs) will not work.

Here's how to install a very effective jailbreak detection bypass called KernBypass. It requires an already-jailbroken phone with iOS 12.0 or higher.

*** MAKE SURE YOU DO EXACTLY AS LISTED BELOW -- IF YOU SCREW UP, DON'T BLAME ME ***

1) Prerequisites: Filza and Newterm (terminal program). Install both of these from Cydia first. Delete any apps which you want to jailbreak detect bypass.

1a) If you already have an older KernBypass installed, go into Newterm, and type: rm /var/mobile/Library/Preferences/jp.akusio.kernbypass.plist

2) Use your iPhone to click on this link to download KernBypass 0.0.3 modified.

3) Once downloaded, click "Open in Filza"

3a) If you already have an older KernBypass installed, make sure you delete all downloaded files called anything like "jp.akusio.kernbypass_0.0.3_iphoneos-arm.deb". Then go re-download as described in Step 2 and click Open in Filza

4) In Filza, click on the file called jp.akusio.kernbypass_0.0.3_iphoneos-arm.deb

5) On the top right, click Install

6) Download this fakevar13.zip file by clicking here, and clicking Open in Filza

7) Click on the fakevar13.zip file and you should see a folder called fakevar13 appear

8) Close Filza and go to Newterm

9) Type: mv /var/mobile/Documents/fakevar13/fakevar /var/mobile/.
^^^ NOTE: Change the above path if your download directory isn't /var/mobile/Documents

9a) Make sure the directory /var/mobile/fakevar/mobile now exists. You can do this by typing: ls /var/mobile/fakevar

10) Type: su

11) When it asks for the password, type: alpine
** NOTE ** If you changed your root password, type that instead of "alpine"

12) Type: preparerootfs
(you should see a bunch of stuff happening -- if you get an error and it doesn't do a lot of preparation work taking approximately 60-120 seconds, re-jailbreak and go back to step 10)

13) Type: changerootfs &
** NOTE ** Don't forget the & at the end

14) Hit enter one more time. Then type: disown %1

15) Download apps again which you want to jailbreak bypass

16) Close Newterm. Go to Settings -> KernBypass -> Enabled Applications -> (select the applications you want to bypass jailbreak detection)

17) Make sure you DISABLE Liberty Lite or other jailbreak bypass applications -- at least for the ones which you couldn't get working before -- or this method won't work!

That's it!

NOTE: After re-jailbreaking after a reboot, you may or may not have to start Newterm and redo steps 10-14. If apps stop working, repeat those steps.