Apple Firmware Signing Database

iOS Signing Status Checker

Instantly verify whether Apple is still signing a firmware for your device. Look up by device identifier or iOS version — before you attempt a restore or downgrade.

LiveSigning Data
iOS 1–26Version Coverage
AlliPhone & iPad
0Lookups Today
How It Works

Two ways to check
firmware signing status.

01
By Device

Enter your device identifier — e.g. iPhone17,2 — and see every firmware version with its current signing status in one table.

02
By iOS Version

Enter an iOS version — e.g. 18.0.1 — and see which devices Apple is still signing it for, and which have been cut off.

03
Read Signing Status

A Signed badge means Apple accepts this firmware right now. Unsigned means restores to that version are no longer possible.

04
Download IPSW

Click the download icon next to any firmware to access its full IPSW restore file details, checksums, and direct download link.

Signing Status Checker

Check your firmware.

signing_checker — live apple signing status

Find your device identifier in Settings → General → About → Model Number (tap to reveal hardware model).

Try: iPhone17,2  ·  iPad16,1  ·  iPhone12,1

Querying Apple signing servers…

Could not fetch signing data. Check the identifier and try again.

iOS
All Firmware
iOS Version Build ID Status Release Date Actions
Build ID: —
0
Signed
0
Unsigned
0
Total Devices
Save SHSH2 Blobs

Lock in your downgrade path
before Apple closes the window.

What are SHSH2 blobs — and why save them?

An SHSH2 blob is a cryptographic ticket issued by Apple's TSS servers, tied to your device's unique ECID and a specific firmware version. Save them now while a version is still signed — if a bootchain exploit ever becomes available for your chip, saved blobs let you restore to that version long after Apple closes signing.

Open TSS Saver Get blobsaver

Save blobs now — you can only save blobs for versions Apple is currently signing. Once Apple closes signing (typically 48–72 hours after a new release), it's permanently too late, even with your ECID. Blobs saved while signed can potentially be used later with futurerestore if a compatible exploit becomes available for your chip.

Step 01
Find Your ECID

Go to Settings → General → About → scroll to ECID. On Mac, find it in System Information → USB. It's a unique hex or decimal ID tied to your device's chip — required for all blob saving.

Step 02
Choose a Tool

Use TSS Saver (web-based, no install needed) or blobsaver (desktop app, auto-saves on a schedule). Both are free and trusted by the jailbreak community. See tools below.

Step 03
Enter Your Details

Provide your ECID, device identifier (e.g. iPhone17,2), and optionally your APNonce or generator. For most users, ECID + device model is sufficient to save blobs for all currently-signed versions.

Step 04
Download & Store

Download the .shsh2 files and back them up in multiple places — cloud storage, external drive, and locally. TSS Saver also stores them server-side under your ECID so you can retrieve them later.

Step 05
Use with futurerestore

When a compatible exploit exists (e.g. checkm8 for A11 and older), use futurerestore with your saved blobs to restore to the target version. This is the main use case for saved blobs.

Recommended Tools

Four tools every jailbreaker should know.

These are the most trusted, actively maintained tools in the iOS blob-saving ecosystem.

TSS Saver
Web · by 1Conan
Recommended

The most popular web-based blob saver in the jailbreak community. Enter your ECID and device model — TSS Saver fetches and stores your SHSH2 blobs for all currently-signed firmware versions server-side. No installation needed. Retrieve your blobs anytime by ECID.

No install Server-side storage All signed versions Free ECID lookup
Quick Steps
1. Go to tsssaver.1conan.com
2. Enter your ECID (hex or decimal)
3. Select your device model
4. Click "Save Blobs"
5. Download or retrieve by ECID later
blobsaver
Desktop · macOS / Windows / Linux

An open-source desktop GUI app that automatically saves SHSH2 blobs for all currently-signed iOS versions on a recurring schedule — so you never miss a signing window. Stores blobs locally and optionally on a remote server. The set-it-and-forget-it solution.

Auto-schedule macOS / Win / Linux Open source Local storage GUI
Quick Steps
1. Download from GitHub releases
2. Add device: ECID + model + board
3. Enable background saving
4. Blobs auto-saved to ~/Blobs/
5. Back up the folder to cloud storage
futurerestore
CLI · Advanced · Restore Tool

The advanced command-line tool that actually performs the downgrade using your saved SHSH2 blobs. Requires a compatible bootchain exploit for your chip (e.g. checkm8 for A11 and older). Not a standalone solution — blobs saved with TSS Saver or blobsaver are used here.

CLI Requires exploit A5–A11 (checkm8) Uses .shsh2 files Advanced

⚠ Prerequisite: futurerestore only works if a bootchain exploit exists for your specific chip. For A12+ devices (iPhone XS and newer), no public exploit currently exists. This tool is most useful for A11 and older (iPhone X, 8, and below).

SHSH2 CLI
Command Line · Scriptable

A lightweight command-line utility for manually requesting and saving SHSH2 blobs directly from Apple's TSS servers. Ideal for power users who want to script blob saving, integrate it into automation, or save blobs for specific builds without a GUI.

CLI Scriptable Specific builds No GUI needed
Example usage
$ tsschecker -d iPhone17,2 \
--ecid YOUR_ECID -s
✓ Saved iOS 18.x blobs
TSS Saver — Closer Look
tsssaver.1conan.com · Web-based · No account required
Open TSS Saver

TSS Saver by 1Conan is the go-to web tool for the jailbreak community. It talks directly to Apple's Tatsu Signing Servers on your behalf, requests blobs for every currently-signed firmware for your device, and stores them server-side linked to your ECID. You can retrieve them at any time — even years later — using just your ECID number.

No Install Required

Runs entirely in the browser. Works on any platform — iOS, macOS, Windows, Linux. Just open the URL.

Server-Side Storage

Blobs are stored on the server tied to your ECID. Retrieve your full blob archive anytime at the /ecid/ URL.

All Signed Versions

Saves blobs for every version Apple is currently signing for your device in a single request — no manual selection needed.

APNonce / Generator

Optionally provide your APNonce or generator value for nonce-collision downgrade scenarios (advanced users).

Downloadable Archive

Download all your saved blobs as a ZIP archive containing individual .shsh2 files — ready to use with futurerestore.

Completely Free

No account, no login, no cost. Community-maintained and trusted by millions of jailbreak users since 2017.

Retrieve your saved blobs
Visit: https://tsssaver.1conan.com/v2/lookup/?ecid=YOUR_ECID_HERE

Replace YOUR_ECID_HERE with your device's ECID in hex or decimal to see all blobs saved for your device.

Deep Dive

Understanding iOS firmware
signing & why it matters.

~72h
Avg. Signing Window
1–3
Versions Signed at Once
0
Ways Around It (officially)
signing_lifecycle.sh
$ query signing_window iOS 18.2 Checking Apple TSS servers... ✓ iOS 18.2 — SIGNED (22C152) Released: Dec 11, 2024 Window: ~3 days post-18.2.1
$ query signing_window iOS 18.1 Checking Apple TSS servers... ✗ iOS 18.1 — UNSIGNED (22B83) Closed: ~72h after 18.2 drop Restore: Not possible
$ explain tss_ticket --verbose TSS = Tatsu Signing Server (Apple) iTunes/Finder sends ECID + nonce Apple returns signed blob (shsh2) No blob = restore rejected
$ save_blobs iPhone17,2 iOS 18.2 ✓ SHSH2 blob saved locally Tool: blobsaver / shsh2 Use: Future downgrades (if exploit)
$
What Is Firmware Signing?

Every time you restore or update an iPhone or iPad, Apple's servers cryptographically verify the firmware before it's installed. This verification process — called TSS (Tatsu Signing Server) checking — means Apple can control exactly which software versions run on its hardware at any given moment. If Apple is no longer "signing" a version, restoring to it becomes impossible through normal means, even if you have the IPSW file.

The Signing Window Timeline
New iOS Release
Apple releases a new version. Both the new version and the previous version are typically signed simultaneously for a short window.
~48–72 Hours Later
Apple closes signing for the older version. After this point, only the new (and sometimes one prior) version can be restored to.
Window Closed
The old firmware is permanently unsigned. You cannot restore to it via iTunes, Finder, or any official method — regardless of whether you have the IPSW file saved.
SHSH2 Blobs — Save Before It Closes

An SHSH2 blob is a signed ticket from Apple's TSS servers tied to your specific device's ECID (unique hardware ID) and a particular firmware version. If you save blobs while a version is still being signed, you may be able to use them later with tools like futurerestore — but only if a compatible bootchain exploit exists. Tools like blobsaver can automatically save blobs for all currently-signed versions.

blobsaver shsh2 CLI futurerestore ECID required Per-device
Why Does This Matter for Jailbreakers?

Most jailbreaks target a specific iOS version range. If you accidentally update past the jailbreakable window, you cannot go back once Apple closes signing. Checking signing status before updating lets you make an informed decision — stay on a jailbreakable version or accept you'll lose root access. The window can close within hours of a new release.

✓ Signed = can restore / downgrade ✗ Unsigned = locked out permanently
More Tools

Everything you need for
iOS device research.

A full suite of iOS lookup tools — identify any device, check jailbreak compatibility, and now verify signing status — all in one place.

FAQ

Frequently asked questions.

Everything you need to know about iOS signing status, firmware windows, and how to use this tool.

Signed means Apple's TSS (Tatsu Signing) servers will approve a restore to that firmware version right now. When you initiate a restore, your device sends its unique ECID identifier along with the firmware request — Apple signs off on it and the install proceeds.

Unsigned means Apple's servers will reject any restore attempt to that version. Even if you have the exact IPSW file saved to your computer, iTunes or Finder will return an error (typically error 3194) because Apple refuses to countersign the installation.
Apple typically keeps the previous version signed for 48–72 hours after a new release, though this varies. Sometimes Apple closes signing within hours, especially for security-critical updates. In rare cases a version may remain signed for several days. There is no official announcement — the window simply closes without warning, which is why monitoring signing status in real time is important if you want to stay on a specific version.
No, not through normal means. Having the IPSW file is necessary but not sufficient. The restore process requires Apple's live TSS authorization regardless. However, there are two exceptions:
  • SHSH2 blobs + futurerestore: If you saved SHSH2 blobs while the version was signed AND a compatible bootchain exploit exists (like checkm8 for A11 and older), you may be able to restore using futurerestore.
  • checkm8 devices: The checkm8 bootrom exploit on A5–A11 chips allows restoring to specific versions even without Apple's live signing, given the right tools and blobs.
There are a few methods:
  • On device: Go to Settings → General → About → Model Number. Tap the field to toggle between the marketing part number (e.g. MY6F2LL/A) and the hardware model identifier (e.g. iPhone17,2).
  • Via iTunes/Finder: Connect your device and check the Summary pane — it will display model information you can cross-reference.
  • Via System Information (Mac): With device connected, Apple menu → About This Mac → System Report → USB → find your device.
IPSW stands for iPhone Software (a naming holdover from the iPod era). It's a ZIP archive containing the complete iOS firmware for a specific device — the operating system, bootloaders, and restore ramdisk.

To use an IPSW: open iTunes (Windows) or Finder (macOS Catalina+), connect your device, hold Option (Mac) or Shift (Windows) and click "Restore iPhone…", then select your downloaded IPSW. The restore will fail if Apple is not currently signing that version.
The version number (e.g. 18.2.1) is the human-readable release designation you see in Settings. The build ID (e.g. 22C161) is Apple's internal identifier that uniquely distinguishes each firmware build — including carrier variants, regional builds, or re-releases with the same version number but different code.

Build IDs matter because multiple IPSWs can share a version number but differ by device or region. When saving SHSH2 blobs or verifying signing status, the build ID is the precise reference point.
Only if Apple is still signing the older version. If the version you want is currently signed (shown with a green badge in this tool), you can restore to it via iTunes or Finder right now — no jailbreak needed. Simply download the IPSW for your device and restore using the Shift/Option+Restore method.

Once Apple closes signing, a standard downgrade is impossible without a bootrom-level exploit or saved SHSH2 blobs combined with an applicable tool.
This tool queries live signing data in real time via the IPSW.me API, which polls Apple's TSS servers continuously. Status changes are typically reflected within a few minutes of Apple closing or opening a signing window. Because the data is live, every lookup you perform reflects the current state — not a cached snapshot. This makes the checker reliable even during the narrow signing windows that follow a new iOS release.
Checksums are cryptographic fingerprints that let you verify your downloaded IPSW file is complete and unmodified. After downloading, compare the file's checksum against the values shown in the firmware detail panel:
  • SHA-256 is the most reliable — use this when available.
  • SHA-1 is widely used in the iOS community and legacy tools.
  • MD5 is the fastest to compute but weakest cryptographically.
On macOS: shasum -a 256 filename.ipsw. On Windows: certutil -hashfile filename.ipsw SHA256.
Yes, sometimes. Apple signs firmware per-device, not per-version globally. It's possible (and has happened) that a specific iOS version is signed for newer devices but unsigned for older ones, or vice versa. This is most common with:
  • Security patches that apply only to certain chip generations
  • Older devices reaching end-of-life support
  • Regional or carrier firmware variants
This is why the "By iOS Version" tab in this tool shows signing status broken down per device — always check for your specific model.
A full IPSW restore via iTunes/Finder will erase all data on the device. This is a factory reset — all apps, settings, photos, and files are wiped before the new firmware is installed. Always back up to iCloud or via Finder/iTunes before restoring.

OTA (over-the-air) updates do not erase data. But OTA updates can only go to newer versions — they cannot downgrade. For a downgrade, a full restore is required, which means data loss unless you restore from a backup afterwards.
Apple's build IDs follow a pattern: [OS major][OS minor][Revision]. For example, 22C161:
  • 22 — corresponds to iOS 18 (internal build era)
  • C — the minor version letter (A = .0, B = .1, C = .2, etc.)
  • 161 — internal revision number within that minor release
Build IDs with the same letter but different numbers are typically re-releases or carrier-specific variants. Higher revision numbers within the same letter are usually incremental bug fixes. Build IDs starting with letters further in the alphabet correspond to newer major iOS versions.
No, your device does not need to be connected. You only need two pieces of information: your device's ECID (found in Settings → General → About, or System Information on Mac) and your device identifier (e.g. iPhone17,2).

The easiest method is TSS Saver (tsssaver.1conan.com) — a free web tool that saves blobs server-side for all currently-signed versions in one click. For automated, ongoing blob saving, blobsaver (desktop app) runs in the background and saves blobs on a schedule, so you never miss a signing window. Once saved, blobs can be used with futurerestore alongside a compatible bootchain exploit to restore to that version even after Apple closes signing.