Repost from Reddit https://
"Prerequisites
An iDevice compatible with checkra1n.
An Android device with root access. Newer Linux and Android versions are more likely to work. I used a Sony Xperia XZ1 Compact on Android 10 with kernel 4.14, rooted with Magisk 20.3.
A terminal app on your Android device, for instance Termux.
A way to connect your two devices. In particular some of the Apple USB-C to Lightning cables cannot be used to put iDevices in DFU mode due to missing pins. I used the Exsys EX-47990 USB-C to USB-A adapter and the Apple USB-A to Lightning cable.
Tutorial
Download the checkra1n binary for Linux and the correct µarch of your Android device.
Put it in a directory where execution is allowed, I used /data but the Termux virtual storage may be a cleaner solution.
Connect your iDevice to it.
Open the terminal app and gain root access.
su
Check that your iDevice is recognized.
lsusb
The USB ID should be 05ac12a8.
Put your iDevice in DFU mode, see https://
Check that your iDevice is still recognized.
lsusb
Now the USB ID should be 05ac1227. If it's no longer listed try to unplug the USB-C cable from the Android device and plug it again.
Run checkra1n in CLI mode.
./checkra1n -c
Profit! (or probably, try again since it's not very reliable)"
Not only can you use an Android to checkra1n an iPhone you can then
I don't think I would trust any Android device to run the Checkm8 exploit on an iPhone. Why risk bricking a suspect's device by using a procedure that is not even very reliable?
If it's all for fun, then perhaps, I might consider it.
I would recommend Raspberry Pi 4 🙂