While an untethered bypass makes the iPad usable again, it isn't a "factory reset" fix.
The iPad 2 is unique because it features the . Unlike newer devices that use the checkm8 exploit (A7 through A11), the A5 chip requires specific hardware communication to bypass the setup screen.
Once the device is pwned, connect it back to your Mac. Open and select the "iPad 2" option. The tool will send a "Ramdisk" to the device. ipad 2 935 icloud bypass untethered
This process is most stable on iOS 9.3.5 or 9.3.6 . Is it worth it?
Because the iPad 2 uses a 30-pin connector and an older exploit (Checkm8-A5), a hardware-based "pwnage" is often required to put the device into a state where it can accept custom commands. While an untethered bypass makes the iPad usable
In your bypass tool, select and then "Delete Setup.app." The device will reboot. 4. Achieving the Untethered State
This is the core of the bypass. By deleting or renaming Setup.app , you tell iOS that the initial setup has already been completed. Once the device is pwned, connect it back to your Mac
Once the LED on the Arduino flashes correctly, your iPad is in a "pwned DFU" state. 2. Entering Ramdisk Mode
Do you have the hardware ready to begin the flashing process?