The terms matter and there are differences; checkm8 is the exploit that was discovered by axi0mX. This exploit is built into the UFED Touch2 and UFED4PC and is leveraged to temporarily jailbreak the device using checkra1n. The keyword here is temporary. Cellebrite will not permanently jailbreak the device. After acquisition, the device will reboot as normal and checkra1n will not be present. On the other hand, devices can be jailbroken using checkra1n, the first public jailbreak leveraging the checkm8 exploit. This will leave a permanent trace on the device as you are making a modification to the file system. Tools that support full file system extractions on a checkra1n’d device often require the installation of AFC2 and cydia, which makes additional changes to the device. Cellebrite UFED does not do this as AFC2 and cydia are not needed. Later in the course, you will get to see a device that was extracted using checkm8 in Lab 3.2. Lab 3.3 includes files that were extracted from the checkm8 dump, forcing you to leverage community efforts to parse the data. We hope you enjoy this.