On Device Jailbreak Results
Both methods are similar, the difference being the developer of the provisioning profile that allows the Pangu exploit to be deployed via sideloaded Enterprise App instead of tethering the device to a computer and using the vector that way.
I utilized the profile over at ModMyi, and prepped my iPad Air 2 for Jailbreak. Since it was running iOS 10b3, the first thing I needed to do was back it down, and get a clean install of 9.3.3. There are a couple of ways to do this, System Restore via Restore mode, or DFU mode.
This iPad Air 2 has a little problem:
Until I re-work the aluminum and reshape the sleep/wake button, this device isn’t going into DFU mode, and until the Air 3 gets released or the Air 2 display repair assembly drops in price , (currently at $165 on ifixit), it isn’t going to happen. But because the exploit calls for a sleep/wake action to lock the screen, I enabled AssistiveTouch to get me through the gestures that a non-jailbroken phone cannot duplicate without Activator.
Placing the device in Restore Mode is easy enough, just tether it to a computer, press and hold the home button until the restore mode image pops up and install your firmware.
Using method #2 (see above) I successfully hacked the Air 2. The first thing I installed on it was DisplayRecorder. This is an application that lets you record the screen for training purposes. So for training purposes, here is a session of AfterPulse that I recorded with DisplayRecorder:
So far, all is well and looking good-to-go. I also placed a slide-deck on the front page of www.imthemobile.guru that shows what you need to do to accomplish the task. Here is another Display Recorder video that shows this: