The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Bootchain"
m (→Application Processor) |
|||
Line 1: | Line 1: | ||
The reason for having a secure boot chain is as follows. The initial code (bootrom) is contained within the processor and cannot be changed. It decrypts the next stage and verifies integrity before it executes any code of the next stage. This continues for all stages until the execution of the kernel and applications. The integrity verification uses the keys on the device. To sign such code, you need the corresponding private key that only Apple holds. This way Apple has total control of any code that runs on your device. The idea of jailbreaking is to break this chain somewhere so that you can run any application or customize some firmware changes (unlock for example). |
The reason for having a secure boot chain is as follows. The initial code (bootrom) is contained within the processor and cannot be changed. It decrypts the next stage and verifies integrity before it executes any code of the next stage. This continues for all stages until the execution of the kernel and applications. The integrity verification uses the keys on the device. To sign such code, you need the corresponding private key that only Apple holds. This way Apple has total control of any code that runs on your device. The idea of jailbreaking is to break this chain somewhere so that you can run any application or customize some firmware changes (unlock for example). |
||
− | == |
+ | ==Application Processor== |
− | * |
+ | *[[Bootrom]] |
− | * |
+ | *[[LLB]] |
− | * |
+ | *[[iBoot]] |
− | * |
+ | *[[Kernel]] |
+ | *Applications |
||
− | * [[:/|Filesystem]] |
||
==Baseband== |
==Baseband== |
Revision as of 06:51, 28 September 2012
The reason for having a secure boot chain is as follows. The initial code (bootrom) is contained within the processor and cannot be changed. It decrypts the next stage and verifies integrity before it executes any code of the next stage. This continues for all stages until the execution of the kernel and applications. The integrity verification uses the keys on the device. To sign such code, you need the corresponding private key that only Apple holds. This way Apple has total control of any code that runs on your device. The idea of jailbreaking is to break this chain somewhere so that you can run any application or customize some firmware changes (unlock for example).