The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "S5L8720"
ChronicDev (talk | contribs) (→Exploits) |
ChronicDev (talk | contribs) (→Boot Chain) |
||
Line 11: | Line 11: | ||
==Boot Chain== |
==Boot Chain== |
||
− | [[Bootrom]]->[[LLB]]->[[iBoot]]->[[Kernel]]->[[System|System Software]] |
+ | [[S5L8720 Bootrom]]->[[LLB]]->[[iBoot]]->[[Kernel]]->[[System|System Software]] |
It is definitely worthy to note that the [[Pwnage]] exploit is fixed because the images are now flashed to the NOR in their encrypted IMG3 containers, and the bootrom can properly sigcheck LLB. |
It is definitely worthy to note that the [[Pwnage]] exploit is fixed because the images are now flashed to the NOR in their encrypted IMG3 containers, and the bootrom can properly sigcheck LLB. |
Revision as of 21:00, 4 February 2009
This is the Application Processor used on the iPod Touch 2G.
Contents
Exploits
Tethered
These are jailbreaks only available through an iBoot exploit, which would have to be applied at every boot, meaning you must be connected to a computer, therefore making them a "tethered" jailbreak.
Untethered
An untethered jailbreak would probably need to be in the VROM, but the basic meaning of an untethered jailbreak is to have one that you can freely reboot with and not have to apply it again every time, not to mention custom boot / recovery logos.
Boot Chain
S5L8720 Bootrom->LLB->iBoot->Kernel->System Software
It is definitely worthy to note that the Pwnage exploit is fixed because the images are now flashed to the NOR in their encrypted IMG3 containers, and the bootrom can properly sigcheck LLB.