The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "S5L8720"
ChronicDev (talk | contribs) (→bootrom) |
ChronicDev (talk | contribs) (→Boot Chain) |
||
Line 11: | Line 11: | ||
==Boot Chain== |
==Boot Chain== |
||
− | [[S5L8720 Bootrom| |
+ | [[S5L8720 Bootrom|Bootrom]]->[[LLB]]->[[iBoot]]->[[Kernel]]->[[System|System Software]] |
It is definitely worthy to note that the [[Pwnage]] exploit is fixed because the images are now flashed to the [[NOR]] in their encrypted [[IMG3]] containers, and the [[S5L8720 Bootrom|bootrom]] can properly sigcheck [[LLB]]. |
It is definitely worthy to note that the [[Pwnage]] exploit is fixed because the images are now flashed to the [[NOR]] in their encrypted [[IMG3]] containers, and the [[S5L8720 Bootrom|bootrom]] can properly sigcheck [[LLB]]. |
Revision as of 21:15, 4 February 2009
This is the Application Processor used on the iPod Touch 2G.
Exploits
iBoot / Kernel Level
These are jailbreaks only available through an iBoot exploit, which would have to be applied at every boot, meaning you must be connected to a computer, therefore making them a "tethered" jailbreak.
Bootrom
An untethered jailbreak would probably need to be in the VROM, but the basic meaning of an untethered jailbreak is to have one that you can freely reboot with and not have to apply it again every boot, not to mention custom boot / recovery logos.
Boot Chain
Bootrom->LLB->iBoot->Kernel->System Software
It is definitely worthy to note that the Pwnage exploit is fixed because the images are now flashed to the NOR in their encrypted IMG3 containers, and the bootrom can properly sigcheck LLB.