The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Unsolved problems"
(→Exploits Needed: meh) |
(Adding some info removed from The iPhone Wiki:Current events) |
||
Line 4: | Line 4: | ||
* [[Baseband Bootrom|X-Gold 618 Baseband Bootrom]] - breaking the chain of trust |
* [[Baseband Bootrom|X-Gold 618 Baseband Bootrom]] - breaking the chain of trust |
||
* [[S5L8940|A5 Bootrom]] ([[Bootrom 838.3]]) and newer - breaking the chain of trust |
* [[S5L8940|A5 Bootrom]] ([[Bootrom 838.3]]) and newer - breaking the chain of trust |
||
+ | * Find a bootrom exploit that allows unsigned code execution (preferrably on startup) on newer devices ([[A5]]+). |
||
== Work to be done == |
== Work to be done == |
||
Line 10: | Line 11: | ||
* Getting NMEA output from the GPS |
* Getting NMEA output from the GPS |
||
* IPFW kernel extension |
* IPFW kernel extension |
||
+ | * Get kernel extensions working on 2.x+ |
||
== Investigation == |
== Investigation == |
||
* [[Research: Pwnage Patches]] |
* [[Research: Pwnage Patches]] |
||
* [[Research: Re-allowing unsigned ramdisks and boot-args with the 2.* iBoot]] |
* [[Research: Re-allowing unsigned ramdisks and boot-args with the 2.* iBoot]] |
||
+ | |||
+ | '''See Also: ''[[Timeline]]''''' |
Revision as of 12:11, 19 June 2015
Exploits Needed
- X-Gold 608 Baseband unlock - Partly done (ultrasn0w uses AT+XAPP Vulnerability which is available in all versions up to 05.13.04)
- X-Gold 608 Baseband Bootrom - breaking the chain of trust
- X-Gold 618 Baseband Bootrom - breaking the chain of trust
- A5 Bootrom (Bootrom 838.3) and newer - breaking the chain of trust
- Find a bootrom exploit that allows unsigned code execution (preferrably on startup) on newer devices (A5+).
Work to be done
- Increased Bluetooth Profile Support
- IP over iTunes
- Getting NMEA output from the GPS
- IPFW kernel extension
- Get kernel extensions working on 2.x+
Investigation
See Also: Timeline