The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Untethered jailbreak"
(→Device: little advice) |
(→Device: Rewrote quite a lot of it.) |
||
Line 2: | Line 2: | ||
An untethered jailbreak is a type of [[jailbreak]] where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. |
An untethered jailbreak is a type of [[jailbreak]] where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. |
||
− | == Device == |
+ | == Device support == |
+ | Nearly all firmwares for every device has an untethered jailbreak available. [[Firmware]]s 3.1.2 through 4.0.1 (except 3.2.2) can be jailbroken via [[Star]]. |
||
+ | The most current versions of iOS (3.2.2 and 4.0.2) does not have any publicly-released jailbreak method, but they can be downgraded since Apple is still issuing [[SHSH]]s for the previous firmwares (3.2.1 for [[K48ap|iPad]]s, 4.0 for [[iPod touch]]es, and 4.0.1 for [[iPhone]]s). |
||
− | iOS version 4.0.2 and 3.2.2 do not have any jailbreak yet. (BACK UP SHSH'S!!!) |
||
+ | Devices as old as (or older than) the [[N88ap|iPhone 3GS]] with the [[iBoot-359.3|old bootrom]] have known [[bootrom]] exploits, so [[PwnageTool]] can be leveraged to break the device's chain of trust. Newer devices, which include some [[N88ap|iPhone 3GS]] units, as well as all "MC" model [[N72ap|iPod touch 2G]] units, [[N18ap|iPod touch 3G]] units and any subsequently released devices, contain [[bootrom]]s that close the loopholes used. They have no revealed bootrom exploits to break the chain of trust, so they cannot be supported with PwnageTool. |
||
− | All [[iPhone]], [[iPod touch]], and [[K48ap|iPad]] models including the [[N90ap|iPhone 4]] have an untethered jailbreak if they have any firmware version other than those mentioned above. |
||
− | |||
− | Devices with a newer [[bootrom]], which include some [[N88ap|iPhone 3GS]] units and "MC" model [[N72ap|iPod touch 2G]] units, as well as all [[N18ap|iPod touch 3G]], [[K48ap|iPad]], and [[N90ap|iPhone 4]] units, can't have a untethered jailbreak by [[PwnageTool]], since PwnageTool relies on exploits in the bootrom that allow signature checks to be circumvented. |
||
− | |||
− | However, it is possible to perform a untethered jailbreak on any device with any firmware version between 3.1.2 and 4.0.1 using [[Star]] (This include any [[K48ap|iPad]] models, running 3.2 or 3.2.1). Star stores some code inside the device's VRAM in order to perform the untethered part of the jailbreak. It can be seen as some colored pixels before the [[SpringBoard]] is loaded. |
||
== Operating System == |
== Operating System == |
Revision as of 05:38, 14 August 2010
Summary
An untethered jailbreak is a type of jailbreak where your device does not require you to reboot with a connection to an external device capable of executing commands on the device.
Device support
Nearly all firmwares for every device has an untethered jailbreak available. Firmwares 3.1.2 through 4.0.1 (except 3.2.2) can be jailbroken via Star.
The most current versions of iOS (3.2.2 and 4.0.2) does not have any publicly-released jailbreak method, but they can be downgraded since Apple is still issuing SHSHs for the previous firmwares (3.2.1 for iPads, 4.0 for iPod touches, and 4.0.1 for iPhones).
Devices as old as (or older than) the iPhone 3GS with the old bootrom have known bootrom exploits, so PwnageTool can be leveraged to break the device's chain of trust. Newer devices, which include some iPhone 3GS units, as well as all "MC" model iPod touch 2G units, iPod touch 3G units and any subsequently released devices, contain bootroms that close the loopholes used. They have no revealed bootrom exploits to break the chain of trust, so they cannot be supported with PwnageTool.
Operating System
Star runs on the device itself, so the untethered jailbreak for iOS 3.1.2 to 4.0.1 is completely independent from a computer's operating system since there's no need to connect the device to any computer in order to jailbreak.
PwnageTool can only be used on Mac OS X.