The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "IDroid"
m |
|||
(34 intermediate revisions by 14 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{lowercase}} |
||
− | Hacked by Chroniccommand |
||
+ | [[File:Openiboot.png|thumb|right|200px|Device running the OpeniBoot console.]] |
||
− | Hacked by Chroniccommand |
||
+ | '''iDroid''' is a project with goals of porting Linux and Android to [[List of iPhones|iPhone]], [[List of iPod touches|iPod touch]] and [[List of iPads|iPad]] and use different OSes as alternatives to standard [[iOS]]. |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | iDroid is not actually a hack/exploit neither an unlock, but it is based on [[Bootrom]] exploits which allowing the running of unsigned code at low level. |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | === OpeniBoot === |
||
− | Hacked by Chroniccommand |
||
+ | The goals of OpeniBoot are: |
||
− | Hacked by Chroniccommand |
||
+ | * to run low-level code |
||
− | Hacked by Chroniccommand |
||
+ | * to have low and critical drivers ([[NAND]] and [[NOR]] driver, [[NOR_(NVRAM)|NVRAM]]...). |
||
− | Hacked by Chroniccommand |
||
+ | * to have a debugger and development environment (chainloading, upgrading itself and USB mass storage). |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | === Linux === |
||
− | Hacked by Chroniccommand |
||
+ | A Linux Bootloader, a working Linux kernel (cross-compiler), porting drivers, run Wi-Fi and command line through SSH. |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | === Android === |
||
− | Hacked by Chroniccommand |
||
+ | On {{date|2010|04|21}}, an Android distribution based on iPhoneLinux called iDroid was released. |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | * Announcement on the linuxoniphone blog: [http://linuxoniphone.blogspot.com/2010/04/ive-been-working-on-this-quietly-in.html iDroid initial release]. |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | == See Also == |
||
− | Hacked by Chroniccommand |
||
+ | * [[Android]] |
||
− | Hacked by Chroniccommand |
||
+ | |||
− | Hacked by Chroniccommand |
||
+ | [[Category:Android on iPhone]] |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
Latest revision as of 13:08, 17 September 2021
iDroid is a project with goals of porting Linux and Android to iPhone, iPod touch and iPad and use different OSes as alternatives to standard iOS.
iDroid is not actually a hack/exploit neither an unlock, but it is based on Bootrom exploits which allowing the running of unsigned code at low level.
Contents
OpeniBoot
The goals of OpeniBoot are:
- to run low-level code
- to have low and critical drivers (NAND and NOR driver, NVRAM...).
- to have a debugger and development environment (chainloading, upgrading itself and USB mass storage).
Linux
A Linux Bootloader, a working Linux kernel (cross-compiler), porting drivers, run Wi-Fi and command line through SSH.
Android
On 21 April 2010, an Android distribution based on iPhoneLinux called iDroid was released.
- Announcement on the linuxoniphone blog: iDroid initial release.