The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Tethered jailbreak"
(reverting vandalism) |
m |
||
(21 intermediate revisions by 8 users not shown) | |||
Line 1: | Line 1: | ||
+ | A '''tethered jailbreak''' is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as [[Recovery Mode]]. In order for the device to start completely and with a patched kernel, it must be "re-jailbroken" with a computer (using the "boot tethered" feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots. |
||
− | A tethered jailbreak is one that requires your computer to boot the device. |
||
+ | == Using a tethered jailbreak == |
||
− | == Tethered Devices == |
||
+ | To boot tethered, their user must plug the device into a computer and run the jailbreak tool to "boot tethered". |
||
− | These are devices that a tethered jailbreak must be used for in all current public tools |
||
+ | |||
− | * [[N72ap|iPod touch 2G]] with updated bootrom |
||
+ | If a user attempts to boot the device without using a computer, the device will either be stuck at the Apple logo, in [[Recovery Mode]], or in a seemingly "un-jailbroken" state where [[Cydia.app|Cydia]], Mail, and Safari crash (and jailbreak-only tweaks/themes don't work) - until you boot tethered. |
||
− | * [[N18ap|iPod touch 3G]] |
||
+ | |||
− | * [[N88ap|iPhone 3GS]] with updated bootrom |
||
+ | == Tethered exploits == |
||
+ | The [[limera1n Exploit]] and other [[bootrom]] exploits can be used to tethered jailbreak older devices on any iOS version, because bootrom exploits take advantage of code that is permanently embedded in the device's hardware, which Apple cannot update with iOS updates. Those tools do usually need minor software updates (not exploit-related) to explicitly support new iOS versions. They also use additional exploits (specific to each iOS version) to produce untethered jailbreaks when possible. |
||
+ | |||
+ | The initial jailbreak for the [[N72AP|iPod touch (2nd generation)]] was tethered, until the hybrid dev team released the [[0x24000 Segment Overflow]]. The codename for the tethered jailbreak was [[redsn0w Lite]]. |
||
+ | |||
+ | ==See Also== |
||
+ | *[[Jailbreak]] |
||
+ | *[[Jailbreak Exploits]] |
||
+ | *[[Untethered jailbreak]] |
||
+ | *[[Semi-tethered jailbreak]] |
||
+ | *[[Semi-untethered jailbreak]] |
||
+ | |||
+ | [[Category:Jailbreaking]] |
Latest revision as of 09:26, 26 March 2017
A tethered jailbreak is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as Recovery Mode. In order for the device to start completely and with a patched kernel, it must be "re-jailbroken" with a computer (using the "boot tethered" feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots.
Using a tethered jailbreak
To boot tethered, their user must plug the device into a computer and run the jailbreak tool to "boot tethered".
If a user attempts to boot the device without using a computer, the device will either be stuck at the Apple logo, in Recovery Mode, or in a seemingly "un-jailbroken" state where Cydia, Mail, and Safari crash (and jailbreak-only tweaks/themes don't work) - until you boot tethered.
Tethered exploits
The limera1n Exploit and other bootrom exploits can be used to tethered jailbreak older devices on any iOS version, because bootrom exploits take advantage of code that is permanently embedded in the device's hardware, which Apple cannot update with iOS updates. Those tools do usually need minor software updates (not exploit-related) to explicitly support new iOS versions. They also use additional exploits (specific to each iOS version) to produce untethered jailbreaks when possible.
The initial jailbreak for the iPod touch (2nd generation) was tethered, until the hybrid dev team released the 0x24000 Segment Overflow. The codename for the tethered jailbreak was redsn0w Lite.