The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Unsolved problems"
Caique2001 (talk | contribs) |
m (update) |
||
(56 intermediate revisions by 22 users not shown) | |||
Line 1: | Line 1: | ||
+ | == Exploits Needed == |
||
− | Use your imagination; what you do want? |
||
+ | * [[Unlock 2.0|X-Gold 608 Baseband unlock]] - Partly done ([[ultrasn0w]] uses [[AT+XAPP Vulnerability]] which is available in all versions up to [[05.13.04]]) |
||
+ | * [[Baseband Bootrom|X-Gold 608 Baseband Bootrom]] - breaking the chain of trust |
||
+ | * [[Baseband Bootrom|X-Gold 618 Baseband Bootrom]] - breaking the chain of trust |
||
+ | * [[T8020|A12 Bootrom]] ([[Bootrom 3865.0.0.4.7]]) and newer - breaking the chain of trust |
||
+ | * Find a bootrom exploit that allows unsigned code execution (preferrably on startup) on newer devices ([[A12]]+). |
||
+ | == Work to be done == |
||
− | ==Exploits Needed== |
||
+ | * Increased [[Bluetooth]] Profile Support |
||
− | *[[Unlock 2.0|3G iPhone Baseband]]<br> |
||
+ | * IP over [[iTunes]] |
||
− | *[[Easier method of getting Img3 Key / IV]]<br> |
||
+ | * Getting NMEA output from the GPS |
||
− | |||
+ | * IPFW kernel extension |
||
− | ==Work to be done== |
||
+ | * Get kernel extensions working on 2.x+ |
||
− | *[http://iphone-linux.org/ Port Linux to the iPhone] |
||
− | *[[IPoiT|IP over iTunes]] |
||
== Investigation == |
== Investigation == |
||
− | *[[Research: Pwnage Patches]] |
+ | * [[Research: Pwnage Patches]] |
− | *[[Research: Re-allowing unsigned ramdisks and boot-args with the 2.* iBoot]] |
+ | * [[Research: Re-allowing unsigned ramdisks and boot-args with the 2.* iBoot]] |
+ | |||
+ | '''See Also: ''[[Timeline]]''''' |
Latest revision as of 03:15, 21 January 2022
Exploits Needed
- X-Gold 608 Baseband unlock - Partly done (ultrasn0w uses AT+XAPP Vulnerability which is available in all versions up to 05.13.04)
- X-Gold 608 Baseband Bootrom - breaking the chain of trust
- X-Gold 618 Baseband Bootrom - breaking the chain of trust
- A12 Bootrom (Bootrom 3865.0.0.4.7) and newer - breaking the chain of trust
- Find a bootrom exploit that allows unsigned code execution (preferrably on startup) on newer devices (A12+).
Work to be done
- Increased Bluetooth Profile Support
- IP over iTunes
- Getting NMEA output from the GPS
- IPFW kernel extension
- Get kernel extensions working on 2.x+
Investigation
See Also: Timeline