Difference between revisions of "Sundance 10A316"

From The iPhone Wiki
Jump to: navigation, search
(Fixed up Applications section for Sundance 10A316)
m (Added more stuff to Applications)
Line 4: Line 4:
 
In /var/mobile/Library/Assets, you will find a folder containing the name haywire. Inside, you'll find multiple folders seemingly used for restoring. When looking in these folders, you'll find the codenames B137 and B135, with encrypted development components for each, as well as an encrypted ramdisk, with no known keys. They also have iBSS, DeviceTree, and Kernelcaches, but nothing more. According to further exploration, it appears that these "firmwares" can be restored with a specialized version of PurpleRestore. That version has yet to be leaked.
 
In /var/mobile/Library/Assets, you will find a folder containing the name haywire. Inside, you'll find multiple folders seemingly used for restoring. When looking in these folders, you'll find the codenames B137 and B135, with encrypted development components for each, as well as an encrypted ramdisk, with no known keys. They also have iBSS, DeviceTree, and Kernelcaches, but nothing more. According to further exploration, it appears that these "firmwares" can be restored with a specialized version of PurpleRestore. That version has yet to be leaked.
 
== Applications ==
 
== Applications ==
  +
After booting up, [[SwitchBoard.app]] lets you choose from a slew of apps. They are:
 
*[[BatterySet]]
 
*[[BatterySet]]
 
*[[BurnIn]]
 
*[[BurnIn]]

Revision as of 03:55, 22 October 2017

Background

The following is a build of SwitchBoard based on 6.0, which is compatible with N88, N90, N92, N94, N84, and N88, according to various folders inside of it. This is a special build with interesting quirks; along with information about Haywire, an unreleased cable used by Apple.

Haywire Firmware Findings

In /var/mobile/Library/Assets, you will find a folder containing the name haywire. Inside, you'll find multiple folders seemingly used for restoring. When looking in these folders, you'll find the codenames B137 and B135, with encrypted development components for each, as well as an encrypted ramdisk, with no known keys. They also have iBSS, DeviceTree, and Kernelcaches, but nothing more. According to further exploration, it appears that these "firmwares" can be restored with a specialized version of PurpleRestore. That version has yet to be leaked.

Applications

After booting up, SwitchBoard.app lets you choose from a slew of apps. They are: