The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
S5L8720
This is the Application Processor used on the iPod Touch 2G.
Exploits
iBoot / Kernel Level
These are jailbreaks only available through an iBoot exploit, which would have to be applied at every boot, meaning you must be connected to a computer, therefore making them a "tethered" jailbreak.
Bootrom
An untethered jailbreak would probably need to be in the VROM, but the basic meaning of an untethered jailbreak is to have one that you can freely reboot with and not have to apply it again every boot, not to mention custom boot / recovery logos.
Boot Chain
bootrom->LLB->iBoot->Kernel->System Software
It is definitely worthy to note that the Pwnage exploit is fixed because the images are now flashed to the NOR in their encrypted IMG3 containers, and the bootrom can properly sigcheck LLB.