Skip to content
Surf Wiki
Save to docs
general/ios-jailbreaking

From Surf Wiki (app.surf) — the open knowledge base

IOS jailbreaking

Removal of limitations from Apple's iOS devices


Removal of limitations from Apple's iOS devices

iOS jailbreaking is the use of a privilege escalation and kernel exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems. It is typically done through a series of kernel patches. A jailbroken device typically permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.

While sometimes compared to rooting an Android device, jailbreaking bypasses several types of Apple prohibitions for the end-user. Since it includes modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting), the concepts of iOS jailbreaking are therefore technically different from Android device rooting.

Motivation

Expanding the feature set that Apple and its App Store have restricted is one of the motivations for jailbreaking. Apple checks apps for compliance with its iOS Developer Program License Agreement before accepting them for distribution in the App Store. However, the reasons for Apple to ban apps are not limited to safety and security and may be regarded as arbitrary and capricious. In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that "contain content that ridicules public figures." To access banned apps, users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple, such as user interface customization and tweaks.

Device customization

Software programs that are available through APT or Installer.app (legacy) are not required to adhere to App Store guidelines. Most of them are not typical self-contained apps, but instead are extensions and customizations for iOS or other apps (commonly called tweaks). Users can install these programs for purposes including personalization and customization of the interface using tweaks developed by developers and designers, adding desired features such as access to the root file system and fixing annoyances, and making development work on the device easier by providing access to the file system and command-line tools. Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character input systems because they are easier to use than Apple's.

In some cases, jailbreak features are adopted by Apple and used as inspiration for features that are incorporated into iOS and iPadOS.

Adopted FeatureJailbreak TweakiOS VersionDescriptionTitleDeveloperOriginally released for
5.0Emoji supportVmojiVintendo/ManChild TechnologiesiOS 4
Keyboard shortcutsXpandrNicholas Haunold
Delete individual callsCall DeleteIArrays
7.0Control CenterSBSettingsBigBossiPhone OS 2
NCSettingsJamieD360iOS 5
Translucent Notification CenterBlurredNCBackgroundPhillippe
8.0Interactive NotificationsLockInfoDavid AshmaniOS 4
biteSMSbiteSMS TeamiOS 5
Third-Party KeyboardsFleksy EnablerSea CometiOS 6
Predictive TextPredictiveKeyboardMatthias Sauppe
9.0Cursor ControlSwipeSelectionKyle HowellsiOS 4
Lowercase Keys in KeyboardShowCaseLance Fetters
10.0Drawing on MessagesGraffitiIanPiOS 5
Floating Notification CenterFloaterSkylerk99iOS 8
Bubble NotificationsWatchNotificationsThomas Finch
Clear All Notifications3D Touch to Clear NotificationsMohammadAG
OneTapClearRave
Stickers in MessagesStickerMeAlexander Laurus
Separate Control Center PagesAuxoA3TweaksiOS 9
11.0Cellular Data ControlSBSettingsBigBossiPhone OS 2
CCSettingsplipalaiOS 8
Customizable Control CenterCChide/CCSettingsplipala
OnizukaMaximehip
Colored ControlsCreamCP Digital Darkroom
One-Handed Keyboard (iPhone)OneHandWizardTheAfricanNerd, sharedRoutine
Low Power Mode in Control CenterCCLowPowerCole CabraliOS 10
Notification design tweaksCleanNotification10Ayden Panhuyzen
13.0Dark ModeEclipseGuillermo MorániOS 7
NoctisLaughingQuoll
Download manager in SafariSafari PlusBigBossiOS 8
Redesigned volume HUDMeliorSparkDeviOS 7
UltrasoundAyden PanhuyzeniOS 11
Wi-Fi/Bluetooth settings in Control CenterWeatherVaneATWiiks
Unlimited app download limit on Mobile DataAppstore UnrestrictiJulioverne
Third-party Controller SupportnControlKevin BradleyiOS 12
14.0Hide apps from Home screenPoofBigBossiOS 5, possibly older
Compact Call InterfaceCallBarElias LimneosiOS 7
ScorpionEsquilliiOS 13
App LibraryVestaSparkDev
Changing CarPlay backgroundCanvasLeftyfl1p
Home Screen WidgetsHSWidgetsdgh0st
Smaller SiriSmallSiriMuirey03
15.0Separation AlertsProximitusLaughingQuolliOS 11
Low Power Mode (iPad)LPMPadiCrazeiOS 13
FocusPureFocusDave Van Wijk
Notification PriorityContacyXCXiao
Redesigned NotificationsQuartLaughingQuoll
VelvetNoisyFlake
HiMyNameIsUbik
16.0Taptic KeyboardTapticKeysSparkDeviOS 10
Redesigned Now Playing InterfaceColorflowDavid GoldmaniOS 7
ChromaflowRyan NairiOS 14
Enhanced Lock Screen customizationComplicationsBen GiannisiOS 12
17.0Camera App Composition FeaturesCameraTweakSamballiOS 6
Crossfade in the Music AppCrossfadeH6nry
Improved Auto-correctManualCorrect ProAaron Lindsay (aerialx)iOS 7
Live VoicemailSuper VoicemailhAcxiOS 8
Informative App Store DownloadsApp PercentpxcexiOS 10
Change Haptic Menu SpeedBetter3DMenusdpkg_iOS 11
Safari Private Browsing PrivacyBioProtect XSElias LimneosiOS 12
Additional AirPods gesturesSiliqua ProLaughingQuoll
Using Non-System AppsEvilSchemeLorenzoiOS 13
Interactive WidgetsPowerWidgetGinsuiOS 14
Additional CarPlay WallpapersAirawDcsyhi
Contact PostersPhoenixSouthernGirlWhoCode of titand3v
Verification code auto-deletingNoMoreShortCodesArcas
Notes App FormattingTextyle 3Ryan NairiOS 15
StandBy ModePhotoncemckiOS 13.0
Change Lock Screen Time WeightSimpleTimep2kdeviOS 12.0

Carrier unlocking

Jailbreaking also opens the possibility for using software to unofficially unlock carrier-locked iPhones so they can be used with other carriers. Software-based unlocks have been available since September 2007, with each tool applying to a specific iPhone model and baseband version (or multiple models and versions). This includes the iPhone 4S, iPhone 4, iPhone 3GS, and iPhone 3G models. An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to install the iPad baseband to the iPhone.

Installation of malware

Cybercriminals may jailbreak an iPhone to install malware or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company Hacking Team, which used to sell hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.

Software piracy

On iOS devices, the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking, therefore, allows the installation of pirated applications. It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software. However, the installation of pirated applications is also possible without jailbreaking, taking advantage of enterprise certificates to facilitate the distribution of modified or pirated releases of popular applications.

Package managers

Security of the device

Depending on the type of the jailbreak (i.e. 'rootless' or 'rootful'), different security structures may be compromised to various degrees. As jailbreaking grants freedom over running software that isn't confined to a sandbox typical to that of an App Store application, as well as modifications to system files, it ultimately allows for the threat of malware.

Users of a jailbroken device are also often forced to stay on an older iOS version that is no longer supported by Apple, commonly due to the unavailability of jailbreak on the newer versions. While using older versions of iOS is considered safe in most circumstances, the device may be vulnerable to publicly known security flaws.

In June 2021, ESET Research confirmed that malware did exist on one of the piracy repositories in the jailbreak community. The malware actively targeted iSecureOS to try to bypass the detection, but updates to the security app were quickly released and have mitigated the malware.

Comparison to Android rooting

Jailbreaking of iOS devices has sometimes been compared to "rooting" of Android devices. Although both concepts involve privilege escalation, they do differ in scope.

Where Android rooting and jailbreaking are similar is that both are used to grant the owner of the device superuser system-level privileges, which may be transferred to one or more apps. However, unlike iOS phones and tablets, nearly all Android devices already offer an option to allow the user to sideload 3rd-party apps onto the device without having to install from an official source such as the Google Play store, although this is expected to change on September 2026 for Brazil, Indonesia, Singapore, and Thailand; and in 2027 worldwide. Many Android devices also provide owners the capability to modify or even replace the full operating system after unlocking the bootloader, although doing this requires a factory reset.

In contrast, iOS devices are engineered with restrictions including a "locked bootloader" which can not be unlocked by the owner to modify the operating system without violating Apple's end-user license agreement. And on iOS, until 2015, while corporations could install private applications onto corporate phones, sideloading unsanctioned, 3rd-party apps onto iOS devices from sources other than the App Store was prohibited for most individual users without a purchased developer membership. After 2015, the ability to install 3rd-party apps became free for all users; however, doing so requires a basic understanding of Xcode and compiling iOS apps.

Jailbreaking an iOS device to defeat all these security restrictions presents a significant technical challenge. Similar to Android, alternative iOS app stores utilizing enterprise certificates are available, offering modified or pirated releases of popular applications and video games, some of which were either previously released through Cydia or are unavailable on the App Store due to these apps not complying with Apple developer guidelines.

Tools

Types

Many different types of jailbreaks have been developed over the years, differing in how and when the exploit is applied.

Untethered

When a jailbroken device is booting, it loads Apple's own boot software initially. The device is then exploited and the kernel is patched every time it is turned on. An untethered jailbreak is a jailbreak that does not require any assistance when it boots up. The kernel will be patched without the help of a computer or an application.

Tethered

A tethered jailbreak is the opposite of an untethered jailbreak, in the sense that a computer is required to boot the device. Without a computer running the jailbreaking software, the iOS device will not be able to boot at all. While using a tethered jailbreak, the user will still be able to restart/kill the device's SpringBoard process without needing to reboot. Many early jailbreaks were offered initially as tethered jailbreaks. The reason a computer is mandatory for booting is often related to the exploit targeting the device's iBoot process. While untethered jailbreaks find a way to make kernel patches persist in memory across reboots, the tethered exploit only temporarily modifies iBoot's signature verification checks. When the device is powered off, this temporary patch is lost. The unmodified iBoot then fails its integrity check on the modified files, preventing the device from booting until the computer is used to re-run the exploit and bypass the iBoot verification steps.

Semi-tethered

This type of jailbreak allows a user to reboot their phone normally, but upon doing so, the jailbreak and any modified code will be effectively disabled, as it will have an unpatched kernel. Any functionality independent of the jailbreak will still run as normal, such as making a phone call, texting, or using App Store applications. To be able to have a patched kernel and run modified code again, the device must be booted using a computer.

Semi-untethered

This type of jailbreak is like a semi-tethered jailbreak in which when the device reboots, it no longer has a patched kernel, but the key difference is that the kernel can be patched without using a computer. The kernel is usually patched using an application installed on the device without patches. This type of jailbreak has become increasingly popular, with most recent jailbreaks classified as semi-untethered.

History of tools

[[JailbreakMe]] and AppSnapp

A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it, and soon a jailbreak-only game app became available. In October 2007, JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod Touch, and it included Installer.app as a way to get software for the jailbroken device.

ZiPhone

In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.

PwnageTool

The iPhone Dev Team, which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod Touch, newly including Cydia as the primary third-party installer for jailbroken software. PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.

QuickPwn

In November 2008 the iPhone Dev Team released QuickPwn to jailbreak iPhone OS 2.2 on iPhone and iPod Touch, with options to enable past functionality that Apple had disabled on certain devices.

redsn0w

After Apple released iPhone OS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac. It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.

purplera1n & blackra1n

George Hotz developed the first iPhone unlock, which was a hardware-based solution. Later, in 2009, he released a jailbreaking tool for the iPhone 3G and iPhone 3GS on iPhone OS 3.0 called purplera1n, and blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod Touch and other devices.

limera1n

In October 2010, George Hotz released limera1n, a low-level exploit of boot ROM code that permanently works to jailbreak the iPhone 4 and is used as a part of tools including redsn0w.

Spirit and JailbreakMe

Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010. Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iPhone OS 3.2. In August 2010, comex released JailbreakMe 2.0, the first web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1). In July 2011, he released JailbreakMe 3.0, a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3). It used a flaw in PDF file rendering in mobile Safari.

Greenpois0n

Chronic Dev Team initially released Greenpois0n in October 2010, a desktop-based tool for untethered jailbreaking iOS 4.1 and later iOS 4.2.1 on most devices including the Apple TV, as well as iOS 4.2.6 on CDMA (Verizon) iPhones.

ultrasn0w

As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod Touch (3rd and 4th generation). As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1.

Absinthe

The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S. In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1, including jailbreaking the third-generation iPad for the first time.

evasi0n

An iOS 6.X untethered jailbreak tool called "evasi0n" was released for Linux, OS X, and Windows on February 4, 2013. Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.

TaiG

On November 29, 2014, TaiG team released their untethered jailbreak tool called "TaiG" for devices running iOS 8.0–8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2. On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0–8.4.

Pangu9

On October 14, 2015, Pangu Team released Pangu9, their untethered jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.

Table of tools

NameRelease dateHardwareFirmwareUntethered?Developer(s)LicenseiPadiPhoneiPod
TouchOldestRecent
title=Apple iOS Zero-Day PDF Vulnerability Exposedauthor=Mathew J. Schwartzurl=http://www.informationweek.com/news/231001147archive-url=https://web.archive.org/web/20110710123801/http://www.informationweek.com/news/231001147url-status=deadarchive-date=July 10, 2011newspaper=InformationWeekdate=July 7, 2011access-date=October 23, 2011 }}{{flatlist{{flatlist14.2.64.2.8
4.3 – 4.3.3comexProprietary
url= http://www.pcworld.com/article/238653/jailbreaking_101_which_tool_to_use_to_hack_your_idevice.htmltitle= Jailbreaking 101: Which Tool to Use to Hack Your iDeviceauthor= Mike Kellerdate= August 23, 2011work= PCWorldpublisher= IDGaccess-date= October 23, 2011archive-url= https://web.archive.org/web/20120706182705/http://www.pcworld.com/article/238653/jailbreaking_101_which_tool_to_use_to_hack_your_idevice.htmlarchive-date= July 6, 2012url-status= live }}2nd generation Apple TV4.35.3
6.1.2 (tethered)GPLv3
url= http://www.pcworld.com/article/242116/how_to_jailbreak_your_ios_5_device.htmltitle= How to Jailbreak Your iOS 5 Deviceauthor= Sarah Jacobsson Purewaldate= October 18, 2011work= PCWorldpublisher= IDGaccess-date= October 23, 2011archive-url= https://web.archive.org/web/20160508003229/http://www.pcworld.com/article/242116/how_to_jailbreak_your_ios_5_device.htmlarchive-date= May 8, 2016url-status= live }}1{{flatlist14.16.1.6iPhone Dev TeamProprietary
Absinthe 2.0.4{{flatlist{{flatlist15.1.1pod2g, Chronic Dev Team, iPhone Dev TeamProprietary
evasi0n{{flatlist{{flatlist{{flatlist6.0title= evasi0n iOS 7.0.x Jailbreak – official website of the evad3rsurl= http://evasi0n.com/url-status= deadarchive-url= https://web.archive.org/web/20130204000427/http://www.evasi0n.com/archive-date= February 4, 2013df= mdy-all}}pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)Proprietary
evasi0n7{{flatlist{{flatlist57.07.0.6pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)Proprietary
p0sixspwn{{flatlist{{flatlist{{flatlist6.1.36.1.6winocm, iH8sn0w, and SquiffyPwnGPLv3
Pangu{{flatlist{{flatlist57.17.1.2dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)Proprietary
Pangu8{{flatlist{{flatlist58.08.1windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)Proprietary
TaiG{{flatlist{{flatlist{{flatlist8.08.4TaiGProprietary
PPJailbreak{{flatlist{{flatlist{{flatlist8.08.4PanguTeam and PPJailbreakProprietary
Pangu9{{flatlist{{flatlist{{flatlist9.09.1PanguTeamProprietary
Pangu94th generation Apple TV9.09.0.1PanguTeamProprietary
LiberTV4th generation Apple TV9.110.1Marco Grassi, Luca Todesco, Jonathan LevinProprietary
LiberTV 1.14th & 5th generation (4K) Apple TV11.011.1Marco Grassi, Luca Todesco, Jonathan LevinProprietary
PPJailbreak{{flatlist{{flatlist{{flatlist9.29.3.3PanguTeam and PPJailbreakProprietary
mach_portal + YaluPro{{flatlist610.0.110.1.1 (depends on device)Luca Todesco
yalu102{{flatlist{{flatlist610.0.110.2Luca Todesco and Marco GrassiWTFPL
Phœnix{{flatlist{{flatlist{{flatlist9.3.5Siguza and tihmstarProprietary
Etason{{flatlist{{flatlist{{flatlist8.4.1tihmstarProprietary
Saïgon{{flatlist{{flatlist{{flatlist10.2.1Abraham MasriProprietary
h3lix{{flatlist{{flatlistNo support10.010.3.4tihmstarProprietary
Meridian{{flatlist{{flatlist{{flatlist10.010.3.3Sparkey, Ian Beer, Siguza, xerub, stek29, theninjaprawn, ARX8x, cheesecakeufo, FoxletFox, Sticktron, nullpixel, arpolix, EthanRDoesMC, CydiaBen, Comsecuris UG, Brandon Saldan, Lepidus, Cryptic, Samg_is_a_Ninja, M1staMIT
g0blin{{flatlist{{flatlist{{flatlist10.310.3.3Sticktron, Siguza, Ian Beer, windknown, Luca Todesco, xerub, tihmstar, saurik, uroboro, Abraham Masri, arx8x, PsychoTea, CrypticProprietary
url=https://totally-not.spyware.lol/title=Spyware.lolaccess-date=March 22, 2019archive-date=December 6, 2022archive-url=https://web.archive.org/web/20221206191950/https://totally-not.spyware.lol/url-status=live }}10.010.3.3JakeBlair420Proprietary
LiberiOS{{flatlist{{flatlist611.011.1.2Marco Grassi, Luca Todesco, Jonathan Levin, Ian BeerProprietary
Electra1112{{Flatlist* 5{{flatlist611.011.1.2CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, stek29, angelXwind, comex, isklikas, and goeo_, DHowett, and rpetrichGPLv3
Electra1131{{Flatlist* 5{{Flatlist* 5S611.011.4.1CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, Brandon Azad, stek29, Jamie Bishop, Pwn20wndGPLv3
ElectraTV4th generation Apple TV11.011.4.1nitoTV
unc0ver{{Flatlist* 5{{Flatlist* 5S{{Flatlist* 611.014.8.1 (excludes 13.5.1)Pwn20wnd, Sam Bingner, Ian Beer, Brandon Azad, Jonathan Levin, xerub, sparkey, stek29, theninjaprawnNew BSD License
Chimera{{Flatlist* 5{{Flatlist* 5s{{Flatlist* 612.012.5.7Coolstar, Jamie Bishop, tri'angle, ninjaprawn, Brandon Azad, PsychoTea, Ayden Panhuyzen, Umang Raghuvanshi, aesign
checkra1n{{Flatlist* 5s{{Flatlist* 612.0+14.8.1argp, axi0mx, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza, haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini, Cellebrite, et al.Proprietary
EtasonATV3rd generation Apple TV7.4+tihmstarProprietary
FuguAll A10-A10X-based iPads{{Flatlist* 7713.013.5.113.5.1Linus HenzeGPLv3
OdysseyAll iPads that support iOS 13iPhone 6s or newer713.013.7CoolStar, Hayden Seay, 23Aaron, TihmstarNew BSD License
TaurineA14 and below that support iOS 14A14 and below that support iOS 14714.014.314.8.1CoolStar, tihmstar, Diatrus, 23 Aaron, ModernPwner, pattern-fBSD License
Fugu14All A12-A14-based iPadsAll A12-A14-based iPhonesNo support14.214.5.114.5.1Linus HenzeMIT
last=Bouchardfirst=Anthonydate=April 20, 2022title=New p0laris jailbreak for legacy iOS 9.x firmware releasedurl=https://www.idownloadblog.com/2022/04/20/p0laris-ios-9-jailbreak/access-date=May 5, 2022website=iDownloadBlog.comlanguage=en-USarchive-date=May 6, 2022archive-url=https://web.archive.org/web/20220506082006/https://www.idownloadblog.com/2022/04/20/p0laris-ios-9-jailbreak/url-status=live }}All A5/A5X-A6/A6X-based devices59.3.59.3.6spvLGPLv2.1
url=https://github.com/0xilis/openpwnagetitle=openpwnage GitHub Pagewebsite=GitHubaccess-date=February 23, 2023archive-date=January 14, 2023archive-url=https://web.archive.org/web/20230114105925/https://github.com/0xilis/openpwnageurl-status=live }}All A5/A5X-A6/A6X-based devices58.4b49.3.60xilisLGPLv2.1
url=https://idevicecentral.com/jailbreak-news/new-blizzard-jailbreak-released-by-geosn0w-for-ios-9-0-9-3-6-32-bit-devices/title=New Blizzard Jailbreak released by GeoSn0w For iOS 9.0 – 9.3.6, 32-Bit Deviceswebsite=idevicecentral.comdate=August 4, 2022access-date=October 21, 2023archive-date=November 3, 2023archive-url=https://web.archive.org/web/20231103030537/https://idevicecentral.com/jailbreak-news/new-blizzard-jailbreak-released-by-geosn0w-for-ios-9-0-9-3-6-32-bit-devices/url-status=live }}All A5/A5X-A6/A6X-based devices58.4b49.3.6GeoSn0wLGPLv3.0
palera1nA11 and below that support iOS 15/16/17/18A11 and below that support iOS 15/16715.018.7.3Nebula, Mineek, Nathan, Lakhan Lothiyi, Tom, Nick Chan, FlowerMIT
XinaA15All A12-A15 based devicesNo support15.015.4.1Xina520Proprietary
DopamineAll A9-A16, M1-M2 based iPadsAll A9-A16 based iPhones715.016.6.1 (A9-A11)Lars FröderMIT
BootstrapAll A8-A15 based devices715.017.0TbMIT
nathanlrAll A12-A15 based devicesNo support16.5.117.0verygenericnameNew BSD License

History of exploit-disabling patch releases

Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original evasi0n iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Boot ROM exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.

On July 15, 2011, Apple released a new iOS version that closed the exploit used in JailbreakMe 3.0. The German Federal Office for Information Security had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or malware unwillingly downloaded by iOS users clicking on maliciously crafted PDF files.

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.

On October 21, 2015, seven days after the Pangu iOS 9.0–9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.

On January 23, 2017, Apple released iOS 10.2.1 to patch jailbreak exploits released by Google for the Yalu iOS 10 jailbreak created by Luca Todesco.

On December 10, 2019, Apple used DMCA takedown requests to remove posts from Twitter. The tweet contained an encryption key that could potentially be used to reverse engineer the iPhone's Secure Enclave. Apple later retracted the claim, and the tweet was reinstated.

On June 1, 2020, Apple released the 13.5.1 update, patching the zero-day exploit used by the Unc0ver jailbreak.

On September 20, 2021, Apple released iOS/iPadOS 15, which introduced signed system volume security to iOS/iPadOS, meaning that any changes to the root file system would revert to the latest snapshot on a reboot, and changes to the snapshot would make the device unbootable.

Legality

The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting digital rights management (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.

International treaties have influenced the development of laws affecting jailbreaking. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software, but member states vary on the implementation of the directive.

While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one. Apple has also regularly credited jailbreak developers with detecting security holes in iOS release notes.

Apple's support article concerning jailbreaking claims that they "may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software," which includes jailbreaking.

Australia

In 2010, Electronic Frontiers Australia said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply. These laws had been strengthened by the Copyright Amendment Act 2006.

Canada

In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with DRM protection, with exceptions including software interoperability. Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive, but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.

India

India's copyright law permits circumventing DRM for non-copyright-infringing purposes. Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012. India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.

New Zealand

New Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes. This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.

Singapore

Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.

United Kingdom

The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court. Competition laws may also be relevant.

United States

The main law that affects the legality of iOS jailbreaking in the United States is the 1998 Digital Millennium Copyright Act (DMCA), which says "no person shall circumvent a technological measure that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking. Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally, and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets. It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning. It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.

In 2010, Apple announced that jailbreaking "can violate the warranty".

Digital Millennium Copyright Act exemptions

In 2007, Tim Wu, a professor at Columbia Law School, argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun." Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA. Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.

In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers. Apple had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010, that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects. The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013. In 2015, these exemptions were extended to include other devices, including tablets.

Risks

Security, privacy and stability

The first iPhone worm, iKee, appeared in early November 2009, created by a 21-year-old Australian student in the town of Wollongong. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an SSH service, which those users can leave in the default insecure state. In the same month, F-Secure reported on a new malicious worm compromising bank transactions from jailbroken phones in the Netherlands, similarly affecting devices where the owner had installed SSH without changing the default password.

Restoring a device with iTunes removes a jailbreak. However, doing so generally updates the device to the latest, and possibly non-jailbreakable, version, due to Apple's use of SHSH blobs. There are many applications that aim to prevent this, by restoring the devices to the same version they are currently running whilst removing the jailbreaks. Examples are, Succession, Semi-Restore and Cydia Eraser.

In 2012, Forbes staff analyzed a UCSB study on 1,407 free programs available from Apple and a third-party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple's App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones. Also, a program available in Cydia called PrivaCy allows user to control the upload of usage statistics to remote servers.

In August 2015, the KeyRaider malware was discovered, affecting only jailbroken iPhones.

Fake/scam jailbreaks

In recent years, due to the technical complexity and often rarity of legitimate jailbreaking software (especially untethered jailbreaks) there has been an increase in websites offering fake iOS jailbreaks. These websites often ask for payment or make heavy use of advertising, but have no actual jailbreak to offer. Others install a fake, lookalike version of the Cydia package manager. In some cases, users have been asked to download free-to-play apps or fill out surveys to complete a (non-existent) jailbreak.

Notes

References

References

  1. "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues".
  2. Chris Foresman. (December 13, 2010). "iPhone jailbreaker set to bring Cydia to Mac OS X". [[Condé Nast]].
  3. "Agreements and Guidelines - Support - Apple Developer".
  4. Steve Kovach. (April 13, 2013). "Frustration Builds With Apple's Inconsistent Rules For App Developers". Business Insider.
  5. Ryan Singel. (April 15, 2010). "Apple App Store Bans Pulitzer-Winning Satirist for Satire".
  6. "Rejected Apps". imore.com.
  7. Apple, Inc.. "About Sensitive Content Warning on Apple devices".
  8. (March 27, 2015). "Jailbreak! New Rules Allow Unapproved iPhone Apps". Fox News.
  9. Adam Dachis. (March 14, 2011). "How to Get the Most Out of Your Jailbroken iOS Device". [[Gawker Media]].
  10. Jenna Wortham. (May 12, 2009). "Unofficial Software Incurs Apple's Wrath". The New York Times.
  11. Zdziarski, Jonathan. (2008). "iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain". "O'Reilly Media, Inc.".
  12. Landau, Ted. (2009). "Take control of your iPhone". TidBITS Publishing, Incorporated.
  13. Nathan T. Washburn. (May 4, 2012). "Apple Discovers a New Market in China: Rich Boyfriends". Harvard Business Review.
  14. Haslam, Oliver. (June 10, 2015). "9 Jailbreak Tweaks Apple Killed In iOS 9". Redmond Pie.
  15. Manalo, Amboy. (November 2, 2018). "60 iOS Features Apple Stole from Jailbreakers". [[Gadget Hacks]].
  16. (November 2, 2018). "60 iOS Features Apple Stole from Jailbreakers".
  17. (June 7, 2019). "Every Jailbreak Tweak Apple Copied in iOS 13".
  18. (October 16, 2011). "Poof - Cydia".
  19. Bouchard, Anthony. (July 5, 2023). "17 things iOS & iPadOS 17 'borrowed' from the jailbreak community".
  20. Brian X. Chen. (August 7, 2009). "6 Reasons to Jailbreak Your iPhone". Wired.
  21. Ryan Block. (September 11, 2007). "iUnlock released: the first free, open source iPhone SIM unlock software". [[Aol]].
  22. Ian Paul. (December 22, 2008). "3G iPhone Unlock Expected". [[IDG]].
  23. (November 25, 2011). "New Jailbreak App Stalks All Of Your iPhone's Activity And Makes It Available Online".
  24. (January 2, 2013). "Now pirated iOS apps can be installed without jailbreak".
  25. (May 26, 2012). "Jailbreak, app piracy, and the true cost of theft".
  26. Panzarino, Matthew. (January 1, 2013). "iOS App Piracy Continues, Now Without Jailbreak". The Next Web.
  27. "The newer version of iOS/Spy.Postlo.A attempts to modify the definitions of @isecureos (iOS Security application for jailbroken devices) to avoid detection.".
  28. (February 2, 2012). "Android A to Z: What is sideloading?".
  29. "Android developer verification".
  30. "A new layer of security for certified Android devices".
  31. "HTC Bootloader Unlock Instructions".
  32. "Official Bootloader Unlock instructions".
  33. "#unlocking-the-bootloader Google instructions on bootloader unlocking".
  34. Mayo, Benjamin. (June 10, 2015). "Xcode 7 allows anyone to download, build and 'sideload' iOS apps for free". 9to5Mac.
  35. "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues".
  36. Ricker, Thomas. (July 10, 2007). "iPhone Hackers: "we have owned the filesystem"". [[Engadget]].
  37. Topolsky, Joshua. (August 6, 2007). "First third-party "game" app appears for iPhone". [[Engadget]].
  38. Wilson, Ben. (October 10, 2007). "Official iPhone 1.1.1 jailbreak released with easy-to-follow instructions; does not require TIFF exploit". [[CBS Interactive]].
  39. Gregg Keizer. (October 29, 2007). "Hacker Software Can Install Unauthorized Software on iPhones". [[IDG]].
  40. (2018-09-06). "iOS Jailbreaking - A Complete History - TechEngage".
  41. Block, Ryan. (February 12, 2008). "ZiPhone: jailbreak any version iPhone out of the box, including 1.1.3 (by Zibri)". [[Engadget]].
  42. Charlie Sorrel. (July 21, 2008). "Pwnage 2.0 Released: Gadget Lab Jailbreaks iPod Touch". Wired.
  43. Philip Elmer-DeWitt. (July 20, 2008). "Dubious achievement: Hackers 'jailbreak' the iPhone 3G". CNN Money.
  44. Erica Sadun. (July 20, 2008). "First Look: Pwnage for 2.0". TUAW.
  45. Dev Team. (May 2011). "Tic tac toe...". Dev Team Blog.
  46. Charlie Sorrel. (November 25, 2008). "QuickPWN Adds Street View to iPod Touch". Wired.
  47. Daniel Pan. (June 23, 2009). "How to Use Cydia on your iPhone". iPhoneByte.
  48. Elizabeth Fish. (October 13, 2011). "iOS 5 Jailbreak Is Already Here; Geeks Not Surprised". [[IDG]].
  49. Leslie Katz. (July 3, 2009). "iPhone 3GS jailbreak, 'purplera1n,' hits Web". [[CBS Interactive]].
  50. Charlie Sorrel. (November 5, 2009). "BlackRa1n Plus Blacksn0w: Unlock Any iPhone in Seconds". Wired.
  51. Thomas Ricker. (June 7, 2011). "iOS 5 jailbroken". Aol.com.
  52. Dan Goodin. (May 3, 2010). "Hackers release jailbreak for iPad and newer iPhones". The Register.
  53. John D. Sutter. (August 2, 2010). "First iPhone 4 'jailbreak' posted online". CNN.
  54. Sean Hollister. (August 1, 2010). "Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video)". Engadget.
  55. Andy Greenberg. (August 1, 2011). "Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple". Forbes.
  56. Eric Mack. (July 6, 2011). "App enables iPad 2 jailbreak from your browser". [[CBS Interactive]].
  57. P. J. Connolly. (July 15, 2011). "Apple Fixes Latest iOS Exploit". eWEEK.
  58. jean. (July 18, 2011). "Analysis of the jailbreakme v3 font exploit". Sogeti ESEC Lab.
  59. David Murphy. (October 9, 2010). "iPhone Hackers Square Off With Competing iOS 4 Jailbreaks". PCMag.
  60. Charlie Sorrel. (February 4, 2011). "Untethered iOS 4.2.1 Jailbreak Live". Wired.
  61. Elizabeth Fish. (October 20, 2010). "Oh Hai! Apple TV Officially Hacked". [[IDG]].
  62. Blair Hanley Frank. (February 7, 2011). "Verizon iPhone Now Available for Jailbreaking". [[IDG]].
  63. Edgar Alvarez. (June 4, 2012). "Newest version of ultrasn0w unlocks iPhone 4, 3GS on iOS 5.1.1, RedSn0w 0.9.12b1 also released". Aol.
  64. Joseph Volpe. (January 20, 2012). "Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true". Aol.
  65. John Paul Titlow. (January 20, 2012). "Now You Can Jailbreak Your iPhone 4S and iPad 2". ReadWriteWeb.
  66. Eric Mack. (January 20, 2012). "Fly, be free! Jailbreak for iPhone 4S, iPad 2 released". [[CBS Interactive]].
  67. McKinley Noble. (January 20, 2012). "How to Jailbreak Your iPhone 4S and iPad 2 via Absinthe A5". [[IDG]].
  68. Adrian Kingsley-Hughes. (May 26, 2012). "Untethered Jailbreak For Your iOS 5.1.1 iPhone/iPad/iPod Touch Is Here". Forbes.
  69. (February 9, 2013). "evasi0n jailbreak used on nearly 7 million iOS 6.0/6.1 devices".
  70. "iOS 6.1.4 Software Update". apple.com.
  71. (December 10, 2014). "Download TaiG 1.2.0 To Jailbreak iOS 8.1.2".
  72. "TaiG Update Log".
  73. "iOS 9 has been jailbroken".
  74. (October 14, 2015). "The first iOS 9 jailbreak is here".
  75. Mathew J. Schwartz. (July 7, 2011). "Apple iOS Zero-Day PDF Vulnerability Exposed". InformationWeek.
  76. Mike Keller. (August 23, 2011). "Jailbreaking 101: Which Tool to Use to Hack Your iDevice". [[IDG]].
  77. "Seas0nPass/README at master · firecore/Seas0nPass".
  78. Sarah Jacobsson Purewal. (October 18, 2011). "How to Jailbreak Your iOS 5 Device". [[IDG]].
  79. iPhone Dev Team. (March 7, 2012). "March Mayhem". Dev Team Blog.
  80. iPhone Dev Team. (December 27, 2011). "Untethered holidays". Dev Team Blog.
  81. Edgar Alvarez. (April 21, 2012). "RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools". Engadget.
  82. (June 4, 2012). "Dev-Team Blog – Pre-DC". Dev-Team Blog.
  83. (March 20, 2013). "Jailbreak iOS 6.1.3 On Pre-A5 iPhone And iPod Touch Using Redsn0w [How-To Tutorial]". Redmond Pie.
  84. (September 30, 2022). "absinthe-2.0". OpenJailbreak.
  85. "evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs".
  86. (June 30, 2023). "OpenJailbreak/evasi0n6". OpenJailbreak.
  87. "Released under GPL licensing. · p0sixspwn/p0sixspwn@f1dff0f".
  88. (June 23, 2014). "Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released".
  89. "yalu102/LICENSE at master · kpwn/yalu102".
  90. (August 6, 2017). "Releasing Phoenix jailbreak for iOS 9.3.5 now! All 32bit devices supported! Be sure to check PGP signature :) https://phoenixpwn.com".
  91. "EtasonJB".
  92. Masri, Abraham. (December 16, 2017). "GitHub - cheesecakeufo/saigon: iOS 10.2.1 Jailbreak - Discontinued version".
  93. Sparkes, Ben. "Meridian: iOS 10.x Jailbreak".
  94. "MeridianJB/LICENSE.md at master · PsychoTea/MeridianJB".
  95. "Spyware.lol".
  96. "electra/LICENSE.md at master · coolstar/electra".
  97. "electra1131/LICENSE.md at master · coolstar/electra1131".
  98. "Undecimus/LICENSE at master · pwn20wndstuff/Undecimus".
  99. (September 27, 2019). "Unpatchable bug in millions of iOS devices exploited, developer claims – Ars Technica".
  100. "checkra1n Official Website".
  101. "Fugu/LICENSE at master · LinusHenze/Fugu".
  102. "Odyssey/LICENSE.md at master · Odyssey-Team/Odyssey".
  103. "Taurine".
  104. "Taurine/LICENSE.md at main · Odyssey-Team/Taurine".
  105. "Fugu14/LICENSE at master · LinusHenze/Fugu14".
  106. Bouchard, Anthony. (April 20, 2022). "New p0laris jailbreak for legacy iOS 9.x firmware released".
  107. "app/LICENSE at master · p0larisdev/app".
  108. "openpwnage GitHub Page".
  109. "openpwnage/LICENSE at main · 0xilis/openpwnage".
  110. (August 4, 2022). "New Blizzard Jailbreak released by GeoSn0w For iOS 9.0 – 9.3.6, 32-Bit Devices".
  111. "Blizzard-Jailbreak-9/LICENSE at main · geosn0w/Blizzard-Jailbreak-9".
  112. (February 12, 2023). "Release 2.0 beta 1 · palera1n/palera1n-c".
  113. "palera1n/LICENSE at main · palera1n/palera1n".
  114. "XinaA15 GitHub Page".
  115. Fröder, Lars. (August 18, 2023). "Dopamine GitHub Page".
  116. "Dopamine/LICENSE.md at master · opa334/Dopamine".
  117. "roothide/Bootstrap GitHub Page".
  118. "Bootstrap/LICENSE at main · roothide/Bootstrap".
  119. "nathanlr".
  120. "16.5.1-17.0".
  121. "nathanlr/LICENSE at main · verygenericname/nathanlr".
  122. (October 14, 2009). "Apple adds jailbreak resistance to recent iPhone 3GS models".
  123. Robertson, Jordan. (July 8, 2011). "Security holes discovered in iPhones, iPads". [[News & Record]].
  124. "Taig and Pangu working on Jailbreak for IOS 8.4.1".
  125. (May 22, 2015). "iOS 9's Rootless security system dubbed as a 'heavy blow' to jailbreak community".
  126. Perez, Sarah. (October 21, 2015). "Apple's iOS 9.1 Shuts Down The Pangu Hacking Team's Jailbreak".
  127. "About the security content of iOS 10.2.1". Apple Support.
  128. (December 11, 2019). "Apple Used DMCA Takedown to Temporarily Remove Tweet With iPhone Encryption Key".
  129. Gartenberg, Chaim. (June 1, 2020). "Apple releases iOS 13.5.1, patching out the Unc0ver jailbreak".
  130. "Signed system volume security in macOS".
  131. Duncan Geere. (July 28, 2010). "Investigation: Is it legal to jailbreak a UK iPhone?".
  132. "iPhone Uber-Hacker Comex Is Out At Apple".
  133. (February 21, 2014). "After Doing "Insane Things With iOS," Jailbreak Hacker Winocm Joins Apple".
  134. "8.4.1 release notes". Apple.
  135. "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support.
  136. Rosalyn Page. (August 5, 2010). "Could jailbreaking your iPhone land you in jail?". PC & Tech Authority.
  137. [[Michael Geist]]. (November 7, 2012). "Canadian Copyright Reform In Force: Expanded User Rights Now the Law". michaelgeist.ca.
  138. (February 10, 2012). "Canada's C-11 Bill and the Hazards of Digital Locks Provisions". Electronic Frontier Foundation.
  139. The Canadian Press. (October 13, 2011). "Phone 'jailbreaking' allows users to hack their phone". CTV News.
  140. Pranesh Prakash. (April 29, 2010). "Technological Protection Measures in the Copyright (Amendment) Bill, 2010". [[Centre for Internet and Society (India).
  141. Nate Anderson. (April 22, 2010). "India's copyright proposals are un-American (and that's bad)". [[Condé Nast]].
  142. Pranesh Prakash. (May 23, 2012). "Analysis of the Copyright (Amendment) Bill 2012". [[Centre for Internet and Society (India).
  143. [[Michael Geist]]. (April 10, 2008). "New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility". Michael Geist.
  144. Stephen Bell. (September 30, 2011). "Law changes required before NZ ratifies ACTA". ComputerWorld New Zealand.
  145. Kenny Chee. (August 12, 2010). "iPhone jailbreak may be legal here, but... But there will be certain legal provisions.". [[AsiaOne]].
  146. Jim Martin. (March 14, 2012). "How to jailbreak your iPhone: Unleash the full potential of your iPhone". PC Advisor.
  147. Warwick Ashford. (July 30, 2010). "iPhone jailbreaking is 'okay under EU law'". Electronics Weekly.
  148. Copyright Office, Library of Congress. (October 2012). "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". Federal Register.
  149. David Goldman. (July 26, 2010). "Jailbreaking iPhone apps is now legal". CNN Money.
  150. (October 28, 2015). "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". The United States Government.
  151. (July 30, 2010). "Transcript of "Jailbreak?" (July 30, 2010)". On The Media.
  152. Leander Kahney. (July 26, 2010). "Apple's Official Response To DMCA Jailbreak Exemption: It Voids Your Warranty". Cult Of Mac.
  153. Tim Wu. (October 4, 2007). "The iPhone Freedom Fighters". Slate.
  154. "Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for".
  155. (February 12, 2009). "Copyright office provides exemption to DMCA". [[United States Copyright Office]].
  156. Declan McCullagh. (July 26, 2010). "Feds say mobile-phone jailbreaking is OK". [[CBS Interactive]].
  157. "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". U.S. Copyright Office.
  158. Timothy B. Lee. (October 25, 2012). "Jailbreaking now legal under DMCA for smartphones, but not tablets". [[Condé Nast]].
  159. (October 27, 2012). "New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past". Android Police.
  160. Statt, Nick. (October 27, 2015). "US government says it's now okay to jailbreak your tablet and smart TV".
  161. Brigid Andersen. (November 9, 2009). "Australian admits creating first iPhone virus". [[ABC Online]].
  162. (November 23, 2009). "New iPhone worm can act like botnet say experts". BBC News.
  163. Mikko. (November 22, 2009). "Malicious iPhone Worm". F-secure.
  164. Adrian Kingsley-Hughes. (May 28, 2011). "'Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered". Forbes.
  165. Sharon Vaknin. (June 27, 2012). "How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal". [[CBS Interactive]].
  166. Christopher Breen. (December 29, 2008). "The Best IPhone Apps Not in the App Store". [[IDG]].
  167. Greenberg, Andy. (February 14, 2012). "Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones". Forbes.
  168. Joseph Steinberg. (August 31, 2015). "Massive iPhone User Data Breach: What You Need to Know". Inc..
  169. Wagenseil, Paul. (October 16, 2019). "iPhone Jailbreak Scam Puts Ads on Your Phone".
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about IOS jailbreaking — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report