Jump to content

IOS jailbreaking: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m Reverted edits by 86.107.252.62 (talk): Unexplained removal of content (HG) (3.1.20)
Line 1: Line 1:
{{lowercase title}}
{{lowercase title}}
{{inadequate lead|date=December 2015}}
{{inadequate lead|date=December 2015}}
'''iOS [[jailbreak (computer science)|jailbreak]]ing''' is the removing of software restrictions imposed by [[iOS]], [[Apple Inc.|Apple's]] [[operating system]], on devices running it through the use of software [[Exploit (computer security)|exploit
'''iOS [[jailbreak (computer science)|jailbreak]]ing''' is the removing of software restrictions imposed by [[iOS]], [[Apple Inc.|Apple's]] [[operating system]], on devices running it through the use of software [[Exploit (computer security)|exploits]]; devices include the [[iPhone]], [[iPod touch]], [[iPad]], and [[Apple TV|the AppleTV 2 and 4]]. Jailbreaking permits [[Superuser|root access]] to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official [[Apple App Store]].

iOS jailbreaking started as soon as the original iPhone became available in July 2007 and has continued into the present day. Apple has responded with updates to iOS patching exploits and with new hardware. Jailbreaking communities have not been legally threatened. The legal status of jailbreaking is unclear in most countries; while many prohibit tampering with digital locks they tolerate jailbreaks that do not infringe on copyrights. In 2010, 2012, and 2015, the U.S. Copyright Office approved exemptions allowing smartphone users to jailbreak their devices.

== Definition ==
[[iOS]] jailbreaking is the process of removing software restrictions imposed by iOS, Apple Inc's [[operating system]], on its devices including the [[iPhone]], [[iPod touch]], [[iPad]], and [[Apple TV|second-generation Apple TV]]. Jailbreaking is done by using software [[Exploit (computer security)|exploits]], and it permits [[Superuser|root access]] to the iOS file system and manager, so applications, extensions, and themes unavailable through the official [[Apple App Store]] can be downloaded.<ref name="Jailbreak iPhone, iPad, iPod touch, and Apple TV">{{cite web |url=http://www.idownloadblog.com/jailbreak/ |accessdate=March 31, 2015|title=Jailbreak iPhone, iPad, iPod touch, and Apple TV}}</ref>

[[Jailbreak (computer science)|Jailbreak]]ing in general means breaking the device out of its "jail",<ref name="pcworld-jailbreaking">{{cite web |url=http://www.pcworld.com/article/249091/geek_101_what_is_jailbreaking.html |title=Geek 101: What Is Jailbreaking? |author=Mike Keller |date= February 13, 2012 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=February 15, 2012}}</ref> a metaphor used in [[Unix]]-style systems, for example in "[[FreeBSD jail]]". A jailbroken iPhone, iPod touch, or iPad running iOS can still use the App Store, [[iTunes]], and other normal functions, such as making telephone calls.<ref name="Jailbreak iPhone, iPad, iPod touch, and Apple TV" />

Jailbreaking is a form of [[privilege escalation]],<ref>{{cite book |others= Miller, Charlie; Blazakis, Dion; DaiZovi, Dino; Esser, Stefan; Iozzo, Vincenzo; Weinmann, Ralf-Philip |title= iOS Hacker's Handbook |url= http://books.google.com/books?id=M7DVvMx0b6kC |accessdate= January 18, 2013 |year= 2012 |publisher= John Wiley & Sons |location= |isbn= 978-1-118-22843-2 |page= |pages= 309–310 }}</ref><ref>{{cite journal |last1= Höbarth |first1= S. |last2= Mayrhofer |first2= R. |year= |title= A framework for on-device privilege escalation exploit execution on Android |journal= Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2011 |volume= |issue= |pages= |publisher= mayrhofer.eu.org|doi= |url= http://www.mayrhofer.eu.org/downloads/publications/IWSSI2011-Android-Exploit-Framework.pdf |accessdate=January 18, 2013}}</ref> and describes privilege escalation on devices by other manufacturers as well.<ref>{{cite web |url= http://www.pcworld.com/article/153387/article.html |title= A Jailbreak for Google's Android |author= Robert McMillan |date= November 5, 2008 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=January 18, 2013}}</ref><ref>{{cite web |url= http://www.wired.com/threatlevel/2011/04/sony-settles-ps3-lawsuit/ |title= Sony Settles PlayStation Hacking Lawsuit |author= David Kravets |date= April 11, 2011 |work= Threat Level |publisher= Wired |accessdate=January 18, 2013}}</ref>

== Motivations ==
One of the reasons for jailbreaking is to expand the feature set limited by Apple and its App Store.<ref name="ars">{{cite web |url= http://arstechnica.com/apple/news/2010/12/iphone-jailbreaker-set-to-bring-cydia-to-mac-os-x.ars |title= iPhone jailbreaker set to bring Cydia to Mac OS X |author= Chris Foresman |date= December 13, 2010 | work=[[Ars Technica]] | publisher=[[Condé Nast]] |accessdate=August 2, 2011}}</ref> Apple checks apps for compliance with its iOS Developer Program License Agreement before accepting them for distribution in the App Store. However, their reasons for banning apps are not limited to safety and security and may be regarded as arbitrary and capricious.<ref>{{cite web|url=http://www.businessinsider.com/the-story-of-apples-confusing-inconsistent-rules-for-app-developers-2013-4|title=Frustration Builds With Apple's Inconsistent Rules For App Developers|author=Steve Kovach|date=13 April 2013|work=Business Insider}}</ref> In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that “contain content that ridicules public figures."<ref>{{cite news |url= http://www.wired.com/epicenter/2010/04/apple-bans-satire/ |title= Apple App Store Bans Pulitzer-Winning Satirist for Satire |author= Ryan Singel |date= April 15, 2010 |accessdate= February 12, 2011 |work=Wired}}</ref> To access banned apps,<ref>{{cite web|url=http://www.imore.com/tag/rejected-apps|title=Rejected Apps|work=imore.com}}</ref> users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,<ref>{{cite web|url=http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/|title=Jailbreak! New Rules Allow Unapproved iPhone Apps|work=Fox News}}</ref> such as user interface customization, tweaks, and religious apps.<ref>{{cite web|url=http://www.huffingtonpost.com/2014/01/10/banned-religious-apps_n_4577642.html|title=Banned Religious Apps You Won't Find On Apple iTunes|date=10 January 2014|work=The Huffington Post}}</ref>

=== Device customization ===
Since software programs available through [[Cydia]] are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps.<ref name="lifehacker-dachis">{{cite web |url= http://lifehacker.com/5781437/how-to-get-the-most-out-of-your-jailbroken-ios-device |title= How to Get the Most Out of Your Jailbroken iOS Device |author= Adam Dachis |date= March 14, 2011 | work=[[Lifehacker]] | publisher=[[Gawker Media]] |accessdate=August 2, 2011}}</ref> Users install these programs for purposes including personalization and customization of the interface by tweaks developed by developers and designers,<ref name="lifehacker-dachis" /> adding desired features and fixing annoyances,<ref name="nytimes">{{cite news |title= Unofficial Software Incurs Apple's Wrath |author= Jenna Wortham |url= http://www.nytimes.com/2009/05/13/technology/13jailbreak.html?pagewanted=all |newspaper= The New York Times |date= May 12, 2009 |accessdate=August 2, 2011}}</ref> and making development work on the device easier by providing access to the filesystem and command-line tools.<ref>{{cite book |title= iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain |last= Zdziarski |first= Jonathan |authorlink= |coauthors= |year= 2008 |publisher= |location= |isbn= 9780596554187|page= |pages= 3–4 |url= http://books.google.com/books?id=fkXvibFJrpIC&lpg=PA3&dq=cydia%20-pomonella%20-moth&pg=PA3#v=onepage&q&f=false |accessdate=}}</ref><ref>{{cite book |title= Take control of your iPhone |last= Landau |first= Ted |authorlink= |coauthors= |year= 2009 |publisher= |location= |isbn= 9781933671543|page= 107 |pages= |url= http://books.google.com/books?id=GiOVkVS4XZkC&lpg=PA109&dq=cydia%20iphone&pg=PA107#v=onepage&q&f=false |accessdate=}}</ref>

Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character [[input method|input systems]] because they are easier to use than Apple's.<ref>{{cite web |url= http://blogs.hbr.org/cs/2012/05/apple_discovers_a_new_market_i.html |title= Apple Discovers a New Market in China: Rich Boyfriends |author= Nathan T. Washburn |date= May 4, 2012 |work= HBR Blog Network |publisher= Harvard Business Review |accessdate=January 9, 2013}}</ref>

=== Use of handset on multiple carriers ===
Jailbreaking also opens the possibility for using software to unofficially unlock [[SIM lock|carrier-locked]] iPhones so they can be used with other carriers.<ref>{{cite web |url= http://www.wired.com/gadgetlab/2009/08/reasons-to-jailbreak/ |title= 6 Reasons to Jailbreak Your iPhone |author= Brian X. Chen |date= August 7, 2009 |work= Gadget Lab |publisher= Wired |accessdate=May 1, 2012}}</ref> Software-based unlocks have been available since September 2007,<ref>{{cite web |url= http://www.engadget.com/2007/09/11/iunlock-released-the-first-free-open-source-iphone-sim-unlock/ |title= iUnlock released: the first free, open source iPhone SIM unlock software |author= Ryan Block |date= September 11, 2007 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=February 1, 2014}}</ref> with each tool applying to a specific iPhone model and [[Baseband processor|baseband]] version (or multiple models and versions).<ref>{{cite web |url= http://www.pcworld.com/article/155873/3g_iphone_unlock_expected.html |title= 3G iPhone Unlock Expected |author= Ian Paul |date= December 22, 2008 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=May 1, 2012}}</ref> This includes the [[iphone 4S]], [[iPhone 4]], [[iPhone 3GS]], and [[iPhone 3G]] models.

An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to Install Cydia and iPad baseband as well.

=== Installation of malware ===
Computer criminals may jailbreak an iPhone to install malware, or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company [[Hacking Team]], which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.<ref name="Hacking Team hack reveals why you shouldn't jailbreak your iPhone">{{cite web|last1=Fleishman|first1=Glen|title=Hacking Team hack reveals why you shouldn't jailbreak your iPhone|url=http://www.macworld.com/article/2944712/hacking-team-hack-reveals-why-you-shouldnt-jailbreak-your-iphone.html|website=MacWorld|accessdate=2 August 2015}}</ref><ref>{{cite web|last1=Heath|first1=Alex|title=New Jailbreak App Stalks All Of Your iPhone’s Activity And Makes It Available Online|url=http://www.cultofmac.com/131805/new-jailbreak-app-stalks-all-of-your-iphones-activity-and-makes-it-available-online/|website=Cult of Mac|accessdate=2 August 2015}}</ref>

=== Software piracy ===
On iPhones the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking therefore allows the installation of pirated applications.<ref>{{cite web|last1=Hattersley|first1=Lou|title=Now pirated iOS apps can be installed without jailbreak|url=http://www.macworld.co.uk/news/apple/now-pirated-ios-apps-can-be-installed-without-jailbreak-3418110/|website=Macworld|accessdate=2 August 2015}}</ref> It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.<ref>{{cite web|last1=Kazmucha|first1=Allyson|title=Jailbreak, app piracy, and the true cost of theft|url=http://www.imore.com/jailbreak-app-piracy-cost-theft|website=iMore|accessdate=2 August 2015}}</ref>

== Types of jailbreaks ==
When a device is booting, it loads Apple's own [[Kernel (computing)|kernel]] initially. The device must then be [[Exploit (computer security)|exploited]] and have the kernel [[Patch (computing)|patched]] each time it is turned on.

An '''"untethered" jailbreak''' has the property that if the user turns the device off and back on, the device will start up completely, and the kernel will be patched without the help of a computer – thus enabling the user to boot without the need to use a computer.<ref name="iphone4s-engadget" /> These jailbreaks are harder to make and take a lot of reverse engineering and years of experience.

With a '''"tethered" jailbreak''', a computer is needed to turn the device on each time it is rebooted. If the device starts back up on its own, it will no longer have a patched kernel, and it may get stuck in a partially started state. By using a computer, the phone is essentially "re-jailbroken" (using the "boot tethered" feature of a jailbreaking tool) each time it is turned on.<ref name="iphone4s-readwriteweb" /> With a tethered jailbreak, you can still restart [[SpringBoard]] ("respring") on the device without needing to reboot.

There is also '''"semi-tethered"''' solution, which means that when the device boots, it will no longer have a patched kernel (so it will not be able to run modified code), but it will still be usable for normal functions such as making phone calls, or texting.<ref name="pcworld-semitether">{{cite web|last=Fish |first=Elizabeth |url=http://www.pcworld.com/article/242469/semitethered_ios_5_jailbreak_developed_useful_on_the_move.html |title=Semi-tethered iOS 5 Jailbreak Developed, Useful On The Move |work=[[PCWorld]] |publisher=[[IDG]] |date=October 24, 2011 |accessdate=April 22, 2012}}</ref> To use any features that require running modified code, the user must start the device with the help of the jailbreaking tool in order for it to start with a patched kernel (jailbroken).

In July 2016 PPJailbreak introduced the '''"semi-untethered" jailbreak''', which functions like a semi-tethered solution in that when the device boots, it no longer has a patched kernel (and thus access to jailbroken functions,) but also like an untethered device, in that a computer is not required to re-patch the kernel in order to re-enable the jailbreak (the jailbreak installs a sideloaded app which is used to re-patch the kernel after rebooting.)

=== Comparison to Android rooting ===

Jailbreaking of iOS devices has sometimes been compared to "[[Rooting (Android OS)|rooting]]" of [[Android (operating system)|Android]] devices. Although both concepts involve privilege escalation, they differ in scope. Some Android devices allow users to modify or replace the operating system after unlocking the bootloader.<ref>{{cite web|url=http://www.htcdev.com/bootloader|title=HTC Bootloader Unlock Instructions|website=htcdev.com|accessdate=26 October 2014}}</ref><ref>{{cite web|url=http://unlockbootloader.sonymobile.com#Sony|title=Official Bootloader Unlock instructions|website=sonymobile.com}}</ref><ref>{{cite web|url=http://source.android.com/source/building-devices.html|title=#unlocking-the-bootloader Google instructions on bootloader unlocking|website=source.android.com|accessdate=26 October 2014}}</ref> Moreover, nearly all Android phones have an option to allow the user to install unknown, 3rd-party apps, so no exploit is needed for normal "[[sideloading]]".<ref>{{cite web|url=http://www.androidcentral.com/what-sideloading-android-z|title=Android A to Z: What is sideloading?|date=2 Feb 2012|website=Android Central|last1=Hildenbrand|first1=Jerry|accessdate=9 July 2014}}</ref>

iOS is engineered with security measures including a "locked bootloader" to prevent users from modifying the operating system, and to prevent apps from gaining root privileges; jailbreaking an iOS device to defeat all security measures presents a significant technical challenge. It violates Apple's end-user license agreement for iOS.<ref>{{cite web|url=http://support.apple.com/kb/ht3743|title=Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues|website=Apple Support|quote=[U]nauthorized modification of iOS is a violation of the iOS end-user software license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software.|accessdate=9 July 2014}}</ref> Until 2015 [[sideloading]] apps in general was difficult for most individual users, requiring them to purchase developer membership, while corporations could install private applications onto corporate phones.<ref>[http://9to5mac.com/2015/06/10/xcode-7-allows-anyone-to-download-build-and-sideload-ios-apps-for-free/ sideloading Apps Xcode 7]</ref> After 2015, this became free for all users, however doing so requires a basic understanding of Xcode and compiling iOS Apps. Apps installed this way have the restrictions of all other apps.

== Security, privacy, and stability ==
The first [[iPhone]] [[Computer worm|worm]], iKee, appeared in early November 2009, created by a 21-year-old [[Australia]]n student in the town of [[Wollongong, New South Wales|Wollongong]]. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an [[Secure Shell|SSH]] service, which those users can leave in the default insecure state.<ref>{{cite news |title= Australian admits creating first iPhone virus |author= Brigid Andersen |url= http://www.abc.net.au/news/2009-11-09/australian-admits-creating-first-iphone-virus/1135474 |newspaper= [[ABC Online]] |date= November 9, 2009 |accessdate=October 26, 2011}}</ref> In the same month, [[F-Secure]] reported on a new malicious worm compromising bank transactions from jailbroken phones in the [[Netherlands]], similarly affecting devices where the owner had installed SSH without changing the default password.<ref>{{Cite news|url=http://news.bbc.co.uk/2/hi/technology/8373739.stm |title=New iPhone worm can act like botnet say experts |publisher=BBC News |date=November 23, 2009 |accessdate=April 10, 2010}}</ref><ref>{{cite web|url=http://www.f-secure.com/weblog/archives/00001822.html |title=Malicious iPhone Worm |work= News from the Lab |publisher=F-secure |author= Mikko |date=November 22, 2009 |accessdate=April 10, 2010}}</ref>
In 2010 blogger [[John Gruber]], who is close to Apple, said that users misunderstood some jailbreak exploits and that they were more serious than they appear. He commented that "it's odd how the press is mostly covering this as 'jailbreaking now more convenient' rather than 'remote code exploit now in the wild'", pointing out that the exploit allowed the creator of a malicious website to [[Drive-by download|take control]] of iPhones accessing it.<ref>{{cite web|last1=Gruber| first1=John| title=PDF security exploit|url=http://daringfireball.net/linked/2010/08/02/jailbreakme|website=Daring Fireball|accessdate=15 August 2015}}</ref>

Restoring a device with iTunes can remove a jailbreak.<ref>{{cite web |url= http://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-other-jailbreaking-questions-answered/ |title= 'Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered |author= Adrian Kingsley-Hughes |date= May 28, 2011 |work= Tech |publisher= Forbes |accessdate=November 14, 2012}}</ref><ref>{{cite web |url= http://howto.cnet.com/8301-11310_39-57462343-285/how-to-unjailbreak-your-iphone-ipad-or-ipod-touch/ |title= How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal |author= Sharon Vaknin |date= June 27, 2012 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=November 14, 2012}}</ref><ref>{{cite web |url= http://www.pcworld.com/article/156099/best_iphone_apps.html |title= The Best IPhone Apps Not in the App Store |author= Christopher Breen |date= December 29, 2008 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=November 14, 2012}}</ref>

In 2012, Forbes staff analyzed a UCSB study on 1407 free programs available from Apple and a third party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple’s App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones.<ref name="forbes-leak" /> Also, there is a program called PrivaCy that allows user to control the upload of usage statistics to remote servers.<ref name="forbes-leak">{{cite news |url=http://www.forbes.com/sites/andygreenberg/2012/02/14/unauthorized-iphone-and-ipad-apps-leak-private-data-less-often-than-approved-ones/ |title=Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones |last=Greenberg |first=Andy |work=Tech |publisher=Forbes |date=February 14, 2012 |accessdate=February 15, 2012}}</ref>

Installing software published outside the [[App Store (iOS)|App Store]] has the potential to affect [[Battery (electricity)|battery]] life and system stability if the software is poorly optimized or frequently uses resource-draining services (such as [[3G]] or [[Wi-Fi]]).<ref>{{cite web |url= http://www.businessinsider.com/reasons-not-to-jailbreak-iphone-2011-5 |title= The Truth About Jailbreaking Your iPhone: The 5 Biggest Drawbacks |author= Ellis Hamburger |date= May 3, 2011 |work=Business Insider |accessdate=October 26, 2011 }}</ref><ref>{{cite web |url= http://lifehacker.com/5799007/why-you-should-not-jailbreak-your-iphone-ipod-touch-or-ipad |title= Four Reasons Not to Jailbreak Your iPhone, iPod touch, or iPad |author= Adam Dachis |date= May 5, 2011 | work=[[Lifehacker]] | publisher=[[Gawker Media]] |accessdate=October 26, 2011 }}</ref><ref>{{cite web |url= http://www.pcworld.com/article/202441/5_reasons_to_jailbreak_your_iphone_and_5_reasons_not.html |title= 5 Reasons to Jailbreak Your iPhone – and 5 Reasons Not |author= Brennon Slattery |date= August 3, 2010 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 26, 2011 }}</ref> However, even apps from the App Store are known to cause battery issues whilst running in the background.<ref>{{cite web |url= https://www.macstories.net/linked/the-background-data-and-battery-usage-of-facebooks-ios-app/ |title= The Background Data and Battery Usage of Facebook’s iOS App |publisher=MacStories |accessdate=January 6, 2016}}</ref>

In August 2015 the [[KeyRaider]] malware was discovered that affects only jailbroken iPhones.<ref>{{cite news| url=http://www.inc.com/joseph-steinberg/massive-iphone-user-data-breach-what-you-need-to-know.html |work=Inc. | title=Massive iPhone User Data Breach: What You Need to Know | date=August 31, 2015 | accessdate=September 2, 2015 |author=Joseph Steinberg |authorlink=Joseph Steinberg}}</ref>

== History of exploit-disabling patch releases ==

Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original [[evasi0n]] iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Bootrom exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates, but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.<ref>{{Cite web|title = Apple adds jailbreak resistance to recent iPhone 3GS models|url = http://arstechnica.com/apple/2009/10/apple-adds-jailbreak-resistance-to-recent-iphone-3gs-models/|accessdate = 2015-06-20}}</ref>

On July 15, 2011, Apple released a new iOS version that closed the exploit used in [[JailbreakMe]] 3.0. The German [[Federal Office for Information Security]] had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or unwillingly downloaded [[malware]] by iOS users clicking on maliciously crafted [[PDF]] files.<ref>{{cite news|url=http://www.news-record.com/content/2011/07/08/article/security_holes_discovered_in_iphones_ipads|title=Security holes discovered in iPhones, iPads|last=Robertson|first=Jordan|work=[[News & Record]]|agency=[[Associated Press]]|date=July 8, 2011|accessdate=July 9, 2011}}</ref> Before Apple released a fix for this security hole, jailbreak users had access to a fix published by the developer of JailbreakMe.{{citation needed|date=December 2015}}

In Q3 2014 Apple released [[iOS]] 8.1.3 that patched up the exploits used in jailbreak for [[iOS]] 8.0-8.1.2. It was not possible to jailbreak until the iOS 8.3 update. The iOS 9.1 update on October 21, 2015, included a patch for the Pangu iOS 9.0-9.0.2 Jailbreak.<ref name=":0" />

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.<ref>{{cite web|url=http://www.mobileswire.com/ios-8-4-1-jailbreak-status-updated/|title=Taig and Pangu working on Jailbreak for IOS 8.4.1|accessdate=8 September 2015}}</ref>

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.<ref>{{cite web|url=http://ioshacker.com/news/ios-9s-rootless-security-system-dubbed-as-a-heavy-blow-to-jailbreak-community|title=iOS 9’s Rootless security system dubbed as a ‘heavy blow’ to jailbreak community|accessdate=10 October 2015}}</ref>

On October 21, 2015, seven days after the Pangu iOS 9.0-9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.<ref name=":0">{{Cite web|title = Apple’s iOS 9.1 Shuts Down The Pangu Hacking Team’s Jailbreak|url = http://social.techcrunch.com/2015/10/21/apples-ios-9-1-shuts-down-the-pangu-hacking-teams-jailbreak/|website = TechCrunch|accessdate = 2015-11-11|first = Sarah|last = Perez}}</ref>
On October 21, 2015, seven days after the Pangu iOS 9.0-9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.<ref name=":0">{{Cite web|title = Apple’s iOS 9.1 Shuts Down The Pangu Hacking Team’s Jailbreak|url = http://social.techcrunch.com/2015/10/21/apples-ios-9-1-shuts-down-the-pangu-hacking-teams-jailbreak/|website = TechCrunch|accessdate = 2015-11-11|first = Sarah|last = Perez}}</ref>


Line 41: Line 111:
In 2007 [[Tim Wu]], a professor at [[Columbia Law School]], argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."<ref name="slate-wu">{{cite web |url= http://www.slate.com/id/2175304/ |title= The iPhone Freedom Fighters |author= Tim Wu |date= October 4, 2007 |work= Technology |publisher= Slate |accessdate=October 26, 2011 }}</ref> Wu cited an explicit exemption issued by the [[Library of Congress]] in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.<ref>{{cite web |url=http://www.copyright.gov/fedreg/2006/71fr68472.pdf |title=Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for |format=PDF |date= |accessdate=September 11, 2010}}</ref> Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.<ref name="slate-wu" />
In 2007 [[Tim Wu]], a professor at [[Columbia Law School]], argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."<ref name="slate-wu">{{cite web |url= http://www.slate.com/id/2175304/ |title= The iPhone Freedom Fighters |author= Tim Wu |date= October 4, 2007 |work= Technology |publisher= Slate |accessdate=October 26, 2011 }}</ref> Wu cited an explicit exemption issued by the [[Library of Congress]] in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.<ref>{{cite web |url=http://www.copyright.gov/fedreg/2006/71fr68472.pdf |title=Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for |format=PDF |date= |accessdate=September 11, 2010}}</ref> Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.<ref name="slate-wu" />


In 2010, in response to a request by the [[Electronic Frontier Foundation]], the [[United States Copyright Office|U.S. Copyright Office]] explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.<ref>{{cite web |url=http://www.copyright.gov/1201/ |title=Copyright office provides exemption to DMCA |publisher=[[United States Copyright Office]] |date=February 12, 2009 |accessdate=July 17, 2009}}</ref><ref>{{cite web |url= http://news.cnet.com/8301-13578_3-20011661-38.html |title= Feds say mobile-phone jailbreaking is OK |author= Declan McCullagh |date= July 26, 2010 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=October 26, 2011 }}</ref> [[Apand an exemption to this class of devices could have unintended side effects.<ref name="U.S. Copyright Office 2013 Ruling">{{cite web |url=http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |publisher=U.S. Copyright Office |accessdate=October 31, 2012}}</ref><ref name="ars-jailbreaking-2012">{{cite web |author= Timothy B. Lee |url=http://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |title=Jailbreaking now legal under DMCA for smartphones, but not tablets | work=[[Ars Technica]] | publisher=[[Condé Nast]] |date=October 25, 2012 |accessdate=October 26, 2012}}</ref><ref name="Android Police">{{cite web |url=http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |title=New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past |publisher=Android Police |accessdate=October 31, 2012}}</ref> The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.<ref name="ars-jailbreaking-2012" />
In 2010, in response to a request by the [[Electronic Frontier Foundation]], the [[United States Copyright Office|U.S. Copyright Office]] explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.<ref>{{cite web |url=http://www.copyright.gov/1201/ |title=Copyright office provides exemption to DMCA |publisher=[[United States Copyright Office]] |date=February 12, 2009 |accessdate=July 17, 2009}}</ref><ref>{{cite web |url= http://news.cnet.com/8301-13578_3-20011661-38.html |title= Feds say mobile-phone jailbreaking is OK |author= Declan McCullagh |date= July 26, 2010 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=October 26, 2011 }}</ref> [[Apple Inc.|Apple]] had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010 that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.<ref name="U.S. Copyright Office 2013 Ruling">{{cite web |url=http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |publisher=U.S. Copyright Office |accessdate=October 31, 2012}}</ref><ref name="ars-jailbreaking-2012">{{cite web |author= Timothy B. Lee |url=http://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |title=Jailbreaking now legal under DMCA for smartphones, but not tablets | work=[[Ars Technica]] | publisher=[[Condé Nast]] |date=October 25, 2012 |accessdate=October 26, 2012}}</ref><ref name="Android Police">{{cite web |url=http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |title=New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past |publisher=Android Police |accessdate=October 31, 2012}}</ref> The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.<ref name="ars-jailbreaking-2012" />


== History of tools ==
== History of tools ==
Line 134: Line 206:
| {{dts|2009-6-19|format=mdy}}
| {{dts|2009-6-19|format=mdy}}
| [[purplera1n]]
| [[purplera1n]]
| [[George Hotz]]
| {{dts|2009-7-3|format=mdy}}<ref>{{cite news |url= http://www.washingtonpost.com/wp-dyn/content/article/2009/07/03/AR2009070300691.html |title= First iPhone 3GS Jailbreak Hits The Web |author= Daniel Brusilovsky |date= July 3, 2009 |work= TechCrunch |publisher= The Washington Post |accessdate=October 26, 2011 }}</ref>
| {{age in days|2009|6|19|2009|7|3}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad]]
| {{dts|2010-4-30|format=mdy}}
| [[Spirit (iOS jailbreak)|Spirit]]
| comex
| {{dts|2010-5-3|format=mdy}}<ref name="spirit-register">{{cite web |url= http://www.theregister.co.uk/2010/05/03/ipad_jailbreak/ |title= Hackers release jailbreak for iPad and newer iPhones |author= Dan Goodin |date= May 3, 2010 |publisher= The Register |accessdate=October 26, 2011 }}</ref>
| {{age in days|2010|4|30|2010|5|3}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||[[iOS 4.0]]
| {{dts|2010-6-21|format=mdy}}
| PwnageTool
| iPhone Dev Team
| {{dts|2010-6-23|format=mdy}}<ref>{{cite web |url= http://www.pcworld.com/article/199713/does_jailbreaking_still_make_sense_with_ios_40.html |title= Does Jailbreaking Still Make Sense with iOS 4.0? |author= Mike Keller |date= June 23, 2010 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 26, 2011 }}</ref><ref>{{cite web |url= http://gizmodo.com/5558277/ios-4-jailbroken-within-a-day-of-first-release |title= iOS 4 Jailbroken Within a Day of First Release |author= John Herrman |date= June 8, 2010 |publisher= Gizmodo |accessdate=November 2, 2011 }}</ref>
| {{age in days|2010|6|21|2010|6|23}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 4]]
| {{dts|2010-6-24|format=mdy}}
| [[JailbreakMe]] 2.0
| comex
| {{dts|2010-8-1|format=mdy}}<ref name="jailbreakme-iphone4">{{cite news |url= http://articles.cnn.com/2010-08-02/tech/jailbreak.iphone.4_1_iphone-4-ios-4-1-jailbreak-apple-app-store?_s=PM:TECH |title= First iPhone 4 'jailbreak' posted online |author= John D. Sutter |date= August 2, 2010 |work= CNN Tech |publisher= CNN |accessdate=October 26, 2011 }}</ref>
| {{age in days|2010|6|24|2010|8|1}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[Apple TV]] (2nd generation)
| {{dts|2010-9-1|format=mdy}}
| PwnageTool
| iPhone Dev Team
| {{dts|2010-10-20|format=mdy}}<ref name="engadget-appletv2">{{cite web |url= http://www.engadget.com/2010/10/20/apple-tv-now-jailbreakable-with-pwnagetool-4-1/|title= Apple TV now jailbreakable with PwnageTool 4.1 |author= Donald Melanson |date= October 20, 2010 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=May 22, 2012 }}</ref>
| {{age in days|2010|9|1|2010|10|20}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad 2]]
| {{dts|2011-3-11|format=mdy}}
| JailbreakMe 3.0
| comex
| {{dts|2011-7-5|format=mdy}}<ref name="jailbreakme-ipad2">{{cite web |url= http://news.cnet.com/8301-17938_105-20077154-1/app-enables-ipad-2-jailbreak-from-your-browser/ |title= App enables iPad 2 jailbreak from your browser |author= Eric Mack |date= July 6, 2011 |work=[[CNET]] |publisher= [[CBS Interactive]] |accessdate=October 26, 2011 }}</ref>
| {{age in days|2011|3|11|2011|7|5}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||[[iOS 5.0]]
| {{dts|2011-10-12|format=mdy}}
| redsn0w
| iPhone Dev Team
| {{dts|2011-10-13|format=mdy}}<ref name="ios5-redsn0w">{{cite web |url= http://www.pcworld.com/article/241877/ios_5_jailbreak_is_already_here_geeks_not_surprised.html |title= iOS 5 Jailbreak Is Already Here; Geeks Not Surprised |author= Elizabeth Fish |date= October 13, 2011 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 26, 2011 }}</ref>
| {{age in days|2011|10|12|2011|10|13}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 4S]]
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 4S]]
| {{dts|2011-10-14|format=mdy}}s|1}}||[[Apple TV]] (3rd generation)
| {{dts|2011-10-14|format=mdy}}
| [[Absinthe (software)|Absinthe]]
| pod2g, Chronic Dev Team, iPhone Dev Team
| {{dts|2012-1-20|format=mdy}}<ref name="iphone4s-engadget">{{cite web |url= http://www.engadget.com/2012/01/20/absinthe-a5-jailbreak-released-for-iphone-4s-hacker-dream-team/ |title= Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true |author= Joseph Volpe |date= January 20, 2012 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=January 20, 2012 }}</ref><ref name="iphone4s-readwriteweb">{{cite web |url= http://www.readwriteweb.com/archives/jailbreak_ios_5_iphone_4s_ipad_2.php |title= Now You Can Jailbreak Your iPhone 4S and iPad 2 |author= John Paul Titlow |date= January 20, 2012 |publisher= ReadWriteWeb |accessdate=January 20, 2012 }}</ref>
| {{age in days|2011|10|14|2012|1|20}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[Apple TV]] (3rd generation)
| {{dts|2012-3-7|format=mdy}}
| {{dts|2012-3-7|format=mdy}}
| -
| -
Line 183: Line 307:
| {{dts|2013-2-4|format=mdy}}
| {{dts|2013-2-4|format=mdy}}
| {{age in days|2012|11|2|2013|2|4}}
| {{age in days|2012|11|2|2013|2|4}}
|-

|bgcolor="#FFF9C6"|{{Hs|3}}||[[iOS 7]]
| {{dts|2013-9-18|format=mdy}}
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|9|18|2013|12|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 5C]]
| {{dts|2013-9-20|format=mdy}}
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|9|20|2013|12|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 5S]]
| {{dts|2013-9-20|format=mdy}}
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|9|20|2013|12|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad Air]]
| {{dts|2013-11-1|format=mdy}}
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|11|1|2013|12|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad Mini 2]]
| {{dts|2013-11-12|format=mdy}}
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|11|12|2013|12|22}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||iOS 7.1-7.1.2
| {{dts|2014-5-29|format=mdy}}
| Pangu
| [[Pangu Team]]
| {{dts|2014-6-23|format=mdy}}
| {{age in days|2014|5|29|2014|6|23}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||[[iOS 8]]
| {{dts|2014-9-17|format=mdy}}
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|9|17|2014|10|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 6]]
| {{dts|2014-9-19|format=mdy}}
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|9|19|2014|10|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 6 Plus]]
| {{dts|2014-9-19|format=mdy}}
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|9|19|2014|10|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad Air 2]]
| {{dts|2014-10-22|format=mdy}}
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|10|22|2014|10|22}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad Mini 3]]
| {{dts|2014-10-22|format=mdy}}
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|10|22|2014|10|22}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||iOS 8.1.1-8.4
| {{dts|2014-11-17|format=mdy}}
| TaiG, PP Jailbreak
| TaiG, [[PP Jailbreak]]
| {{dts|2014-11-29|format=mdy}}
| {{age in days|2014|11|17|2014|11|29}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[Apple Watch]]
| {{dts|2015-04-24|format=mdy}}
| -
| -
| -
| -
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPod touch]] (6th generation)
| {{dts|2015-07-15|format=mdy}}
| TaiG, PP Jailbreak
| TaiG, [[PP Jailbreak]]
| {{dts|2015-07-16|format=mdy}}
| {{age in days|2015|07|15|2015|07|16}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||iOS 9
| {{dts|2015-09-16|format=mdy}}
| Pangu9
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|16|2015|10|14}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 6S]]
| {{dts|2015-09-25|format=mdy}}
| Pangu9
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|25|2015|10|14}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone 6S Plus]]
| {{dts|2015-09-25|format=mdy}}
| Pangu9
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|25|2015|10|14}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad Mini 4]]
| {{dts|2015-09-09|format=mdy}}
| Pangu9
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|09|2015|10|14}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPad Pro]]
| {{dts|2015-11-11|format=mdy}}
| Pangu9
| [[Pangu Team]]
| {{dts|2016-03-11|format=mdy}}
| {{age in days|2015-11-11|2016-03-11}}
|-
|bgcolor="#FFF9C6"|{{Hs|3}}||iOS 9.1
| {{dts|2015-10-21|format=mdy}}
| Pangu9
| [[Pangu Team]]
| {{dts|2016-03-11|format=mdy}}
| {{dts|2016-03-11|format=mdy}}
| {{age in days|2015-10-21|2016-03-11}}
| {{age in days|2015-10-21|2016-03-11}}
Line 190: Line 451:
| {{dts|2015-09-09|format=mdy}}
| {{dts|2015-09-09|format=mdy}}
| Pangu9
| Pangu9
| [[Pangu Team]]
leases 2011-present ===
| {{dts|2016-03-23|format=mdy}}
| {{age in days|2015|09|09|2016|03|23}}
|-
|bgcolor="#8CF"|{{Hs|1}}||[[iPhone SE]]
| {{dts|2016-03-31|format=mdy}}
| PPJailbreak
| PPJailbreak, [[Pangu Team]]
| {{dts|2016-07-24|format=mdy}}
| {{age in days|2016|03|31|2016|07|24}}
|}

=== Table of jailbreaking tool releases 2011-present ===
{| class="wikitable sortable"
{| class="wikitable sortable"
|-
|-
Line 224: Line 497:
|
|
|-
|-
| [[redsn0w]] 0.9.15 beta 3<ref name="howto-ios5">{{cite web |url= http://www.pcworld.com/article/242116/how_to_jailbreak_your_ios_5_device.html |title= How to Jailbreak Your iOS 5 Device |author= Sarah Jacobsson Purewal |date= October 18, 2011 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 23, 2011 }}</ref><ref name="devteam-marchmadness">{{cite web |url=http://blog.iphone-dev.org/post/18906290309/march-mayhem |title=March Mayhem |author= iPhone Dev Team |date=March 7, 2012 |publisher=Dev Team Blog |accessdate=April 22, 2012}}</ref>
| [[redsn0
| {{dts|2012-11-1|format=mdy}}
| [[iPad 1|1]]<ref name="devteam-redsn0wbeta">{{cite web|url=http://blog.iphone-dev.org/post/14857834236/untethered-holidays |title=Untethered holidays |author=iPhone Dev Team |date=December 27, 2011 |publisher=Dev Team Blog |accessdate=December 29, 2011}}</ref><ref name="howto-ios5" /><ref name="engadget-redsn0wbeta">{{cite web|url=http://www.engadget.com/2012/04/21/redsn0w-mac-windows-corona-a5-jailbreak/ |title=RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools |author=Edgar Alvarez |date=April 21, 2012 |publisher=Engadget |accessdate=April 22, 2012}}</ref>
| {{flatlist|
* [[iPhone 3GS|3GS]]
* [[iPhone 4|4]]<ref name="devteam-redsn0wbeta" /><ref name="howto-ios5" /><ref name="engadget-redsn0wbeta" />}}
| [[iPod Touch|1]]
| 4.1 – 6.1.6
| {{Depends|}} {{Hidden begin|title=Depends}}
'''Untethered''': {{Flatlist|
'''Untethered''': {{Flatlist|
* 4.1 – 4.3.3
* 4.1 – 4.3.3
Line 258: Line 539:
|-
|-


| [[evasi0n]]
|
| {{dts|2013-2-4|format=mdy}}
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 3|3]]
* [[iPad 4|4]]
* [[iPad Mini 1|Mini 1]]}}
| {{flatlist|
* [[iPhone 3GS|3GS]]
* [[iPhone 4|4]]
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]}}
| {{flatlist|
* [[iPod Touch (4th generation)|4]]
* [[iPod Touch (5th generation)|5]]}}
| 6.0 – 6.1.2<ref name=evashome>{{cite web|title= evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs|url=http://evasi0n.com/}}</ref>
| {{yes}}
| pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
|-

| [[evasi0n]]7
| {{dts|2013-12-22|format=mdy}}
| {{flatlist|
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 2|2]]
Line 264: Line 566:
* [[iPad 4|4]]
* [[iPad 4|4]]
* [[iPad Air|Air]]
* [[iPad Air|Air]]
* [[iPad Mini 1|Mini 1]]
* [[i
* [[iPad Mini 2|Mini 2]]}}
| {{flatlist|
* [[iPhone 4|4]]
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]
* [[iPhone 5S|5S]]
* [[iPhone 5C|5C]]}}
| [[iPod Touch (5th generation)|5]]
| 7.0 – 7.0.6<ref name="evashome" />
| {{yes}}
| pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
|-

| p0sixspwn
| {{dts|2013-12-30|format=mdy}}
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 3|3]]
* [[iPad 4|4]]
* [[iPad Mini 1|Mini 1]]}}
| {{flatlist|
* [[iPhone 3GS|3GS]]
* [[iPhone 4|4]]
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]}}
| {{flatlist|
* [[iPod Touch (4th generation)|4]]
* [[iPod Touch (5th generation)|5]]}}
| 6.1.3 – 6.1.6
| {{yes}}
| winocm, iH8sn0w, and SquiffyPwn
|-

| [[Pangu Team|Pangu]]
| {{dts|2014-6-23|format=mdy}}<ref name=iclarified-pangu-release>{{cite web|title=Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released|url=http://www.iclarified.com/41824/pangu-untethered-jailbreak-of-ios-711-has-been-released}}</ref>
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 3|3]]
* [[iPad 4|4]]
* [[iPad Air|Air]]
* [[iPad Mini 1|Mini 1]]
* [[iPad Mini 2|Mini 2]]<ref name="iclarified-pangu-release" />}}
| {{flatlist|
* [[iPhone 4|4]]
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]
* [[iPhone 5C|5C]]
* [[iPhone 5S|5S]]<ref name="iclarified-pangu-release" />}}
| [[iPod Touch (5th generation)|5]]<ref name="iclarified-pangu-release" />
| 7.1 – 7.1.2
| {{yes}}
| dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)
|-

| [[Pangu Team|Pangu8]]
| {{dts|2014-10-22|format=mdy}}
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 3|3]]
* [[iPad 4|4]]
* [[iPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 1|Mini 1]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]}}
| {{flatlist|
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]
* [[iPhone 5C|5C]]
* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]}}
| [[iPod Touch (5th generation)|5]]
| 8.0 – 8.1
| {{yes}}
| windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)
|-

| [http://www.taig.com/en/ TaiG]
| {{dts|2014-11-29|format=mdy}}
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 3|3]]
* [[iPad 4|4]]
* [[iPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 1|Mini 1]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]}}
| {{flatlist|
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]
* [[iPhone 5C|5C]]
* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]}}
| {{flatlist|
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (6th generation)|6]]}}
| 8.0 – 8.4
| {{yes}}
| TaiG
|-

| [http://pro.25pp.com/ppghost_mac PPJailbreak]
| {{dts|2015-01-18|format=mdy}}
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 3|3]]
* [[iPad 4|4]]
* [[iPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 1|Mini 1]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]}}
| {{flatlist|
* [[iPhone 4S|4S]]
* [[iPhone 4S|4S]]
* [[iPhone 5|5]]
* [[iPhone 5|5]]

Revision as of 20:24, 20 August 2016

iOS jailbreaking is the removing of software restrictions imposed by iOS, Apple's operating system, on devices running it through the use of software exploits; devices include the iPhone, iPod touch, iPad, and the AppleTV 2 and 4. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store.

iOS jailbreaking started as soon as the original iPhone became available in July 2007 and has continued into the present day. Apple has responded with updates to iOS patching exploits and with new hardware. Jailbreaking communities have not been legally threatened. The legal status of jailbreaking is unclear in most countries; while many prohibit tampering with digital locks they tolerate jailbreaks that do not infringe on copyrights. In 2010, 2012, and 2015, the U.S. Copyright Office approved exemptions allowing smartphone users to jailbreak their devices.

Definition

iOS jailbreaking is the process of removing software restrictions imposed by iOS, Apple Inc's operating system, on its devices including the iPhone, iPod touch, iPad, and second-generation Apple TV. Jailbreaking is done by using software exploits, and it permits root access to the iOS file system and manager, so applications, extensions, and themes unavailable through the official Apple App Store can be downloaded.[1]

Jailbreaking in general means breaking the device out of its "jail",[2] a metaphor used in Unix-style systems, for example in "FreeBSD jail". A jailbroken iPhone, iPod touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls.[1]

Jailbreaking is a form of privilege escalation,[3][4] and describes privilege escalation on devices by other manufacturers as well.[5][6]

Motivations

One of the reasons for jailbreaking is to expand the feature set limited by Apple and its App Store.[7] Apple checks apps for compliance with its iOS Developer Program License Agreement before accepting them for distribution in the App Store. However, their reasons for banning apps are not limited to safety and security and may be regarded as arbitrary and capricious.[8] In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that “contain content that ridicules public figures."[9] To access banned apps,[10] users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,[11] such as user interface customization, tweaks, and religious apps.[12]

Device customization

Since software programs available through Cydia are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps.[13] Users install these programs for purposes including personalization and customization of the interface by tweaks developed by developers and designers,[13] adding desired features and fixing annoyances,[14] and making development work on the device easier by providing access to the filesystem and command-line tools.[15][16]

Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character input systems because they are easier to use than Apple's.[17]

Use of handset on multiple carriers

Jailbreaking also opens the possibility for using software to unofficially unlock carrier-locked iPhones so they can be used with other carriers.[18] Software-based unlocks have been available since September 2007,[19] with each tool applying to a specific iPhone model and baseband version (or multiple models and versions).[20] This includes the iphone 4S, iPhone 4, iPhone 3GS, and iPhone 3G models.

An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to Install Cydia and iPad baseband as well.

Installation of malware

Computer criminals may jailbreak an iPhone to install malware, or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company Hacking Team, which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.[21][22]

Software piracy

On iPhones the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking therefore allows the installation of pirated applications.[23] It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.[24]

Types of jailbreaks

When a device is booting, it loads Apple's own kernel initially. The device must then be exploited and have the kernel patched each time it is turned on.

An "untethered" jailbreak has the property that if the user turns the device off and back on, the device will start up completely, and the kernel will be patched without the help of a computer – thus enabling the user to boot without the need to use a computer.[25] These jailbreaks are harder to make and take a lot of reverse engineering and years of experience.

With a "tethered" jailbreak, a computer is needed to turn the device on each time it is rebooted. If the device starts back up on its own, it will no longer have a patched kernel, and it may get stuck in a partially started state. By using a computer, the phone is essentially "re-jailbroken" (using the "boot tethered" feature of a jailbreaking tool) each time it is turned on.[26] With a tethered jailbreak, you can still restart SpringBoard ("respring") on the device without needing to reboot.

There is also "semi-tethered" solution, which means that when the device boots, it will no longer have a patched kernel (so it will not be able to run modified code), but it will still be usable for normal functions such as making phone calls, or texting.[27] To use any features that require running modified code, the user must start the device with the help of the jailbreaking tool in order for it to start with a patched kernel (jailbroken).

In July 2016 PPJailbreak introduced the "semi-untethered" jailbreak, which functions like a semi-tethered solution in that when the device boots, it no longer has a patched kernel (and thus access to jailbroken functions,) but also like an untethered device, in that a computer is not required to re-patch the kernel in order to re-enable the jailbreak (the jailbreak installs a sideloaded app which is used to re-patch the kernel after rebooting.)

Comparison to Android rooting

Jailbreaking of iOS devices has sometimes been compared to "rooting" of Android devices. Although both concepts involve privilege escalation, they differ in scope. Some Android devices allow users to modify or replace the operating system after unlocking the bootloader.[28][29][30] Moreover, nearly all Android phones have an option to allow the user to install unknown, 3rd-party apps, so no exploit is needed for normal "sideloading".[31]

iOS is engineered with security measures including a "locked bootloader" to prevent users from modifying the operating system, and to prevent apps from gaining root privileges; jailbreaking an iOS device to defeat all security measures presents a significant technical challenge. It violates Apple's end-user license agreement for iOS.[32] Until 2015 sideloading apps in general was difficult for most individual users, requiring them to purchase developer membership, while corporations could install private applications onto corporate phones.[33] After 2015, this became free for all users, however doing so requires a basic understanding of Xcode and compiling iOS Apps. Apps installed this way have the restrictions of all other apps.

Security, privacy, and stability

The first iPhone worm, iKee, appeared in early November 2009, created by a 21-year-old Australian student in the town of Wollongong. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an SSH service, which those users can leave in the default insecure state.[34] In the same month, F-Secure reported on a new malicious worm compromising bank transactions from jailbroken phones in the Netherlands, similarly affecting devices where the owner had installed SSH without changing the default password.[35][36] In 2010 blogger John Gruber, who is close to Apple, said that users misunderstood some jailbreak exploits and that they were more serious than they appear. He commented that "it's odd how the press is mostly covering this as 'jailbreaking now more convenient' rather than 'remote code exploit now in the wild'", pointing out that the exploit allowed the creator of a malicious website to take control of iPhones accessing it.[37]

Restoring a device with iTunes can remove a jailbreak.[38][39][40]

In 2012, Forbes staff analyzed a UCSB study on 1407 free programs available from Apple and a third party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple’s App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones.[41] Also, there is a program called PrivaCy that allows user to control the upload of usage statistics to remote servers.[41]

Installing software published outside the App Store has the potential to affect battery life and system stability if the software is poorly optimized or frequently uses resource-draining services (such as 3G or Wi-Fi).[42][43][44] However, even apps from the App Store are known to cause battery issues whilst running in the background.[45]

In August 2015 the KeyRaider malware was discovered that affects only jailbroken iPhones.[46]

History of exploit-disabling patch releases

Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original evasi0n iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Bootrom exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates, but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.[47]

On July 15, 2011, Apple released a new iOS version that closed the exploit used in JailbreakMe 3.0. The German Federal Office for Information Security had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or unwillingly downloaded malware by iOS users clicking on maliciously crafted PDF files.[48] Before Apple released a fix for this security hole, jailbreak users had access to a fix published by the developer of JailbreakMe.[citation needed]

In Q3 2014 Apple released iOS 8.1.3 that patched up the exploits used in jailbreak for iOS 8.0-8.1.2. It was not possible to jailbreak until the iOS 8.3 update. The iOS 9.1 update on October 21, 2015, included a patch for the Pangu iOS 9.0-9.0.2 Jailbreak.[49]

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.[50]

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.[51]

On October 21, 2015, seven days after the Pangu iOS 9.0-9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.[49]

On August 4, 2016, Apple released iOS version 9.3.4 to patch the semi-untethered jailbreak for 64-bit devices.

The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting digital rights management (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.

International treaties have influenced the development of laws affecting jailbreaking. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software,[52] but member states vary on the implementation of the directive.

While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one.[53][54] Apple has also regularly (though possibly somewhat jokingly) thanked jailbreak communities for detecting security holes in iOS release notes.[55]

Australia

In 2010, Electronic Frontiers Australia said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply.[56] These laws had been strengthened by the Copyright Amendment Act 2006.

Canada

In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.[57] Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[58] but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.[59]

India

India's copyright law permits circumventing DRM for non-copyright-infringing purposes.[60][61] Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.[62] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.[60][61]

New Zealand

New Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.[63][64] This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.

Singapore

Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.[65]

United Kingdom

The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court.[52][66] Competition laws may also be relevant.[67]

United States

The main law that affects the legality of iOS jailbreaking in the United States is the 2012 Digital Millennium Copyright Act (DMCA), which says "no person shall circumvent a technological measure that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking.[68] Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally,[69] and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets.[70] It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning.[71] It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.[71]

In 2010 Apple announced that jailbreaking "can violate the warranty".[72] This may be affected by the Magnuson-Moss Warranty Act of 1975.

In 2007 Tim Wu, a professor at Columbia Law School, argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."[73] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[74] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[73]

In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.[75][76] Apple had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010 that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[77][78][79] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[78]

History of tools

Several people (including saurik, p0sixninja, and geohot) who have contributed to building jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at DEF CON.

A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it,[80] and soon a jailbreak-only game app became available.[81] In October 2007, JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod touch,[82][83] and it included Installer.app as a way to get software for the jailbroken device. In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.[84]

The iPhone Dev Team which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod touch,[85][86] newly including Cydia as the primary third-party installer for jailbroken software.[87] PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.[88][89]

In November 2008 the iPhone Dev Team released QuickPWN to jailbreak iPhone OS 2.2 on iPhone and iPod touch, with options to enable past functionality that Apple had disabled on certain devices.[90]

After Apple released iOS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac.[91] It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.[92]

George Hotz developed the first iPhone unlock. In 2009, he released a jailbreaking tool for the iPhone 3GS on iPhone OS 3.0 called purplera1n,[93] and blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod touch and other devices.[94]

In October 2010, he released limera1n, a low-level boot ROM exploit that permanently works to jailbreak the iPhone 4 and is used as part of tools including redsn0w.[95]

Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010.[citation needed] Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iOS 3.2[96] In August 2010, comex released JailbreakMe 2.0, the first a web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1).[97][98] In July 2011, he released JailbreakMe 3.0,[99] a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3).[100]

In 2011, JailbreakMe 3.0 used a flaw in PDF file rendering in mobile Safari.[101][102]

Chronic Dev Team initially released greenpois0n in October 2010, a desktop-based tool for jailbreaking iOS 4.1[103] and later iOS 4.2.1[104] on most devices including the Apple TV,[105] as well as iOS 4.2.6 on CDMA (Verizon) iPhones.[106]

As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod touch (3rd and 4th generation).[89] As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod touch models that support iOS 5.1.1.[107]

The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S.[25][26][108][109] In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod touch models that support iOS 5.1.1, including jailbreaking the third-generation iPad for the first time.[110] The hackers together called the evad3rs released an iOS 6.X jailbreak tool called "evasi0n" available for Linux, OS X, and Windows on Monday, February 4, 2013 at noon Eastern Standard Time.[citation needed] Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors.[citation needed] When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.[111] In April 2013, the latest versions of Sn0wbreeze was released, which added the support for tethered jailbreaking on A4 devices (i.e. devices not newer than the iPhone 4, iPad (1st generation), or iPod touch (4th generation)).[112][113][114]

On December 22, 2013, the evad3rs released a new version of evasi0n that supports jailbreaking iOS 7.0.x, known as evasi0n7.[citation needed] On December 30, 2013, winocm, ih8sn0w and SquiffyPwn released p0sixspwn for untethering devices on iOS 6.1.3 – 6.1.5. Initially, it was necessary to jailbreak tethered using redsn0w and install p0sixpwn at Cydia. A few days later, on January 4, 2014, the same team released a version of p0sixpwn for jailbreaking using a computer.[citation needed]

iOS 7.1 patched the exploits used by evasi0n7, and on June 23, 2014, Pangu, a Chinese untethered jailbreak was released for iOS 7.1.[citation needed]

On October 22, 2014, Pangu Team released Pangu8 to jailbreak all devices running iOS 8-8.1. The first versions did not bundle Cydia, nor was there an iOS 8 compatible version of Cydia at the time.[citation needed]

On November 29, 2014, TaiG team released their jailbreak tool called "TaiG" for devices running iOS 8.0-8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2.[115] On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0-8.4.[116]

On 10 September 2015, 6 days before iOS 9 was released, iH8sn0w had demonstrated a working exploit on his Twitter page, linking to a YouTube video.[117]

On October 14, 2015, Pangu Team released Pangu 9, their jailbreak tool for iOS 9.[118][119][120]

Table of jailbreaks by device and iOS version, 2007-present

  Device   IOS   Both

Device/OS Release date Tool Developer(s) Jailbreak date Jailbroken
after
(days)
iPhone / iPhone OS 1.0 June 29, 2007 (no name) iPhone Dev Team[121] July 10, 2007[80] 11
iPod touch September 5, 2007 (no name) niacin and dre October 10, 2007[122][123] 35
iPhone 3G / iPhone OS 2.0 July 11, 2008 PwnageTool iPhone Dev Team July 20, 2008[86] 9
iPod touch (2nd generation) September 9, 2008 redsn0w iPhone Dev Team and Chronic Dev Team January 30, 2009[124][125] 143
iPhone OS 3.0 June 17, 2009 PwnageTool iPhone Dev Team June 19, 2009[126] 2
iPhone 3GS June 19, 2009 purplera1n George Hotz July 3, 2009[127] 14
iPad April 30, 2010 Spirit comex May 3, 2010[96] 3
iOS 4.0 June 21, 2010 PwnageTool iPhone Dev Team June 23, 2010[128][129] 2
iPhone 4 June 24, 2010 JailbreakMe 2.0 comex August 1, 2010[97] 38
Apple TV (2nd generation) September 1, 2010 PwnageTool iPhone Dev Team October 20, 2010[130] 49
iPad 2 March 11, 2011 JailbreakMe 3.0 comex July 5, 2011[100] 116
iOS 5.0 October 12, 2011 redsn0w iPhone Dev Team October 13, 2011[92] 1
iPhone 4S October 14, 2011 Absinthe pod2g, Chronic Dev Team, iPhone Dev Team January 20, 2012[25][26] 98
Apple TV (3rd generation) March 7, 2012 - - - -
iPad (3rd generation) March 16, 2012 Absinthe 2.0 pod2g, Chronic Dev Team, iPhone Dev Team May 25, 2012 70
iOS 6.0 September 19, 2012 redsn0w iPhone Dev Team September 19, 2012 0
iPhone 5 September 21, 2012 evasi0n evad3rs February 4, 2013 136
iPod touch (5th generation) October 23, 2012 evasi0n evad3rs February 4, 2013 104
iPad (4th generation) November 2, 2012 evasi0n evad3rs February 4, 2013 94
iPad Mini November 2, 2012 evasi0n evad3rs February 4, 2013 94
iOS 7 September 18, 2013 evasi0n7 evad3rs December 22, 2013 95
iPhone 5C September 20, 2013 evasi0n7 evad3rs December 22, 2013 93
iPhone 5S September 20, 2013 evasi0n7 evad3rs December 22, 2013 93
iPad Air November 1, 2013 evasi0n7 evad3rs December 22, 2013 51
iPad Mini 2 November 12, 2013 evasi0n7 evad3rs December 22, 2013 40
iOS 7.1-7.1.2 May 29, 2014 Pangu Pangu Team June 23, 2014 25
iOS 8 September 17, 2014 Pangu8 Pangu Team October 22, 2014 35
iPhone 6 September 19, 2014 Pangu8 Pangu Team October 22, 2014 33
iPhone 6 Plus September 19, 2014 Pangu8 Pangu Team October 22, 2014 33
iPad Air 2 October 22, 2014 Pangu8 Pangu Team October 22, 2014 0
iPad Mini 3 October 22, 2014 Pangu8 Pangu Team October 22, 2014 0
iOS 8.1.1-8.4 November 17, 2014 TaiG, PP Jailbreak TaiG, PP Jailbreak November 29, 2014 12
Apple Watch April 24, 2015 - - - -
iPod touch (6th generation) July 15, 2015 TaiG, PP Jailbreak TaiG, PP Jailbreak July 16, 2015 1
iOS 9 September 16, 2015 Pangu9 Pangu Team October 14, 2015 28
iPhone 6S September 25, 2015 Pangu9 Pangu Team October 14, 2015 19
iPhone 6S Plus September 25, 2015 Pangu9 Pangu Team October 14, 2015 19
iPad Mini 4 September 9, 2015 Pangu9 Pangu Team October 14, 2015 35
iPad Pro November 11, 2015 Pangu9 Pangu Team March 11, 2016 121
iOS 9.1 October 21, 2015 Pangu9 Pangu Team March 11, 2016 142
Apple TV (4th generation) September 9, 2015 Pangu9 Pangu Team March 23, 2016 196
iPhone SE March 31, 2016 PPJailbreak PPJailbreak, Pangu Team July 24, 2016 115

Table of jailbreaking tool releases 2011-present

Name Release date Hardware Firmware Untethered? Developer(s)
iPad iPhone iPod
Touch
JailbreakMe 3.0[131] July 5, 2011[131]
[131]
1[131] 4.2.6 – 4.2.8
4.3 – 4.3.3[131][a]
Yes[131] comex[131]
Seas0npass[132] October 18, 2011[132] 2nd generation Apple TV[132] 4.3 – 5.3
6.1.2 (tethered)[132]
4.3 – 5.3[132]
redsn0w 0.9.15 beta 3[133][134] November 1, 2012 1[89][133][135] 1 4.1 – 6.1.6
Depends
Untethered:
Tethered:
  • 4.2.9 – 4.2.10
  • 4.3.4 – 4.3.5
  • 5.0
  • 5.1
  • 6.0 – 6.1.6 (not available for devices newer than the iPhone 4, iPad 1, or iPad Touch 4)[137]
iPhone Dev Team[89]
Absinthe 2.0.4[108] May 30, 2012 1[109] 5.1.1[109] Yes[25] pod2g, Chronic Dev Team, iPhone Dev Team[108]
evasi0n February 4, 2013
6.0 – 6.1.2[138] Yes pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
evasi0n7 December 22, 2013
5 7.0 – 7.0.6[138] Yes pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
p0sixspwn December 30, 2013
6.1.3 – 6.1.6 Yes winocm, iH8sn0w, and SquiffyPwn
Pangu June 23, 2014[139] 5[139] 7.1 – 7.1.2 Yes dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)
Pangu8 October 22, 2014 5 8.0 – 8.1 Yes windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)
TaiG November 29, 2014
8.0 – 8.4 Yes TaiG
PPJailbreak January 18, 2015
8.0 – 8.4 Yes PanguTeam and PPJailbreak
Pangu9 October 14, 2015
9.0 – 9.1 Yes PanguTeam
PPJailbreak July 24, 2016
9.2 – 9.3.3 No PanguTeam and PPJailbreak

See also

Notes

  1. ^ The Verizon CDMA iPhone 4 ran on iOS 4.2.5 to 4.2.10, with incremental updates being bugfixes that were simultaneously applied from 4.3.1 to 4.3.5.

References

  1. ^ a b "Jailbreak iPhone, iPad, iPod touch, and Apple TV". Retrieved March 31, 2015.
  2. ^ Mike Keller (February 13, 2012). "Geek 101: What Is Jailbreaking?". PCWorld. IDG. Retrieved February 15, 2012.
  3. ^ iOS Hacker's Handbook. Miller, Charlie; Blazakis, Dion; DaiZovi, Dino; Esser, Stefan; Iozzo, Vincenzo; Weinmann, Ralf-Philip. John Wiley & Sons. 2012. pp. 309–310. ISBN 978-1-118-22843-2. Retrieved January 18, 2013.{{cite book}}: CS1 maint: others (link)
  4. ^ Höbarth, S.; Mayrhofer, R. "A framework for on-device privilege escalation exploit execution on Android" (PDF). Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2011. mayrhofer.eu.org. Retrieved January 18, 2013.
  5. ^ Robert McMillan (November 5, 2008). "A Jailbreak for Google's Android". PCWorld. IDG. Retrieved January 18, 2013.
  6. ^ David Kravets (April 11, 2011). "Sony Settles PlayStation Hacking Lawsuit". Threat Level. Wired. Retrieved January 18, 2013.
  7. ^ Chris Foresman (December 13, 2010). "iPhone jailbreaker set to bring Cydia to Mac OS X". Ars Technica. Condé Nast. Retrieved August 2, 2011.
  8. ^ Steve Kovach (13 April 2013). "Frustration Builds With Apple's Inconsistent Rules For App Developers". Business Insider.
  9. ^ Ryan Singel (April 15, 2010). "Apple App Store Bans Pulitzer-Winning Satirist for Satire". Wired. Retrieved February 12, 2011.
  10. ^ "Rejected Apps". imore.com.
  11. ^ "Jailbreak! New Rules Allow Unapproved iPhone Apps". Fox News.
  12. ^ "Banned Religious Apps You Won't Find On Apple iTunes". The Huffington Post. 10 January 2014.
  13. ^ a b Adam Dachis (March 14, 2011). "How to Get the Most Out of Your Jailbroken iOS Device". Lifehacker. Gawker Media. Retrieved August 2, 2011.
  14. ^ Jenna Wortham (May 12, 2009). "Unofficial Software Incurs Apple's Wrath". The New York Times. Retrieved August 2, 2011.
  15. ^ Zdziarski, Jonathan (2008). iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain. pp. 3–4. ISBN 9780596554187. {{cite book}}: Cite has empty unknown parameter: |coauthors= (help)
  16. ^ Landau, Ted (2009). Take control of your iPhone. p. 107. ISBN 9781933671543. {{cite book}}: Cite has empty unknown parameter: |coauthors= (help)
  17. ^ Nathan T. Washburn (May 4, 2012). "Apple Discovers a New Market in China: Rich Boyfriends". HBR Blog Network. Harvard Business Review. Retrieved January 9, 2013.
  18. ^ Brian X. Chen (August 7, 2009). "6 Reasons to Jailbreak Your iPhone". Gadget Lab. Wired. Retrieved May 1, 2012.
  19. ^ Ryan Block (September 11, 2007). "iUnlock released: the first free, open source iPhone SIM unlock software". Engadget. Aol. Retrieved February 1, 2014.
  20. ^ Ian Paul (December 22, 2008). "3G iPhone Unlock Expected". PCWorld. IDG. Retrieved May 1, 2012.
  21. ^ Fleishman, Glen. "Hacking Team hack reveals why you shouldn't jailbreak your iPhone". MacWorld. Retrieved 2 August 2015.
  22. ^ Heath, Alex. "New Jailbreak App Stalks All Of Your iPhone's Activity And Makes It Available Online". Cult of Mac. Retrieved 2 August 2015.
  23. ^ Hattersley, Lou. "Now pirated iOS apps can be installed without jailbreak". Macworld. Retrieved 2 August 2015.
  24. ^ Kazmucha, Allyson. "Jailbreak, app piracy, and the true cost of theft". iMore. Retrieved 2 August 2015.
  25. ^ a b c d Joseph Volpe (January 20, 2012). "Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true". Engadget. Aol. Retrieved January 20, 2012.
  26. ^ a b c John Paul Titlow (January 20, 2012). "Now You Can Jailbreak Your iPhone 4S and iPad 2". ReadWriteWeb. Retrieved January 20, 2012.
  27. ^ Fish, Elizabeth (October 24, 2011). "Semi-tethered iOS 5 Jailbreak Developed, Useful On The Move". PCWorld. IDG. Retrieved April 22, 2012.
  28. ^ "HTC Bootloader Unlock Instructions". htcdev.com. Retrieved 26 October 2014.
  29. ^ "Official Bootloader Unlock instructions". sonymobile.com.
  30. ^ "#unlocking-the-bootloader Google instructions on bootloader unlocking". source.android.com. Retrieved 26 October 2014.
  31. ^ Hildenbrand, Jerry (2 Feb 2012). "Android A to Z: What is sideloading?". Android Central. Retrieved 9 July 2014.
  32. ^ "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Retrieved 9 July 2014. [U]nauthorized modification of iOS is a violation of the iOS end-user software license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software.
  33. ^ sideloading Apps Xcode 7
  34. ^ Brigid Andersen (November 9, 2009). "Australian admits creating first iPhone virus". ABC Online. Retrieved October 26, 2011.
  35. ^ "New iPhone worm can act like botnet say experts". BBC News. November 23, 2009. Retrieved April 10, 2010.
  36. ^ Mikko (November 22, 2009). "Malicious iPhone Worm". News from the Lab. F-secure. Retrieved April 10, 2010.
  37. ^ Gruber, John. "PDF security exploit". Daring Fireball. Retrieved 15 August 2015.
  38. ^ Adrian Kingsley-Hughes (May 28, 2011). "'Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered". Tech. Forbes. Retrieved November 14, 2012.
  39. ^ Sharon Vaknin (June 27, 2012). "How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal". CNET. CBS Interactive. Retrieved November 14, 2012.
  40. ^ Christopher Breen (December 29, 2008). "The Best IPhone Apps Not in the App Store". PCWorld. IDG. Retrieved November 14, 2012.
  41. ^ a b Greenberg, Andy (February 14, 2012). "Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones". Tech. Forbes. Retrieved February 15, 2012.
  42. ^ Ellis Hamburger (May 3, 2011). "The Truth About Jailbreaking Your iPhone: The 5 Biggest Drawbacks". Business Insider. Retrieved October 26, 2011.
  43. ^ Adam Dachis (May 5, 2011). "Four Reasons Not to Jailbreak Your iPhone, iPod touch, or iPad". Lifehacker. Gawker Media. Retrieved October 26, 2011.
  44. ^ Brennon Slattery (August 3, 2010). "5 Reasons to Jailbreak Your iPhone – and 5 Reasons Not". PCWorld. IDG. Retrieved October 26, 2011.
  45. ^ "The Background Data and Battery Usage of Facebook's iOS App". MacStories. Retrieved January 6, 2016.
  46. ^ Joseph Steinberg (August 31, 2015). "Massive iPhone User Data Breach: What You Need to Know". Inc. Retrieved September 2, 2015.
  47. ^ "Apple adds jailbreak resistance to recent iPhone 3GS models". Retrieved 2015-06-20.
  48. ^ Robertson, Jordan (July 8, 2011). "Security holes discovered in iPhones, iPads". News & Record. Associated Press. Retrieved July 9, 2011.
  49. ^ a b Perez, Sarah. "Apple's iOS 9.1 Shuts Down The Pangu Hacking Team's Jailbreak". TechCrunch. Retrieved 2015-11-11.
  50. ^ "Taig and Pangu working on Jailbreak for IOS 8.4.1". Retrieved 8 September 2015.
  51. ^ "iOS 9's Rootless security system dubbed as a 'heavy blow' to jailbreak community". Retrieved 10 October 2015.
  52. ^ a b Duncan Geere (July 28, 2010). "Investigation: Is it legal to jailbreak a UK iPhone?". Wired UK. Retrieved October 26, 2012.
  53. ^ Greenberg, Andy. "iPhone Uber-Hacker Comex Is Out At Apple". Forbes. Retrieved 15 August 2015.
  54. ^ Heath, Alex. "After Doing "Insane Things With iOS," Jailbreak Hacker Winocm Joins Apple". Cult of Mac. Retrieved 22 November 2015.
  55. ^ "8.4.1 release notes". Apple. Retrieved 15 August 2015.
  56. ^ Rosalyn Page (August 5, 2010). "Could jailbreaking your iPhone land you in jail?". PC & Tech Authority. Retrieved January 21, 2013.
  57. ^ Michael Geist (November 7, 2012). "Canadian Copyright Reform In Force: Expanded User Rights Now the Law". michaelgeist.ca. Retrieved November 13, 2012.
  58. ^ "Canada's C-11 Bill and the Hazards of Digital Locks Provisions". Electronic Frontier Foundation. February 10, 2012. Retrieved October 17, 2012.
  59. ^ The Canadian Press (October 13, 2011). "Phone 'jailbreaking' allows users to hack their phone". CTV News. Retrieved October 17, 2012.
  60. ^ Pranesh Prakash (May 23, 2012). "Analysis of the Copyright (Amendment) Bill 2012". Centre for Internet and Society. Retrieved November 10, 2012.
  61. ^ Michael Geist (April 10, 2008). "New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility". Michael Geist. Retrieved October 26, 2012.
  62. ^ Stephen Bell (September 30, 2011). "Law changes required before NZ ratifies ACTA". ComputerWorld New Zealand. Retrieved October 26, 2012.
  63. ^ Kenny Chee (August 12, 2010). "iPhone jailbreak may be legal here, but... But there will be certain legal provisions". DigitalOne. AsiaOne. Retrieved November 10, 2012.
  64. ^ Jim Martin (March 14, 2012). "How to jailbreak your iPhone: Unleash the full potential of your iPhone". PC Advisor. Retrieved January 21, 2013.
  65. ^ Warwick Ashford (July 30, 2010). "iPhone jailbreaking is 'okay under EU law'". Computer Weekly. Electronics Weekly. Retrieved January 21, 2013.
  66. ^ Copyright Office, Library of Congress (October 2012). "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies" (PDF). Federal Register. Retrieved February 3, 2014.
  67. ^ David Goldman (July 26, 2010). "Jailbreaking iPhone apps is now legal". CNN Money. Retrieved September 11, 2010.
  68. ^ "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". Federal Register. The United States Government. October 28, 2015. Retrieved November 20, 2015.
  69. ^ a b "Transcript of "Jailbreak?" (July 30, 2010)". On The Media. July 30, 2010. Retrieved September 11, 2010.
  70. ^ Leander Kahney (July 26, 2010). "Apple's Official Response To DMCA Jailbreak Exemption: It Voids Your Warranty". Cult Of Mac. Retrieved October 26, 2011.
  71. ^ a b Tim Wu (October 4, 2007). "The iPhone Freedom Fighters". Technology. Slate. Retrieved October 26, 2011.
  72. ^ "Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for" (PDF). Retrieved September 11, 2010.
  73. ^ "Copyright office provides exemption to DMCA". United States Copyright Office. February 12, 2009. Retrieved July 17, 2009.
  74. ^ Declan McCullagh (July 26, 2010). "Feds say mobile-phone jailbreaking is OK". CNET. CBS Interactive. Retrieved October 26, 2011.
  75. ^ a b Timothy B. Lee (October 25, 2012). "Jailbreaking now legal under DMCA for smartphones, but not tablets". Ars Technica. Condé Nast. Retrieved October 26, 2012.
  76. ^ "New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past". Android Police. Retrieved October 31, 2012.
  77. ^ a b Ricker, Thomas (July 10, 2007). "iPhone Hackers: "we have owned the filesystem"". Engadget. Retrieved July 17, 2009.
  78. ^ Topolsky, Joshua (August 6, 2007). "First third-party "game" app appears for iPhone". Engadget. Retrieved July 17, 2009.
  79. ^ Wilson, Ben (October 10, 2007). "Official iPhone 1.1.1 jailbreak released with easy-to-follow instructions; does not require TIFF exploit". CNET. CBS Interactive. Retrieved November 10, 2009.
  80. ^ Gregg Keizer (October 29, 2007). "Hacker Software Can Install Unauthorized Software on iPhones". PCWorld. IDG. Retrieved August 25, 2011.
  81. ^ Block, Ryan (February 12, 2008). "ZiPhone: jailbreak any version iPhone out of the box, including 1.1.3 (by Zibri)". Engadget. Retrieved November 13, 2013. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  82. ^ Charlie Sorrel (July 21, 2008). "Pwnage 2.0 Released: Gadget Lab Jailbreaks iPod Touch". Gadget Lab. Wired. Retrieved November 2, 2011.
  83. ^ a b Philip Elmer-DeWitt (July 20, 2008). "Dubious achievement: Hackers 'jailbreak' the iPhone 3G". CNN Money. Retrieved October 26, 2011.
  84. ^ Erica Sadun (July 20, 2008). "First Look: Pwnage for 2.0". TUAW. Retrieved November 1, 2011.
  85. ^ Dev Team (May 2011). "Tic tac toe..." Dev Team Blog. Retrieved November 2, 2011.
  86. ^ a b c d e iPhone Dev Team (December 27, 2011). "Untethered holidays". Dev Team Blog. Retrieved December 29, 2011.
  87. ^ Charlie Sorrel (November 25, 2008). "QuickPWN Adds Street View to iPod Touch". Gadget Lab. Wired. Retrieved November 2, 2011.
  88. ^ Sarah Perez (June 23, 2009). "How to Jailbreak your iPhone". ReadWriteWeb. Retrieved November 2, 2015.
  89. ^ a b Elizabeth Fish (October 13, 2011). "iOS 5 Jailbreak Is Already Here; Geeks Not Surprised". PCWorld. IDG. Retrieved October 26, 2011.
  90. ^ Leslie Katz (July 3, 2009). "iPhone 3GS jailbreak, 'purplera1n,' hits Web". CNET. CBS Interactive. Retrieved November 2, 2011.
  91. ^ Charlie Sorrel (November 5, 2009). "BlackRa1n Plus Blacksn0w: Unlock Any iPhone in Seconds". Gadget Lab. Wired. Retrieved November 2, 2011.
  92. ^ Thomas Ricker (June 7, 2011). "iOS 5 jailbroken". Engadget. Aol.com. Retrieved October 26, 2011.
  93. ^ a b Dan Goodin (May 3, 2010). "Hackers release jailbreak for iPad and newer iPhones". The Register. Retrieved October 26, 2011.
  94. ^ a b John D. Sutter (August 2, 2010). "First iPhone 4 'jailbreak' posted online". CNN Tech. CNN. Retrieved October 26, 2011.
  95. ^ Sean Hollister (August 1, 2010). "Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video)". Engadget. Retrieved September 11, 2010.
  96. ^ Andy Greenberg (August 1, 2011). "Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple". Forbes. Retrieved December 23, 2012.
  97. ^ a b Eric Mack (July 6, 2011). "App enables iPad 2 jailbreak from your browser". CNET. CBS Interactive. Retrieved October 26, 2011.
  98. ^ P. J. Connolly (July 15, 2011). "Apple Fixes Latest iOS Exploit". eWEEK Labs. eWEEK. Retrieved October 23, 2011.
  99. ^ jean (July 18, 2011). "Analysis of the jailbreakme v3 font exploit". Sogeti ESEC Lab. Retrieved October 23, 2011.
  100. ^ David Murphy (October 9, 2010). "iPhone Hackers Square Off With Competing iOS 4 Jailbreaks". PCMag. Retrieved November 2, 2011.
  101. ^ Charlie Sorrel (February 4, 2011). "Untethered iOS 4.2.1 Jailbreak Live". Gadget Lab. Wired. Retrieved November 2, 2011.
  102. ^ Elizabeth Fish (October 20, 2010). "Oh Hai! Apple TV Officially Hacked". PCWorld. IDG. Retrieved November 2, 2011.
  103. ^ Blair Hanley Frank (February 7, 2011). "Verizon iPhone Now Available for Jailbreaking". PCWorld. IDG. Retrieved November 2, 2011.
  104. ^ Edgar Alvarez (June 4, 2012). "Newest version of ultrasn0w unlocks iPhone 4, 3GS on iOS 5.1.1, RedSn0w 0.9.12b1 also released". Engadget. Aol. Retrieved June 16, 2012.
  105. ^ a b c Eric Mack (January 20, 2012). "Fly, be free! Jailbreak for iPhone 4S, iPad 2 released". CNET. CBS Interactive. Retrieved January 22, 2012.
  106. ^ a b c d e McKinley Noble (January 20, 2012). "How to Jailbreak Your iPhone 4S and iPad 2 via Absinthe A5". PCWorld. IDG. Retrieved January 22, 2012.
  107. ^ Adrian Kingsley-Hughes (May 26, 2012). "Untethered Jailbreak For Your iOS 5.1.1 iPhone/iPad/iPod Touch Is Here". Tech. Forbes. Retrieved June 1, 2012.
  108. ^ "iOS 6.1.4 Software Update". apple.com.
  109. ^ "Silv3rwind iOS 6.1.3 Jailbreak Is A Scam !". Ujailbreakiphone. Retrieved June 3, 2013.
  110. ^ "Icysn0w iOS 6.1.3 Jailbreak Is Fake !". Ujailbreakiphone. Retrieved June 3, 2013.
  111. ^ "Sn0wbreeze v2.9.14 Download Available With Support For iOS 6.1.3 Jailbreak". redsn0w. Retrieved June 27, 2013.
  112. ^ "Download TaiG 1.2.0 To Jailbreak iOS 8.1.2". Retrieved 10 December 2014.
  113. ^ "TaiG Update Log". Retrieved 3 July 2015.
  114. ^ "iH8sn0w on Twitter: "iOS 9 Fun"". Retrieved October 10, 2015.
  115. ^ "iOS 9 has been jailbroken". Retrieved 16 October 2015.
  116. ^ "Pangu Team Releases iOS 9 Jailbreak For The iPhone, iPad And iPod Touch". Retrieved 16 October 2015.
  117. ^ "The first iOS 9 jailbreak is here". Retrieved 16 October 2015.
  118. ^ iPhone Dev Team. "How to Escape Jail". Archived from the original on October 5, 2007. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  119. ^ "The iPhone / iTouch tif exploit is now officially released!". October 10, 2007. Retrieved August 23, 2012.
  120. ^ Ryan Block (October 10, 2007). "iPhone and iPod touch v1.1.1 full jailbreak tested, confirmed!". Engadget. Aol. Retrieved August 24, 2012.
  121. ^ PatrickJ (February 1, 2009). "redsn0w Tethered Jailbreak for iPod Touch 2G Released". iSource. Retrieved August 24, 2012.
  122. ^ Justin Berka (February 3, 2009). "Redsn0w lite jailbreak for 2nd-gen iPod touch released". Ars Technica. Condé Nast. Retrieved January 9, 2013.
  123. ^ Ross Miller (June 20, 2009). "Pwnage Tool for iPhone OS 3.0 now live, ultrasn0w still on standby". Engadget. Aol. Retrieved October 26, 2011.
  124. ^ Daniel Brusilovsky (July 3, 2009). "First iPhone 3GS Jailbreak Hits The Web". TechCrunch. The Washington Post. Retrieved October 26, 2011.
  125. ^ Mike Keller (June 23, 2010). "Does Jailbreaking Still Make Sense with iOS 4.0?". PCWorld. IDG. Retrieved October 26, 2011.
  126. ^ John Herrman (June 8, 2010). "iOS 4 Jailbroken Within a Day of First Release". Gizmodo. Retrieved November 2, 2011.
  127. ^ Donald Melanson (October 20, 2010). "Apple TV now jailbreakable with PwnageTool 4.1". Engadget. Aol. Retrieved May 22, 2012.
  128. ^ a b c d e f g h Mathew J. Schwartz (July 7, 2011). "Apple iOS Zero-Day PDF Vulnerability Exposed". InformationWeek. Retrieved October 23, 2011.
  129. ^ a b c d e Mike Keller (August 23, 2011). "Jailbreaking 101: Which Tool to Use to Hack Your iDevice". PCWorld. IDG. Retrieved October 23, 2011.
  130. ^ a b c Sarah Jacobsson Purewal (October 18, 2011). "How to Jailbreak Your iOS 5 Device". PCWorld. IDG. Retrieved October 23, 2011.
  131. ^ a b iPhone Dev Team (March 7, 2012). "March Mayhem". Dev Team Blog. Retrieved April 22, 2012.
  132. ^ a b Edgar Alvarez (April 21, 2012). "RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools". Engadget. Retrieved April 22, 2012.
  133. ^ "Dev-Team Blog – Pre-DC". Dev-Team Blog. June 4, 2012. Retrieved May 30, 2013.
  134. ^ "Jailbreak iOS 6.1.3 On Pre-A5 iPhone And iPod touch Using Redsn0w [How-To Tutorial]". Redmond Pie. March 20, 2013. Retrieved May 30, 2013.
  135. ^ a b "evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs".
  136. ^ a b c d "Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released".