iOS jailbreaking

On Apple devices running iOS and iOS-based[lower-alpha 1] operating systems, jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by the manufacturer. Typically it is done through a series of kernel patches. A jailbroken device permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.[1]

While sometimes compared to rooting an Android device, jailbreaking bypasses several types of Apple prohibitions for the end-user. Since it includes modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting), the concepts of iOS jailbreaking are therefore technically different from Android device rooting.

Motivation

Expanding the feature set that Apple and its App Store have restricted is one of the motivations for jailbreaking.[2] Apple checks apps for compliance with its iOS Developer Program License Agreement[3] before accepting them for distribution in the App Store. However, the reasons for Apple to ban apps are not limited to safety and security and may be regarded as arbitrary and capricious.[4] In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that "contain content that ridicules public figures."[5] To access banned apps,[6] users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,[7] such as user interface customization and tweaks.

Device customization

Since software programs available through APT and or Installer.app (legacy) are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customization options for iOS and its features and other apps (commonly called tweaks).[8] Users install these programs for purposes including personalization and customization of the interface using tweaks developed by developers and designers,[8] adding desired features such as access to the root file system and fixing annoyances,[9] and making development work on the device easier by providing access to the file system and command-line tools.[10][11] Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character input systems because they are easier to use than Apple's.[12]

In some cases, jailbreak features are adopted by Apple and used as inspiration for features that are incorporated into iOS and iPadOS.[13][14]

Jailbreak features adopted by Apple
Adopted Feature Jailbreak Tweak
iOS Version Description Title Developer Originally released for
5.0 Emoji support Vmoji Vintendo/ManChild Technologies iOS 4
Keyboard shortcuts Xpandr Nicholas Haunold
Delete individual calls[15] Call Delete IArrays
7.0 Control Center SBSettings BigBoss iPhone OS 2
NCSettings JamieD360 iOS 5
Translucent Notification Center BlurredNCBackground Phillippe
8.0 Interactive Notifications LockInfo David Ashman iOS 4
biteSMS biteSMS Team iOS 5
Third-Party Keyboards Fleksy Enabler Sea Comet iOS 6
Predictive Text PredictiveKeyboard Matthias Sauppe
9.0 Cursor Control SwipeSelection Kyle Howells iOS 4
Lowercase Keys in Keyboard ShowCase Lance Fetters
10.0 Drawing on Messages Graffiti IanP iOS 5
Floating Notification Center Floater Skylerk99 iOS 8
Bubble Notifications WatchNotifications Thomas Finch
Clear All Notifications 3D Touch to Clear Notifications MohammadAG
OneTapClear Rave
Stickers in Messages StickerMe Alexander Laurus
Separate Control Center Pages Auxo A3Tweaks iOS 9
11.0 Cellular Data Control SBSettings BigBoss iPhone OS 2
CCSettings plipala iOS 8
Customizable Control Center CChide/CCSettings plipala
Onizuka Maximehip
Colored Controls Cream CP Digital Darkroom
One-Handed Keyboard (iPhone) OneHandWizard TheAfricanNerd, sharedRoutine
Low Power Mode in Control Center CCLowPower Cole Cabral iOS 10
Notification design tweaks CleanNotification10 Ayden Panhuyzen
13.0[16] Dark Mode Eclipse Guillermo Morán iOS 7
Noctis LaughingQuoll
Download manager in Safari Safari Plus BigBoss iOS 8
Redesigned volume HUD Melior SparkDev iOS 7
Ultrasound Ayden Panhuyzen iOS 11
Wi-Fi/Bluetooth settings in Control Center WeatherVane ATWiiks
Unlimited app download limit on Mobile Data Appstore Unrestrict iJulioverne
Third-party Controller Support nControl Kevin Bradley iOS 12
14.0 Hide apps from Home screen Poof BigBoss iOS 5,[17] possibly older
Compact Call Interface CallBar Elias Limneos iOS 7
Scorpion Esquilli iOS 13
App Library Vesta SparkDev
Changing CarPlay background Canvas Leftyfl1p
Picture in Picture on iPhone Titan TheSaltaCracka
Home Screen Widgets HSWidgets dgh0st
Smaller Siri SmallSiri Muirey03
15.0 Separation Alerts Proximitus LaughingQuoll iOS 11
Low Power Mode (iPad) LPMPad iCraze iOS 13
Focus PureFocus Dave Van Wijk
Notification Priority Contacy XCXiao
Redesigned Notifications Quart LaughingQuoll
Velvet NoisyFlake
HiMyNameIsUbik
16.0 Taptic Keyboard TapticKeys SparkDev iOS 10
Redesigned Now Playing Interface Colorflow David Goldman iOS 7
Chromaflow Ryan Nair iOS 14
Enhanced Lock Screen Customization Complications Ben Giannis iOS 12

Carrier unlocking

Jailbreaking also opens the possibility for using software to unofficially unlock carrier-locked iPhones so they can be used with other carriers.[18] Software-based unlocks have been available since September 2007,[19] with each tool applying to a specific iPhone model and baseband version (or multiple models and versions).[20] This includes the iPhone 4S, iPhone 4, iPhone 3GS, and iPhone 3G models. An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to install Cydia the iPad baseband.

Installation of malware

Cybercriminals may jailbreak an iPhone to install malware or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company Hacking Team, which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.[21][22]

Software piracy

On iOS devices, the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking, therefore, allows the installation of pirated applications.[23] It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.[24] However, the installation of pirated applications is also possible without jailbreaking, taking advantage of enterprise certificates to facilitate the distribution of modified or pirated releases of popular applications.[25]

Package managers

Screenshot of Cydia
Cydia, a popular package manager installed on jailbroken devices

A package manager or package-management system is a collection of software tools that automates the process of installing, upgrading, configuring, and removing computer programs. For jailbreaks, this is essential for the installation of third-party content. There are a few package managers specifically for jailbroken iOS devices, of which the most popular are Cydia, Sileo, Zebra and Installer 5.

Security of the device

Once a device is jailbroken, the built-in security is compromised due to the vast amount of kernel patches that go into building the tool. Security structures like Apple Mobile File Integrity, Sandbox, Read-Only Root File system, and trusted apps get disabled or otherwise tampered with, to achieve the goals of the jailbreaking tool. This, in turn, creates potential security issues for the user of a jailbroken device.

Users of a jailbroken device are also often forced to stay on an inferior iOS version that is no longer supported by Apple because newer versions usually cannot be jailbroken right away. This has the potential to introduce security issues because for these older versions there are known security vulnerabilities, exploits, and exploit proof of concepts published.

In March 2021, jailbreak developer GeoSn0w[26] released a tweak called iSecureOS which can alert the users of security issues found on their devices. The application works akin to antivirus software, in that it scans the files on the user's device and checks them against a database of known malware or unsafe repos.

In June 2021, ESET Research confirmed that malware did exist on one of the piracy repositories in the jailbreak community. The malware actively targeted iSecureOS to try to bypass the detection,[27] but updates to the security app were quickly released and have mitigated the malware.

Comparison to Android rooting

Jailbreaking of iOS devices has sometimes been compared to "rooting" of Android devices. Although both concepts involve privilege escalation, they do differ in scope.

Where Android rooting and jailbreaking are similar is that both are used to grant the owner of the device superuser system-level privileges, which may be transferred to one or more apps. However, unlike iOS phones and tablets, nearly all Android devices already offer an option to allow the user to sideload 3rd-party apps onto the device without having to install from an official source such as the Google Play store.[28] Many Android devices also provide owners the capability to modify or even replace the full operating system after unlocking the bootloader, however doing this requires a factory reset.[29][30][31]

In contrast, iOS devices are engineered with restrictions including a "locked bootloader" which can not be unlocked by the owner to modify the operating system without violating Apple's end-user license agreement. And on iOS, until 2015, while corporations could install private applications onto corporate phones, sideloading unsanctioned, 3rd-party apps onto iOS devices from sources other than the App Store was prohibited for most individual users without a purchased developer membership.[32] After 2015, the ability to install 3rd-party apps became free for all users; however, doing so requires a basic understanding of Xcode and compiling iOS apps.

Jailbreaking an iOS device to defeat all these security restrictions presents a significant technical challenge.[33] Similar to Android, alternative iOS app stores utilizing enterprise certificates are available, offering modified or pirated releases of popular applications and video games, some of which were either previously released through Cydia or are unavailable on the App Store due to these apps not complying with Apple developer guidelines.

Tools

Types

Many different types of jailbreaks have been developed over the years, differing in how and when the exploit is applied.

Untethered

When a jailbroken device is booting, it loads Apple's own boot software initially. The device is then exploited and the kernel is patched every time it is turned on. An untethered jailbreak is a jailbreak that does not require any assistance when it reboots up. The kernel will be patched without the help of a computer or an application.[34] These jailbreaks are uncommon and take a significant amount of reverse engineering to create. For this reason, untethered jailbreaks have become much less popular, and Fugu14[35] is currently the only jailbreak that supports recent iOS versions.

Tethered

A tethered jailbreak is the opposite of an untethered jailbreak, in the sense that a computer is required to boot the device. Without a computer running the jailbreaking software, the iOS device will not be able to boot at all. While using a tethered jailbreak, the user will still be able to restart/kill the device's SpringBoard process without needing to reboot. Many early jailbreaks were offered initially as tethered jailbreaks.

Semi-tethered

This type of jailbreak allows a user to reboot their phone normally, but upon doing so, the jailbreak and any modified code will be effectively disabled, as it will have an unpatched kernel. Any functionality independent of the jailbreak will still run as normal, such as making a phone call, texting, or using App Store applications. To be able to have a patched kernel and run modified code again, the device must be booted using a computer.

Semi-untethered

This type of jailbreak is like a semi-tethered jailbreak in which when the device reboots, it no longer has a patched kernel, but the key difference is that the kernel can be patched without using a computer. The kernel is usually patched using an application installed on the device without patches. This type of jailbreak has become increasingly popular, with most recent jailbreaks classified as semi-untethered.

History of tools

Several people (including saurik, p0sixninja, and geohot) who have contributed to building jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at DEF CON.

JailbreakMe and AppSnapp

A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it,[36] and soon a jailbreak-only game app became available.[37] In October 2007, JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod Touch,[38][39] and it included Installer.app as a way to get software for the jailbroken device.

ZiPhone

In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.[40]

PwnageTool

The iPhone Dev Team, which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod Touch,[41][42] newly including Cydia as the primary third-party installer for jailbroken software.[43] PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.[44][45]

QuickPwn

In November 2008 the iPhone Dev Team released QuickPwn to jailbreak iPhone OS 2.2 on iPhone and iPod Touch, with options to enable past functionality that Apple had disabled on certain devices.[46]

redsn0w

After Apple released iPhone OS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac.[47] It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.[48]

purplera1n & blackra1n

George Hotz developed the first iPhone unlock. In 2009, he released a jailbreaking tool for the iPhone 3GS on iPhone OS 3.0 called purplera1n,[49] and blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod Touch and other devices.[50]

limera1n

In October 2010, George Hotz released limera1n, a low-level boot ROM exploit that permanently works to jailbreak the iPhone 4 and is used as a part of tools including redsn0w.[51]

Spirit and JailbreakMe

Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010.[52] Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iPhone OS 3.2.[52] In August 2010, comex released JailbreakMe 2.0, the first web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1).[53][54] In July 2011, he released JailbreakMe 3.0,[55] a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3).[56] It used a flaw in PDF file rendering in mobile Safari.[57][58]

Greenpois0n

Chronic Dev Team initially released Greenpois0n in October 2010, a desktop-based tool for untethered jailbreaking iOS 4.1[59] and later iOS 4.2.1[60] on most devices including the Apple TV,[61] as well as iOS 4.2.6 on CDMA (Verizon) iPhones.[62]

ultrasn0w

As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod Touch (3rd and 4th generation).[45] As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1.[63]

Absinthe

The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S.[34][64][65][66] In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1, including jailbreaking the third-generation iPad for the first time.[67]

evasi0n

An iOS 6.X untethered jailbreak tool called "evasi0n" was released for Linux, OS X, and Windows on February 4, 2013.[68] Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.[69]

Sn0wbreeze

In April 2013, the latest versions of Sn0wbreeze was released, which added the support for tethered jailbreaking on A4 devices (i.e. devices not newer than the iPhone 4, iPad (1st generation), or iPod Touch (4th generation)).

TaiG

On November 29, 2014, TaiG team released their untethered jailbreak tool called "TaiG" for devices running iOS 8.0–8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2.[70] On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0–8.4.[71]

Pangu9

On October 14, 2015, Pangu Team released Pangu9, their untethered jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.[72][73]

Pangu93

On July 17, 2016, Pangu Team released Pangu93, a semi-untethered jailbreak tool for iOS 9.2–9.3.3. It was the first semi-untethered jailbreak and at the same time made within a sideloaded app, and included support only for 64bit devices.

Home Depot

On mid-March 2017, jk9357 (aka @REALKJCMEMBER), part of the KJC (Kim Jong Cracks) hacking team, released the first semi-untethered jailbreak for 32-bit devices on 9.1–9.3.4, known as Home Depot. This jailbreak is based on the open source Trident exploit released on GitHub by Benjamin Randazzo. The exploit makes use of some of the Pegasus vulnerabilities.[74]

yalu+mach_portal and extra_recipe

On December 21, 2016, a beta semi-untethered jailbreak tool for iOS 10.1 known as yalu+mach_portal was released for select 64-bit iOS devices. The jailbreak made use of Ian Beer's, of Google Project Zero, mach_portal exploit. This version is extremely unstable and was only meant for developers. On January 26, 2017, with help from Marco Grassi, a more stable version for iOS 10.2 was released, eventually supporting all 64-bit iOS devices except for the iPhone 7 and 7 Plus, which is only supported by the older, more unstable version for 10.1.1. This jailbreak made use of Ian Beer's, of Project Zero, extra_recipe exploit. Both jailbreaks are installed through a computer application known as Cydia Impactor, which allows signing of apps not in the App Store. Todesco said that the newer version would be eventually updated to support the iPhone 7 and 7 Plus up to iOS 10.1.1, however, he left the jailbreaking scene on March 28, abandoning both jailbreaks before it was released.

Electra

On February 26, 2018, a public version of the Electra jailbreak was released for iOS devices on 11.0–11.1.2.[75] This jailbreak uses a KPPless exploit. As Cydia Substrate had not been updated for iOS 11, Electra uses a Substrate alternative known as Substitute.

Houdini b3

On June 6, 2018, Abraham Masri released an update to Houdini, the first semi-jailbreak. The tool has been updated to beta 3 revision 1, adding the compatibility with iOS 11 up to 11.3.1.

Electra update

On July 6, 2018, developer CoolStar updated the Electra jailbreak for iOS devices on 11.0–11.4.1 (it previously only supported up to 11.1.2).[75] It continued to use a KPPless exploit and Substitute in place of Cydia Substrate.

Osiris Jailbreak for iOS 12

On February 1, 2019, a proof of concept for a jailbreak Osiris Jailbreak / OsirisJailbreak12 was released compatible with iOS 12.0 to iOS 12.1.2.

unc0ver

On December 9, 2019, A public update to the unc0ver jailbreak was released to add support for iOS 12.4.1. This version of unc0ver used the AppleAVE2Driver exploit,[76] developed by 08Tc3wBB, who submitted/sold the exploit to ZecOps for the Task-For-Pwn 0 Bounty.

On December 29, 2021, A public update to the unc0ver jailbreak was released to add support for IOS 14.6-14.8 for A12-A13 iPhones (XS-11 Pro Max) only, with no iPad support, using an as-yet-unnamed exploit developed by security researcher pattern_f_.

palera1n

On September 17, 2022, palera1n was released as a developer-oriented jailbreak for checkm8 devices (A8-A11) on iOS 15.0+.[77] On A11 devices, the passcode must be disabled and will not be able to use any SEP functionality such as passcode, Face ID/Touch ID, and Apple Pay until booted into a stock iOS state.[78]

Fugu15 and Dopamine

On October 31, 2022, Linus Henze, previous developer of Fugu14, demo’d, and then released, a proof-of-concept jailbreak called Fugu15,[79] capable of exploiting iOS 15 to iOS 15.5 Beta 2 using 4 exploits.[80][81][82][83]

On March 29, 2023, Lars Fröder released a fork called Fugu15 Max,[84] which adds partial tweak support through ElleKit,[85] subsequent updates improved tweak support and the jailbreak’s stability, which is later renamed to Dopamine, Dopamine’s official release date is May 3, 2023.[86]

By device and OS

Device OS Release date Jailbreak date Jailbroken
after (days)
Tool Developer(s)
iPhone (1st generation) iPhone OS 1.0 June 29, 2007 July 10, 2007[36] 11 (no name) iPhone Dev Team[87]
iPod Touch (1st generation) September 5, 2007 October 10, 2007[88][89] 35 JailbreakMe niacin and dre
iPhone 3G iPhone OS 2.0 July 11, 2008 July 20, 2008[42] 9 PwnageTool iPhone Dev Team
iPod Touch (2nd generation) September 9, 2008 January 30, 2009[90][91] 143 redsn0w iPhone Dev Team and Chronic Dev Team
iPhone OS 3.0 June 17, 2009 June 19, 2009[92] 2 PwnageTool iPhone Dev Team
iPhone 3GS June 19, 2009 July 3, 2009[93] 14 purplera1n George Hotz
iPad April 30, 2010 May 3, 2010[52] 3 Spirit comex
iOS 4.0 June 21, 2010 June 23, 2010[94][95] 2 PwnageTool iPhone Dev Team
iPhone 4 June 24, 2010 August 1, 2010[53] 38 JailbreakMe 2.0 comex
Apple TV (2nd generation) September 1, 2010 October 20, 2010[96] 49 PwnageTool iPhone Dev Team
iPad 2 March 11, 2011 July 5, 2011[56] 116 JailbreakMe 3.0 comex
iOS 5.0 October 12, 2011 October 13, 2011[48] 1 redsn0w iPhone Dev Team
iPhone 4S October 14, 2011 January 20, 2012[34][64] 98 Absinthe pod2g, Chronic Dev Team, iPhone Dev Team
iPad (3rd generation) March 16, 2012 May 25, 2012 70 Absinthe 2.0 pod2g, Chronic Dev Team, iPhone Dev Team
iOS 6.0 September 19, 2012 September 19, 2012 0 redsn0w iPhone Dev Team
iPhone 5 September 21, 2012 February 4, 2013 136 evasi0n evad3rs
iPod Touch (5th generation) October 23, 2012 February 4, 2013 104 evasi0n evad3rs
iPad (4th generation) November 2, 2012 February 4, 2013 94 evasi0n evad3rs
iPad Mini November 2, 2012 February 4, 2013 94 evasi0n evad3rs
iOS 7 September 18, 2013 December 22, 2013 95 evasi0n7 evad3rs
iPhone 5C September 20, 2013 December 22, 2013 93 evasi0n7 evad3rs
iPhone 5S September 20, 2013 December 22, 2013 93 evasi0n7 evad3rs
iPad Air November 1, 2013 December 22, 2013 51 evasi0n7 evad3rs
iPad Mini 2 November 12, 2013 December 22, 2013 40 evasi0n7 evad3rs
iOS 8 September 17, 2014 October 22, 2014 35 Pangu8 Pangu Team
iPhone 6 September 19, 2014 October 22, 2014 33 Pangu8 Pangu Team
iPhone 6 Plus September 19, 2014 October 22, 2014 33 Pangu8 Pangu Team
iPad Air 2 October 22, 2014 October 22, 2014 0 Pangu8 Pangu Team
iPad Mini 3 October 22, 2014 October 22, 2014 0 Pangu8 Pangu Team
iPod Touch (6th generation) July 15, 2015 July 16, 2015 1 TaiG, PP Jailbreak TaiG, PP Jailbreak
iOS 9 September 16, 2015 October 14, 2015 28 Pangu9, Pangu933, Phoenix, p0laris, kok3shi, openpwnage Pangu Team, Phoenix Team, spv, dora2-iOS, 0xilis
iPhone 6S September 25, 2015 October 14, 2015 19 Pangu9 Pangu Team
iPhone 6S Plus September 25, 2015 October 14, 2015 19 Pangu9 Pangu Team
iPad Mini 4 September 9, 2015 October 14, 2015 35 Pangu9 Pangu Team
iPad Pro November 11, 2015 March 11, 2016 121 Pangu9 Pangu Team
Apple TV (4th generation) September 9, 2015 March 23, 2016 196 Pangu9 Pangu Team
iPhone SE (1st generation) March 31, 2016 July 24, 2016 115 PPJailbreak PPJailbreak, Pangu Team
iOS 10 September 13, 2016 December 21, 2016 99 Yalu Luca Todesco
iOS 11 September 19, 2017 December 26, 2017 98 LiberiOS, Electra, Unc0ver and Osiris Jailbreak (developers only)[97] Jonathan Levin, Pwn20wnd, CoolStar, GeoSn0w
IOS 12 September 17, 2018 February 22, 2019 158 unc0ver,[98] Chimera,[99] checkra1n,[100] and Osiris Jailbreak[101] (developers only) Pwn20wnd, CoolStar, sbingner, Ian Beer, Brandon Azad, Jonathan Levin, PsychoTea, xerub, ninjaprawn, stek29, GeoSn0w
IOS 13 September 19, 2019 October 13, 2019 24 unc0ver,[98] Odyssey[102] and checkra1n[100] Pwn20wnd,CoolStar, sbingner, Ian Beer, Brandon Azad, Jonathan Levin, PsychoTea, xerub, ninjaprawn, stek29
Apple A10 and below (officially supported)
Apple A11 (preliminary support)
iOS 14 September 16, 2020 September 21, 2020[103] 5 checkra1n[104] qwertyoruiop, argp, axi0mX, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, sbingner, Siguza
Apple A14 and below iOS 14 September 16, 2020 February 27, 2021 164 unc0ver,[98] Taurine Pwn20wnd, CoolStar, Sam Bingner, Siguza, Jake James, Ubik, Dennis Bednarz, exDeveloper
Apple A11 and below iOS 15 September 20, 2021 September 17, 2022

[105]

362 palera1n[77] Nebula, Mineek, Nathan, Lakhan Lothiyi, Tom, Nick Chan, Flower

Table of tools

Name Release date Hardware Firmware Untethered? Developer(s) License
iPad iPhone iPod
Touch
Oldest Recent
JailbreakMe 3.0[106] July 5, 2011[106]
[106]
1[106] 4.2.6 4.2.8
4.3 – 4.3.3[106][lower-alpha 2]
Yes[106] comex[106] Proprietary
Seas0npass[107] October 18, 2011[107] 2nd generation Apple TV[107] 4.3 5.3
6.1.2 (tethered)[107]
4.3 – 5.3[107] GPLv3[108]
redsn0w 0.9.15 beta 3[109][110] November 1, 2012 1[45][109][111] 1 4.1 6.1.6
Depends
Untethered:
Tethered:
  • 4.2.9 – 4.2.10
  • 4.3.4 – 4.3.5
  • 5.0
  • 5.1
  • 6.0 – 6.1.6 (not available for devices newer than the iPhone 4, iPad 1, or iPod Touch 4)[113]
iPhone Dev Team[45] Proprietary
Absinthe 2.0.4[65] May 30, 2012 1[66] 5.1.1[66] Yes[34] pod2g, Chronic Dev Team, iPhone Dev Team[65] Proprietary[114]
evasi0n February 4, 2013
6.0 6.1.2[115] Yes pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs) Proprietary[116]
evasi0n7 December 22, 2013
5 7.0 7.0.6[115] Yes pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs) Proprietary
p0sixspwn December 30, 2013
6.1.3 6.1.6 Yes winocm, iH8sn0w, and SquiffyPwn GPLv3[117]
Pangu June 23, 2014[118] 5[118] 7.1 7.1.2 Yes dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam) Proprietary
Pangu8 October 22, 2014 5 8.0 8.1 Yes windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam) Proprietary
TaiG November 29, 2014
8.0 8.4 Yes TaiG Proprietary
PPJailbreak January 18, 2015
8.0 8.4 Yes PanguTeam and PPJailbreak Proprietary
Pangu9 October 14, 2015
9.0 9.1 Yes PanguTeam Proprietary
Pangu9 March 23, 2016 4th generation Apple TV 9.0 9.0.1 Yes PanguTeam Proprietary
LiberTV March 3, 2017 4th generation Apple TV 9.1 10.1 Semi-Untethered Marco Grassi, Luca Todesco, Jonathan Levin Proprietary
LiberTV 1.1 December 24, 2017 4th & 5th generation (4K) Apple TV 11.0 11.1 Semi-Untethered Marco Grassi, Luca Todesco, Jonathan Levin Proprietary
PPJailbreak July 24, 2016
9.2 9.3.3 Semi-Untethered PanguTeam and PPJailbreak Proprietary
mach_portal + Yalu December 22, 2016 Pro 10.0.1 10.1.1 (depends on device) Semi-Untethered Luca Todesco
yalu102 January 26, 2017 6 10.0.1 10.2 Semi-Untethered Luca Todesco and Marco Grassi WTFPL[119]
Phœnix August 6, 2017[120]
9.3.5 Semi-Untethered Siguza and tihmstar Proprietary
Etason September 19, 2017[121]
8.4.1 Yes tihmstar Proprietary
Saïgon October 15, 2017
10.2.1 Semi-Untethered Abraham Masri Proprietary[122]
h3lix December 24, 2017
10.0 10.3.4 Semi-Untethered tihmstar Proprietary
Meridian January 4, 2018
10.0 10.3.3 Semi-Untethered Sparkey, Ian Beer, Siguza, xerub, stek29, theninjaprawn, ARX8x, cheesecakeufo, FoxletFox, Sticktron, nullpixel, arpolix, EthanRDoesMC, CydiaBen, Comsecuris UG, Brandon Saldan, Lepidus, Cryptic, Samg_is_a_Ninja, M1sta[123] MIT[124]
g0blin January 13, 2018
10.3 10.3.3 Semi-Untethered Sticktron, Siguza, Ian Beer, windknown, Luca Todesco, xerub, tihmstar, saurik, uroboro, Abraham Masri, arx8x, PsychoTea, Cryptic Proprietary
Spyware.lol[125] September 7, 2018
  • Air, Air 2
  • iPad Mini 2, Mini 4, Mini 3
  • iPad (5th generation)
  • iPad Pro (9.7‑inch)
  • iPad Pro (12.9‑inch)
  • iPad Pro (10.5-inch)
  • iPad Pro (12.9-inch) (2nd generation)
  • iPhone SE
  • iPhone 5s
  • iPhone 6s
  • iPhone 6
  • iPhone 6s plus
  • iPhone 6 plus
  • iPhone 7
  • iPhone 7 plus
iPod Touch (6th Gen) 10.0 10.3.3 Semi-Untethered JakeBlair420 Proprietary
LiberiOS December 25, 2017
11.0 11.1.2 Semi-Untethered Marco Grassi, Luca Todesco, Jonathan Levin, Ian Beer Proprietary
Electra1112 January 12, 2018
11.0 11.1.2 Semi-Untethered CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, stek29, angelXwind, comex, isklikas, and goeo_, DHowett, and rpetrich GPLv3[126]
Electra1131 July 7, 2018
11.0 11.4.1 Semi-Untethered CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, Brandon Azad, stek29, Jamie Bishop, Pwn20wnd GPLv3[127]
ElectraTV July 12, 2018 4th generation Apple TV 11.0 11.4.1 Semi-Untethered nitoTV
unc0ver October 13, 2018
11.0 14.8.1 (excludes 13.5.1) Semi-Untethered Pwn20wnd, Sam Bingner, Ian Beer, Brandon Azad, Jonathan Levin, xerub, sparkey, stek29, theninjaprawn New BSD License[128]
Chimera April 30, 2019
12.0 12.5.7 Semi-Untethered Coolstar, Jamie Bishop, tri'angle, ninjaprawn, Brandon Azad, PsychoTea, Ayden Panhuyzen, Umang Raghuvanshi, aesign
checkra1n November 10, 2019
  • All 64-bit iPads

4th & 5th generation (4K) Apple TV

12.0+ 14.8.1 Semi-Tethered[130] argp, axi0mx, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza, haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini, Cellebrite, et al. Proprietary
EtasonATV January 22, 2020 3rd generation Apple TV 7.4+ Yes tihmstar Proprietary
Fugu February 2, 2020 All A10-A10X-based iPads All A10-A10X-based iPhones No support 13.0 13.5.1 Semi-Tethered Linus Henze GPLv3[131]
Odyssey August 28, 2020 All iPads that support iOS 13 iPhone 6s or newer 7 13.0 13.7 Semi-Untethered CoolStar, Hayden Seay, 23Aaron, Tihmstar New BSD License[132]
Taurine April 1, 2021 A14 and below that support iOS 14 A14 and below that support iOS 14 A10 and below that support iOS 14 14.0 14.3 Semi-Untethered CoolStar, tihmstar, Diatrus, 23 Aaron, ModernPwner, pattern-f BSD License[133]
Fugu14 October 24, 2021 All A12-A14-based iPads All A12-A14-based iPhones No support 14.2 14.5.1 Yes Linus Henze MIT[134]
p0laris[135] April 20, 2022 All A5/A5X-A6/A6X-based devices No support 9.3.5 9.3.6 Semi-Untethered spv LGPLv2.1[136]
openpwnage[137] May 19, 2022 All A5/A5X-A6/A6X-based devices 5 8.4b4 9.3.6 Semi-Untethered 0xilis LGPLv2.1[138]
Blizzard Jailbreak[139] August 4, 2022 All A5/A5X-A6/A6X-based devices 5 8.4b4 9.3.6 Semi-Untethered GeoSn0w LGPLv3.0[140]
palera1n September 17, 2022 A11 and below that support iOS 15/16 A11 and below that support iOS 15/16 A10 and below that support iOS 15 15.0 16.7.1 Semi-Tethered[lower-alpha 3] Nebula, Mineek, Nathan, Lakhan Lothiyi, Tom, Nick Chan, Flower MIT[142]
XinaA15[143] December 7, 2022 All A12-A15 based devices

M1 based iPads

No support 15.0 15.1.1 Semi-Untethered Xina520 Proprietary
Dopamine[144] May 3, 2023 All A12-A15, M1 based iPads All A12-A15 based iPhones No support 15.0 15.4.1 Semi-Unthethered Lars Fröder MIT[145]

History of exploit-disabling patch releases

Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original evasi0n iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Boot ROM exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.[146]

On July 15, 2011, Apple released a new iOS version that closed the exploit used in JailbreakMe 3.0. The German Federal Office for Information Security had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or malware unwillingly downloaded by iOS users clicking on maliciously crafted PDF files.[147]

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.[148]

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.[149]

On October 21, 2015, seven days after the Pangu iOS 9.0–9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.[150]

On January 23, 2017, Apple released iOS 10.2.1 to patch jailbreak exploits released by Google for the Yalu iOS 10 jailbreak created by Luca Todesco.[151]

On December 10, 2019, Apple used DMCA takedown requests to remove posts from Twitter. The tweet contained an encryption key that could potentially be used to reverse engineer the iPhone's Secure Enclave. Apple later retracted the claim, and the tweet was reinstated.[152]

On June 1, 2020, Apple released the 13.5.1 update, patching the 0 day exploit used by the Unc0ver jailbreak.[153]

On September 20, 2021, Apple released iOS/iPadOS 15, which introduced signed system volume security to iOS/iPadOS, meaning that any changes to the root file system would revert to the latest snapshot on a reboot, and changes to the snapshot would make the device unbootable.[154] As a result, jailbreak development slowed considerably, and for the first time in jailbreaking history, the latest iPhone did not get a jailbreak before a new model was released.

On September 12, 2022, Apple released iOS 16, which introduced a new firmware component known as Cryptex1. New Cryptex1 versions are almost never compatible with old iOS versions, making downgrading impossible except within patch versions (i.e. 16.3 and 16.3.1).

Legality

The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting digital rights management (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.

International treaties have influenced the development of laws affecting jailbreaking. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software,[155] but member states vary on the implementation of the directive.

While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one.[156][157] Apple has also regularly credited jailbreak developers with detecting security holes in iOS release notes.[158]

Apple's support article concerning jailbreaking claims that they "may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software," which includes jailbreaking.[159]

Australia

In 2010, Electronic Frontiers Australia said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply.[160] These laws had been strengthened by the Copyright Amendment Act 2006.

Canada

In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with DRM protection, with exceptions including software interoperability.[161] Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[162] but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.[163]

India

India's copyright law permits circumventing DRM for non-copyright-infringing purposes.[164][165] Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.[166] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.[164][165]

New Zealand

New Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.[167][168] This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.

Singapore

Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.[169]

United Kingdom

The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court.[155][170] Competition laws may also be relevant.[171]

United States

The main law that affects the legality of iOS jailbreaking in the United States is the 1998 Digital Millennium Copyright Act (DMCA), which says "no person shall circumvent a technological measure that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking.[172] Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally,[173] and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets.[174] It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning.[175] It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.[175]

In 2010, Apple announced that jailbreaking "can violate the warranty".[176]

In 2007, Tim Wu, a professor at Columbia Law School, argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."[177] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[178] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[177]

In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.[179][180] Apple had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010, that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[181][182][183] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[182] In 2015, these exemptions were extended to include other devices, including tablets.[184]

BigBoss

BigBoss (previously TheBigBoss.org) is a software repository and blog for jailbreaking. It publishes news on the topic and allows developers to host tweaks and other extensions.[185] It was one of the first repositories to exist for the Cydia package manager, launched in April 2008 by Sleepers Repository. It comes preinstalled with all copies of Cydia.[186]

While the majority of the packages are for older iOS versions, it still receives a steady flow of new packages. While it was originally founded by pseudonymous developer and namesake, BigBoss, it is currently run by 0ptimo, who maintains it and ensures its reliability.[187]

Software

In addition to the news and software hosting website, BigBoss also distributed many utilities that ran on jailbroken devices. These included SBSettings, BossPrefs, BossPaper, Categories, and Flashlight.[188][189][190]

Blog history

On October 18, 2008, the site rebranded from Sleepers Repository to TheBigBoss.[191]

On March 8, 2009, Cydia Store launched, allowing users to purchase software products from the repository. Previously, it had only consisted of free software.[192]

In July 2014, the website was hacked, leaking the entire database and collection of packages (including paid products).[193]

In November 2017, other significant early Cydia Store repositories, ModMyi and ZodTTD, shut down, making BigBoss one of the last original repositories standing.[194]

In December 2018, the Cydia Store shut down, meaning that no new packages could be purchased. Packages that have been previously paid for can still be installed, and free packages can still be installed. New repositories have been creating and using their own payment systems.[195]

Risks

Security, privacy and stability

The first iPhone worm, iKee, appeared in early November 2009, created by a 21-year-old Australian student in the town of Wollongong. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an SSH service, which those users can leave in the default insecure state.[196] In the same month, F-Secure reported on a new malicious worm compromising bank transactions from jailbroken phones in the Netherlands, similarly affecting devices where the owner had installed SSH without changing the default password.[197][198]

In 2010 blogger John Gruber, who is close to Apple, said that users misunderstood some jailbreak exploits and that they were more serious than they appear. He commented that "it's odd how the press is mostly covering this as 'jailbreaking now more convenient' rather than 'remote code exploit now in the wild'", pointing out that the exploit allowed the creator of a malicious website to take control of iPhones accessing it.[199] Restoring a device with iTunes removes a jailbreak.[200][201][202] However, doing so generally updates the device to the latest, and possibly non-jailbreakable, version, due to Apple's use of SHSH blobs. There are many applications that aim to prevent this, by restoring the devices to the same version they are currently running whilst removing the jailbreaks. Examples are, Succession, Semi-Restore and Cydia Eraser.

In 2012, Forbes staff analyzed a UCSB study on 1,407 free programs available from Apple and a third-party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple's App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones.[203] Also, a program available in Cydia called PrivaCy allows user to control the upload of usage statistics to remote servers.[203]

In August 2015, the KeyRaider malware was discovered, affecting only jailbroken iPhones.[204]

Fake/scam jailbreaks

In recent years, due to the technical complexity and often rarity of legitimate jailbreaking software (especially untethered jailbreaks) there has been an increase in websites offering fake iOS jailbreaks. These websites often ask for payment or make heavy use of advertising, but have no actual jailbreak to offer. Others install a fake, lookalike version of the Cydia package manager.[205] In some cases, users have been asked to download free-to-play apps or fill out surveys to complete a (non-existent) jailbreak.

See also

Notes

  1. Such as tvOS (since the 2nd generation), watchOS or iPadOS.
  2. The Verizon CDMA iPhone 4 ran on iOS 4.2.5 to 4.2.10, with incremental updates being bugfixes that were simultaneously applied from 4.3.1 to 4.3.5.
  3. A tethered variant is also available prior to v2.0.0-beta.1.[141]

References

  1. "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on April 3, 2019. Retrieved March 12, 2019.
  2. Chris Foresman (December 13, 2010). "iPhone jailbreaker set to bring Cydia to Mac OS X". Ars Technica. Condé Nast. Archived from the original on August 21, 2011. Retrieved August 2, 2011.
  3. "Agreements and Guidelines - Support - Apple Developer". developer.apple.com. Retrieved 2023-02-09.
  4. Steve Kovach (13 April 2013). "Frustration Builds With Apple's Inconsistent Rules For App Developers". Business Insider. Archived from the original on 6 August 2013. Retrieved 23 August 2013.
  5. Ryan Singel (April 15, 2010). "Apple App Store Bans Pulitzer-Winning Satirist for Satire". Wired. Archived from the original on March 26, 2011. Retrieved February 12, 2011.
  6. "Rejected Apps". imore.com. Archived from the original on 2014-07-15. Retrieved 2017-02-19.
  7. "Jailbreak! New Rules Allow Unapproved iPhone Apps". Fox News. 2015-03-27. Archived from the original on 2013-05-21. Retrieved 2012-12-07.
  8. Adam Dachis (March 14, 2011). "How to Get the Most Out of Your Jailbroken iOS Device". Lifehacker. Gawker Media. Archived from the original on December 25, 2015. Retrieved August 2, 2011.
  9. Jenna Wortham (May 12, 2009). "Unofficial Software Incurs Apple's Wrath". The New York Times. Archived from the original on December 22, 2013. Retrieved August 2, 2011.
  10. Zdziarski, Jonathan (2008). iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain. "O'Reilly Media, Inc.". pp. 3–4. ISBN 9780596554187. Archived from the original on 2017-02-19.
  11. Landau, Ted (2009). Take control of your iPhone. TidBITS Publishing, Incorporated. p. 107. ISBN 9781933671543. Archived from the original on 2017-02-19.
  12. Nathan T. Washburn (May 4, 2012). "Apple Discovers a New Market in China: Rich Boyfriends". HBR Blog Network. Harvard Business Review. Archived from the original on November 9, 2012. Retrieved January 9, 2013.
  13. Haslam, Oliver (June 10, 2015). "9 Jailbreak Tweaks Apple Killed In iOS 9". Redmond Pie. Retrieved December 15, 2022.
  14. Manalo, Amboy (November 2, 2018). "60 iOS Features Apple Stole from Jailbreakers". Gadget Hacks. Retrieved December 15, 2022.
  15. Manalo, Amboy (2 November 2018). "60 iOS Features Apple Stole from Jailbreakers". Gadget Hacks. Retrieved 22 October 2020.
  16. Bednarz, Dennis (7 June 2019). "Every Jailbreak Tweak Apple Copied in iOS 13". iPhone Hacks. Retrieved 23 October 2020.
  17. "Poof - Cydia". Cydia. October 16, 2011.
  18. Brian X. Chen (August 7, 2009). "6 Reasons to Jailbreak Your iPhone". Gadget Lab. Wired. Archived from the original on May 4, 2012. Retrieved May 1, 2012.
  19. Ryan Block (September 11, 2007). "iUnlock released: the first free, open source iPhone SIM unlock software". Engadget. Aol. Archived from the original on February 3, 2014. Retrieved February 1, 2014.
  20. Ian Paul (December 22, 2008). "3G iPhone Unlock Expected". PCWorld. IDG. Retrieved July 14, 2022.
  21. Fleishman, Glen (2015-07-06). "Hacking Team hack reveals why you shouldn't jailbreak your iPhone". MacWorld. Archived from the original on 3 August 2015. Retrieved 2 August 2015.
  22. Heath, Alex (2011-11-25). "New Jailbreak App Stalks All Of Your iPhone's Activity And Makes It Available Online". Cult of Mac. Archived from the original on 23 September 2015. Retrieved 2 August 2015.
  23. Hattersley, Lucy (2 January 2013). "Now pirated iOS apps can be installed without jailbreak". Macworld. Retrieved 14 July 2022.
  24. Kazmucha, Allyson (2012-05-26). "Jailbreak, app piracy, and the true cost of theft". iMore. Archived from the original on 21 August 2015. Retrieved 2 August 2015.
  25. Panzarino, Matthew (1 January 2013). "iOS App Piracy Continues, Now Without Jailbreak". The Next Web. Archived from the original on 4 May 2018. Retrieved 4 May 2018.
  26. "[Free Release] iSecureOS - iOS Security Application For Jailbroken Devices (v1.0 Beta 1)". r/jailbreak. 2021-03-22. Retrieved 2021-10-01.
  27. @ESETresearch (June 8, 2021). "The newer version of iOS/Spy.Postlo.A attempts to modify the definitions of @isecureos (iOS Security application for jailbroken devices) to avoid detection" (Tweet). Retrieved 2021-10-01 via Twitter.
  28. Hildenbrand, Jerry (2 Feb 2012). "Android A to Z: What is sideloading?". Android Central. Archived from the original on 8 July 2014. Retrieved 9 July 2014.
  29. "HTC Bootloader Unlock Instructions". htcdev.com. Archived from the original on 27 October 2014. Retrieved 26 October 2014.
  30. "Official Bootloader Unlock instructions". sonymobile.com. Archived from the original on 2014-07-07. Retrieved 2020-06-04.
  31. "#unlocking-the-bootloader Google instructions on bootloader unlocking". source.android.com. Archived from the original on May 21, 2011. Retrieved October 26, 2014.
  32. Mayo, Benjamin (10 June 2015). "Xcode 7 allows anyone to download, build and 'sideload' iOS apps for free". Archived from the original on 20 January 2017. Retrieved 12 November 2016.
  33. "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on 10 May 2013. Retrieved 9 July 2014. [U]nauthorized modification of iOS is a violation of the iOS end-user software license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software.
  34. Joseph Volpe (January 20, 2012). "Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true". Engadget. Aol. Archived from the original on January 21, 2012. Retrieved January 20, 2012.
  35. Henze, Linus (2023-02-08), Fugu14 - Untethered iOS 14 Jailbreak, retrieved 2023-02-09
  36. Ricker, Thomas (July 10, 2007). "iPhone Hackers: "we have owned the filesystem"". Engadget. Archived from the original on April 1, 2017. Retrieved July 17, 2009.
  37. Topolsky, Joshua (August 6, 2007). "First third-party "game" app appears for iPhone". Engadget. Archived from the original on December 21, 2021. Retrieved July 17, 2009.
  38. Wilson, Ben (October 10, 2007). "Official iPhone 1.1.1 jailbreak released with easy-to-follow instructions; does not require TIFF exploit". CNET. CBS Interactive. Archived from the original on July 19, 2009. Retrieved November 10, 2009.
  39. Gregg Keizer (October 29, 2007). "Hacker Software Can Install Unauthorized Software on iPhones". PCWorld. IDG. Archived from the original on September 25, 2011. Retrieved August 25, 2011.
  40. Block, Ryan (February 12, 2008). "ZiPhone: jailbreak any version iPhone out of the box, including 1.1.3 (by Zibri)". Engadget. Archived from the original on November 1, 2013. Retrieved November 13, 2013.
  41. Charlie Sorrel (July 21, 2008). "Pwnage 2.0 Released: Gadget Lab Jailbreaks iPod Touch". Gadget Lab. Wired. Archived from the original on September 11, 2011. Retrieved November 2, 2011.
  42. Philip Elmer-DeWitt (July 20, 2008). "Dubious achievement: Hackers 'jailbreak' the iPhone 3G". CNN Money. Archived from the original on November 10, 2013. Retrieved October 26, 2011.
  43. Erica Sadun (July 20, 2008). "First Look: Pwnage for 2.0". TUAW. Archived from the original on January 19, 2012. Retrieved November 1, 2011.
  44. Dev Team (May 2011). "Tic tac toe..." Dev Team Blog. Archived from the original on October 31, 2011. Retrieved November 2, 2011.
  45. iPhone Dev Team (December 27, 2011). "Untethered holidays". Dev Team Blog. Archived from the original on October 22, 2016. Retrieved December 29, 2011.
  46. Charlie Sorrel (November 25, 2008). "QuickPWN Adds Street View to iPod Touch". Gadget Lab. Wired. Archived from the original on August 22, 2010. Retrieved November 2, 2011.
  47. Daniel Pan (June 23, 2009). "How to Use Cydia on your iPhone". iPhoneByte. Archived from the original on October 24, 2016. Retrieved November 2, 2015.{{cite web}}: CS1 maint: unfit URL (link)
  48. Elizabeth Fish (October 13, 2011). "iOS 5 Jailbreak Is Already Here; Geeks Not Surprised". PCWorld. IDG. Archived from the original on April 26, 2012. Retrieved October 26, 2011.
  49. Leslie Katz (July 3, 2009). "iPhone 3GS jailbreak, 'purplera1n,' hits Web". CNET. CBS Interactive. Archived from the original on February 8, 2012. Retrieved November 2, 2011.
  50. Charlie Sorrel (November 5, 2009). "BlackRa1n Plus Blacksn0w: Unlock Any iPhone in Seconds". Gadget Lab. Wired. Archived from the original on October 30, 2011. Retrieved November 2, 2011.
  51. Thomas Ricker (June 7, 2011). "iOS 5 jailbroken". Engadget. Aol.com. Archived from the original on October 17, 2011. Retrieved October 26, 2011.
  52. Dan Goodin (May 3, 2010). "Hackers release jailbreak for iPad and newer iPhones". The Register. Archived from the original on October 19, 2011. Retrieved October 26, 2011.
  53. John D. Sutter (August 2, 2010). "First iPhone 4 'jailbreak' posted online". CNN Tech. CNN. Archived from the original on February 3, 2012. Retrieved October 26, 2011.
  54. Sean Hollister (August 1, 2010). "Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video)". Engadget. Archived from the original on August 13, 2010. Retrieved September 11, 2010.
  55. Andy Greenberg (August 1, 2011). "Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple". Forbes. Archived from the original on December 23, 2012. Retrieved December 23, 2012.
  56. Eric Mack (July 6, 2011). "App enables iPad 2 jailbreak from your browser". CNET. CBS Interactive. Archived from the original on November 10, 2013. Retrieved October 26, 2011.
  57. P. J. Connolly (July 15, 2011). "Apple Fixes Latest iOS Exploit". eWEEK Labs. eWEEK. Retrieved July 14, 2022.
  58. jean (July 18, 2011). "Analysis of the jailbreakme v3 font exploit". Sogeti ESEC Lab. Archived from the original on July 22, 2011. Retrieved October 23, 2011.
  59. David Murphy (October 9, 2010). "iPhone Hackers Square Off With Competing iOS 4 Jailbreaks". PCMag. Archived from the original on October 14, 2010. Retrieved November 2, 2011.
  60. Charlie Sorrel (February 4, 2011). "Untethered iOS 4.2.1 Jailbreak Live". Gadget Lab. Wired. Archived from the original on November 9, 2011. Retrieved November 2, 2011.
  61. Elizabeth Fish (October 20, 2010). "Oh Hai! Apple TV Officially Hacked". PCWorld. IDG. Archived from the original on November 3, 2011. Retrieved November 2, 2011.
  62. Blair Hanley Frank (February 7, 2011). "Verizon iPhone Now Available for Jailbreaking". PCWorld. IDG. Archived from the original on March 14, 2011. Retrieved November 2, 2011.
  63. Edgar Alvarez (June 4, 2012). "Newest version of ultrasn0w unlocks iPhone 4, 3GS on iOS 5.1.1, RedSn0w 0.9.12b1 also released". Engadget. Aol. Archived from the original on June 8, 2012. Retrieved June 16, 2012.
  64. John Paul Titlow (January 20, 2012). "Now You Can Jailbreak Your iPhone 4S and iPad 2". ReadWriteWeb. Archived from the original on January 22, 2012. Retrieved January 20, 2012.
  65. Eric Mack (January 20, 2012). "Fly, be free! Jailbreak for iPhone 4S, iPad 2 released". CNET. CBS Interactive. Archived from the original on January 22, 2012. Retrieved January 22, 2012.
  66. McKinley Noble (January 20, 2012). "How to Jailbreak Your iPhone 4S and iPad 2 via Absinthe A5". PCWorld. IDG. Archived from the original on January 22, 2012. Retrieved January 22, 2012.
  67. Adrian Kingsley-Hughes (May 26, 2012). "Untethered Jailbreak For Your iOS 5.1.1 iPhone/iPad/iPod Touch Is Here". Tech. Forbes. Archived from the original on May 30, 2012. Retrieved June 1, 2012.
  68. "evasi0n jailbreak used on nearly 7 million iOS 6.0/6.1 devices". Tech2. 2013-02-09. Retrieved 2022-03-22.
  69. "iOS 6.1.4 Software Update". apple.com. Archived from the original on 2013-09-23. Retrieved 2013-09-02.
  70. "Download TaiG 1.2.0 To Jailbreak iOS 8.1.2". 2014-12-10. Archived from the original on 10 December 2014. Retrieved 10 December 2014.
  71. "TaiG Update Log". Archived from the original on 3 July 2015. Retrieved 3 July 2015.
  72. "iOS 9 has been jailbroken". Archived from the original on 15 October 2015. Retrieved 16 October 2015.
  73. "The first iOS 9 jailbreak is here". 2015-10-14. Archived from the original on 15 October 2015. Retrieved 16 October 2015.
  74. "Trident exploit". 2016-12-11 via GitHub.
  75. Iqbal, Shaeel. "Electra Jailbreak for iOS 11.0 - iOS 11.1.2 [Release]". iosnation.com. Archived from the original on 2018-02-27. Retrieved 2018-02-27.
  76. "ZecOps Task-For-Pwn 0 Bounty: TFP0 POC on PAC-Enabled iOS Devices <= 12.4.2 #FreeTheSandbox". ZecOps. 25 November 2019. Retrieved 2022-07-14.
  77. "palera1n". palera1n.com. Retrieved 2023-02-27.
  78. "Installing palera1n | iOS Guide". ios.cfw.guide. Retrieved 2023-10-13.
  79. Fugu15, Pinauten GmbH, 2022-11-01, retrieved 2023-08-18
  80. "CVE-2022-26764". Common Vulnerabilities and Exposures. 2022-05-26. Retrieved 2023-08-18.
  81. "CVE-2022-26766". Common Vulnerabilities and Exposures. 2022-05-26. Retrieved 2023-08-18.
  82. "CVE-2022-26765". Common Vulnerabilities and Exposures. 2022-05-26. Retrieved 2023-08-18.
  83. "CVE-2022-26763". Common Vulnerabilities and Exposures. 2022-05-26. Retrieved 2023-08-18.
  84. "opa334dev : Post". Twitter. 2022-03-29. Retrieved 2023-08-18.
  85. "ElleKit". ellekit.space. Retrieved 2023-08-18.
  86. "Release 1.0 · opa334/Dopamine". GitHub. Retrieved 2023-08-18.
  87. iPhone Dev Team. "How to Escape Jail". Archived from the original on October 5, 2007.
  88. "The iPhone / iTouch tif exploit is now officially released!". October 10, 2007. Archived from the original on April 2, 2012. Retrieved August 23, 2012.
  89. Ryan Block (October 10, 2007). "iPhone and iPod Touch v1.1.1 full jailbreak tested, confirmed!". Engadget. Aol. Archived from the original on August 20, 2012. Retrieved August 24, 2012.
  90. PatrickJ (February 1, 2009). "redsn0w Tethered Jailbreak for iPod Touch 2G Released". iSource. Archived from the original on June 22, 2013. Retrieved August 24, 2012.
  91. Justin Berka (February 3, 2009). "Redsn0w lite jailbreak for 2nd-gen iPod Touch released". Ars Technica. Condé Nast. Archived from the original on December 2, 2012. Retrieved January 9, 2013.
  92. Ross Miller (June 20, 2009). "Pwnage Tool for iPhone OS 3.0 now live, ultrasn0w still on standby". Engadget. Aol. Archived from the original on April 13, 2012. Retrieved October 26, 2011.
  93. Daniel Brusilovsky (July 3, 2009). "First iPhone 3GS Jailbreak Hits The Web". TechCrunch. The Washington Post. Archived from the original on January 22, 2014. Retrieved October 26, 2011.
  94. Mike Keller (June 23, 2010). "Does Jailbreaking Still Make Sense with iOS 4.0?". PCWorld. IDG. Archived from the original on October 11, 2011. Retrieved October 26, 2011.
  95. John Herrman (June 8, 2010). "iOS 4 Jailbroken Within a Day of First Release". Gizmodo. Archived from the original on October 20, 2011. Retrieved November 2, 2011.
  96. Donald Melanson (October 20, 2010). "Apple TV now jailbreakable with PwnageTool 4.1". Engadget. Aol. Archived from the original on June 24, 2012. Retrieved May 22, 2012.
  97. Bouchard, Anthony (2019-01-31). "Geosn0w releases OsirisJailbreak12, an incomplete 'developer-only' "jailbreak" PoC for iOS 12.0-12.1.2". iDownloadBlog.com. Retrieved 2021-10-01.
  98. unc0ver website
  99. Chimera
  100. checkra1n
  101. GeoSn0w [@FCE365] (January 31, 2019). "[RELEASE] Osiris Developer #Jailbreak for #iOS 12. No remount and no CoreTrust bypass yet. It gets root, escapes the sandbox and resprings. Feel free to build on top of it. Not for the general public!" (Tweet). Retrieved 2021-10-01 via Twitter.
  102. Odyssey
  103. @checkra1n (September 21, 2020). "checkra1n 0.11.0 is now available, adding support for iOS 14 on A9(X) devices and below. A10 devices and above NOT SUPPORTED YET, read our statement" (Tweet) via Twitter.
  104. checkra1n
  105. "GitHub API, telling when the repository of palera1n was created".
  106. Mathew J. Schwartz (July 7, 2011). "Apple iOS Zero-Day PDF Vulnerability Exposed". InformationWeek. Archived from the original on July 10, 2011. Retrieved October 23, 2011.
  107. Mike Keller (August 23, 2011). "Jailbreaking 101: Which Tool to Use to Hack Your iDevice". PCWorld. IDG. Archived from the original on July 6, 2012. Retrieved October 23, 2011.
  108. "Seas0nPass/README at master · firecore/Seas0nPass". GitHub. Retrieved 2023-08-30.
  109. Sarah Jacobsson Purewal (October 18, 2011). "How to Jailbreak Your iOS 5 Device". PCWorld. IDG. Archived from the original on May 8, 2016. Retrieved October 23, 2011.
  110. iPhone Dev Team (March 7, 2012). "March Mayhem". Dev Team Blog. Archived from the original on September 4, 2016. Retrieved April 22, 2012.
  111. Edgar Alvarez (April 21, 2012). "RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools". Engadget. Archived from the original on April 21, 2012. Retrieved April 22, 2012.
  112. "Dev-Team Blog – Pre-DC". Dev-Team Blog. June 4, 2012. Archived from the original on October 19, 2016. Retrieved May 30, 2013.
  113. "Jailbreak iOS 6.1.3 On Pre-A5 iPhone And iPod Touch Using Redsn0w [How-To Tutorial]". Redmond Pie. March 20, 2013. Archived from the original on January 1, 2017. Retrieved May 30, 2013.
  114. absinthe-2.0, OpenJailbreak, 2022-09-30, retrieved 2023-08-30
  115. "evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs". Archived from the original on February 4, 2013.
  116. OpenJailbreak/evasi0n6, OpenJailbreak, 2023-06-30, retrieved 2023-08-30
  117. "Released under GPL licensing. · p0sixspwn/p0sixspwn@f1dff0f". GitHub. Retrieved 2023-08-30.
  118. "Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released". 2014-06-23. Archived from the original on 2016-08-28. Retrieved 2014-06-23.
  119. "yalu102/LICENSE at master · kpwn/yalu102". GitHub. Retrieved 2023-08-30.
  120. @tihmstar (August 6, 2017). "Releasing Phoenix jailbreak for iOS 9.3.5 now! All 32bit devices supported! Be sure to check PGP signature :) phoenixpwn.com" (Tweet). Retrieved 2017-12-19 via Twitter.
  121. "EtasonJB". etasonjb.tihmstar.net. Archived from the original on 2017-12-10. Retrieved 2017-12-19.
  122. Masri, Abraham (2017-12-16). "GitHub - cheesecakeufo/saigon: iOS 10.2.1 Jailbreak - Discontinued version". GitHub. Archived from the original on 2018-09-06. Retrieved 2023-08-30.
  123. Sparkes, Ben. "Meridian: iOS 10.x Jailbreak". meridian.sparkes.zone. Archived from the original on 2018-06-23. Retrieved 2018-06-22.
  124. "MeridianJB/LICENSE.md at master · PsychoTea/MeridianJB". GitHub. Retrieved 2023-08-30.
  125. Spyware.lol
  126. "electra/LICENSE.md at master · coolstar/electra". GitHub. Retrieved 2023-08-30.
  127. "electra1131/LICENSE.md at master · coolstar/electra1131". GitHub. Retrieved 2023-08-30.
  128. "Undecimus/LICENSE at master · pwn20wndstuff/Undecimus". GitHub. Retrieved 2023-08-30.
  129. "Unpatchable bug in millions of iOS devices exploited, developer claims – Ars Technica". arstechnica.com. 27 September 2019. Archived from the original on 2019-12-24. Retrieved 2019-12-19.
  130. "checkra1n Official Website". checkra.in. Archived from the original on 2020-06-03. Retrieved 2020-06-04.
  131. "Fugu/LICENSE at master · LinusHenze/Fugu". GitHub. Retrieved 2023-08-30.
  132. "Odyssey/LICENSE.md at master · Odyssey-Team/Odyssey". GitHub. Retrieved 2023-08-30.
  133. "Taurine/LICENSE.md at main · Odyssey-Team/Taurine". GitHub. Retrieved 2023-08-30.
  134. "Fugu14/LICENSE at master · LinusHenze/Fugu14". GitHub. Retrieved 2023-08-30.
  135. Bouchard, Anthony (2022-04-20). "New p0laris jailbreak for legacy iOS 9.x firmware released". iDownloadBlog.com. Retrieved 2022-05-05.
  136. "app/LICENSE at master · p0larisdev/app". GitHub. Retrieved 2023-08-30.
  137. "openpwnage GitHub Page". GitHub. Retrieved 2023-02-23.
  138. "openpwnage/LICENSE at main · 0xilis/openpwnage". GitHub. Retrieved 2023-08-30.
  139. "New Blizzard Jailbreak released by GeoSn0w For iOS 9.0 – 9.3.6, 32-Bit Devices". idevicecentral.com. Retrieved 2023-10-21.
  140. "Blizzard-Jailbreak-9/LICENSE at main · geosn0w/Blizzard-Jailbreak-9". GitHub. Retrieved 2023-10-21.
  141. "Release 2.0 beta 1 · palera1n/palera1n-c". GitHub. 12 February 2023.
  142. "palera1n/LICENSE at main · palera1n/palera1n". GitHub. Retrieved 2023-08-30.
  143. "XinaA15 GitHub Page". GitHub. Retrieved 2023-01-01.
  144. Fröder, Lars (2023-08-18), "Dopamine GitHub Page", GitHub, retrieved 2023-08-18
  145. "Dopamine/LICENSE.md at master · opa334/Dopamine". GitHub. Retrieved 2023-08-30.
  146. "Apple adds jailbreak resistance to recent iPhone 3GS models". 2009-10-14. Archived from the original on 2015-06-21. Retrieved 2015-06-20.
  147. Robertson, Jordan (July 8, 2011). "Security holes discovered in iPhones, iPads". News & Record. Associated Press. Archived from the original on July 11, 2011. Retrieved July 9, 2011.
  148. "Taig and Pangu working on Jailbreak for IOS 8.4.1". Archived from the original on 23 September 2015.
  149. "iOS 9's Rootless security system dubbed as a 'heavy blow' to jailbreak community". 2015-05-22. Archived from the original on 22 November 2015. Retrieved 10 October 2015.
  150. Perez, Sarah (21 October 2015). "Apple's iOS 9.1 Shuts Down The Pangu Hacking Team's Jailbreak". TechCrunch. Archived from the original on 2015-11-11. Retrieved 2015-11-11.
  151. "About the security content of iOS 10.2.1". Apple Support. Archived from the original on 2017-02-16. Retrieved 2017-03-19.
  152. Clover, Juli (11 December 2019). "Apple Used DMCA Takedown to Temporarily Remove Tweet With iPhone Encryption Key". macrumors.com. Archived from the original on 13 December 2019. Retrieved 16 December 2019.
  153. Gartenberg, Chaim (2020-06-01). "Apple releases iOS 13.5.1, patching out the Unc0ver jailbreak". The Verge. Retrieved 2020-06-16.
  154. "Signed system volume security in macOS". Apple Support. Retrieved 2022-04-15.
  155. Duncan Geere (July 28, 2010). "Investigation: Is it legal to jailbreak a UK iPhone?". Wired UK. Archived from the original on October 31, 2012. Retrieved October 26, 2012.
  156. Greenberg, Andy. "iPhone Uber-Hacker Comex Is Out At Apple". Forbes. Archived from the original on 23 September 2015. Retrieved 15 August 2015.
  157. Heath, Alex (2014-02-21). "After Doing "Insane Things With iOS," Jailbreak Hacker Winocm Joins Apple". Cult of Mac. Archived from the original on 22 November 2015. Retrieved 22 November 2015.
  158. "8.4.1 release notes". Apple. Archived from the original on 6 September 2015. Retrieved 15 August 2015.
  159. "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on 2016-12-23. Retrieved 2017-02-14.
  160. Rosalyn Page (August 5, 2010). "Could jailbreaking your iPhone land you in jail?". PC & Tech Authority. Archived from the original on October 21, 2013. Retrieved January 21, 2013.
  161. Michael Geist (November 7, 2012). "Canadian Copyright Reform In Force: Expanded User Rights Now the Law". michaelgeist.ca. Archived from the original on November 9, 2012. Retrieved November 13, 2012.
  162. "Canada's C-11 Bill and the Hazards of Digital Locks Provisions". Electronic Frontier Foundation. February 10, 2012. Archived from the original on October 17, 2012. Retrieved October 17, 2012.
  163. The Canadian Press (October 13, 2011). "Phone 'jailbreaking' allows users to hack their phone". CTV News. Archived from the original on November 7, 2012. Retrieved October 17, 2012.
  164. Pranesh Prakash (May 23, 2012). "Analysis of the Copyright (Amendment) Bill 2012". Centre for Internet and Society. Retrieved July 14, 2022.
  165. Michael Geist (April 10, 2008). "New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility". Michael Geist. Archived from the original on April 19, 2012. Retrieved October 26, 2012.
  166. Stephen Bell (September 30, 2011). "Law changes required before NZ ratifies ACTA". ComputerWorld New Zealand. Archived from the original on September 30, 2011. Retrieved October 26, 2012.
  167. Kenny Chee (August 12, 2010). "iPhone jailbreak may be legal here, but... But there will be certain legal provisions". DigitalOne. AsiaOne. Archived from the original on August 15, 2010. Retrieved November 10, 2012.
  168. Jim Martin (March 14, 2012). "How to jailbreak your iPhone: Unleash the full potential of your iPhone". PC Advisor. Archived from the original on December 22, 2012. Retrieved January 21, 2013.
  169. Warwick Ashford (July 30, 2010). "iPhone jailbreaking is 'okay under EU law'". Computer Weekly. Electronics Weekly. Retrieved July 14, 2022.
  170. Copyright Office, Library of Congress (October 2012). "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies" (PDF). Federal Register. Archived (PDF) from the original on January 4, 2014. Retrieved February 3, 2014.
  171. David Goldman (July 26, 2010). "Jailbreaking iPhone apps is now legal". CNN Money. Archived from the original on August 30, 2010. Retrieved September 11, 2010.
  172. "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". Federal Register. The United States Government. October 28, 2015. Archived from the original on November 21, 2015. Retrieved November 20, 2015.
  173. "Transcript of "Jailbreak?" (July 30, 2010)". On The Media. July 30, 2010. Archived from the original on July 31, 2010. Retrieved September 11, 2010.
  174. Leander Kahney (July 26, 2010). "Apple's Official Response To DMCA Jailbreak Exemption: It Voids Your Warranty". Cult Of Mac. Archived from the original on November 23, 2013. Retrieved October 26, 2011.
  175. Tim Wu (October 4, 2007). "The iPhone Freedom Fighters". Technology. Slate. Archived from the original on September 24, 2011. Retrieved October 26, 2011.
  176. "Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for" (PDF). Archived from the original (PDF) on July 10, 2010. Retrieved September 11, 2010.
  177. "Copyright office provides exemption to DMCA". United States Copyright Office. February 12, 2009. Archived from the original on August 6, 2009. Retrieved July 17, 2009.
  178. Declan McCullagh (July 26, 2010). "Feds say mobile-phone jailbreaking is OK". CNET. CBS Interactive. Archived from the original on October 7, 2011. Retrieved October 26, 2011.
  179. Timothy B. Lee (October 25, 2012). "Jailbreaking now legal under DMCA for smartphones, but not tablets". Ars Technica. Condé Nast. Archived from the original on October 27, 2012. Retrieved October 26, 2012.
  180. "New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past". Android Police. 2012-10-27. Archived from the original on October 30, 2012. Retrieved October 31, 2012.
  181. Statt, Nick (2015-10-27). "US government says it's now okay to jailbreak your tablet and smart TV". The Verge. Retrieved 2020-08-14.
  182. "Submit Your App/Tweak". BigBoss. Retrieved 2021-01-15.
  183. Freeman, Jay. "Repositories · Cydia". cydia.saurik.com. Retrieved 2021-01-15.
  184. "iPhone News & Review". Sleepers Repository / BigBoss. 2008-04-03. Archived from the original on 2008-04-03. Retrieved 2021-01-15.
  185. "SBSettings · Cydia". cydia.saurik.com. Retrieved 2021-01-15.
  186. "BigBoss is prepared for 3.0". 2009-05-21. Retrieved 2021-01-15.
  187. "BossPaper · Cydia". cydia.saurik.com. Retrieved 2021-01-15.
  188. "Site Move". BigBoss. 2008-10-18. Retrieved 2021-01-15.
  189. "Cydia Store Alive". BigBoss. 2009-03-08. Retrieved 2021-01-15.
  190. Page, Sébastien (2014-07-18). "BigBoss repo allegedly hacked [updated]". iDownloadBlog.com. Retrieved 2021-01-19.
  191. "Two Major Cydia Repositories Shut Down as Jailbreaking Fades in Popularity". MacRumors. 23 November 2017. Retrieved 2021-01-19.
  192. Cao, Peter (2018-12-15). "Purchases in the Cydia Store, available for jailbroken devices, no longer supported". 9to5Mac. Retrieved 2021-01-15.
  193. Brigid Andersen (November 9, 2009). "Australian admits creating first iPhone virus". ABC Online. Archived from the original on December 2, 2011. Retrieved October 26, 2011.
  194. "New iPhone worm can act like botnet say experts". BBC News. November 23, 2009. Archived from the original on January 12, 2010. Retrieved April 10, 2010.
  195. Mikko (November 22, 2009). "Malicious iPhone Worm". News from the Lab. F-secure. Archived from the original on November 25, 2009. Retrieved April 10, 2010.
  196. Gruber, John. "PDF security exploit". Daring Fireball. Archived from the original on 10 September 2015. Retrieved 15 August 2015.
  197. Adrian Kingsley-Hughes (May 28, 2011). "'Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered". Tech. Forbes. Archived from the original on November 11, 2012. Retrieved November 14, 2012.
  198. Sharon Vaknin (June 27, 2012). "How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal". CNET. CBS Interactive. Archived from the original on November 17, 2012. Retrieved November 14, 2012.
  199. Christopher Breen (December 29, 2008). "The Best IPhone Apps Not in the App Store". PCWorld. IDG. Archived from the original on October 17, 2012. Retrieved November 14, 2012.
  200. Greenberg, Andy (February 14, 2012). "Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones". Tech. Forbes. Archived from the original on February 14, 2012. Retrieved February 15, 2012.
  201. Joseph Steinberg (August 31, 2015). "Massive iPhone User Data Breach: What You Need to Know". Inc. Archived from the original on September 2, 2015. Retrieved September 2, 2015.
  202. Wagenseil, Paul (2019-10-16). "iPhone Jailbreak Scam Puts Ads on Your Phone". Tom's Guide. Archived from the original on 2019-11-09. Retrieved 2019-11-09.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.