Jump to content

IOS jailbreaking: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Original
Tags: Mobile edit Mobile web edit
KMaster888 (talk | contribs)
limera1n: subjective
 
(999 intermediate revisions by more than 100 users not shown)
Line 1: Line 1:
{{short description|Removal of limitations from Apple's iOS devices}}
== Definition ==
{{Use mdy dates|date=January 2024}}
[[Privilege escalation|Jailbreaking]] in general means breaking the device out of its "jail",<ref name="pcworld-jailbreaking">{{cite web |url=http://www.pcworld.com/article/249091/geek_101_what_is_jailbreaking.html |title=Geek 101: What Is Jailbreaking? |author=Mike Keller |date= February 13, 2012 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=February 15, 2012}}</ref> a metaphor used in [[Unix-like]] systems, for example in "[[FreeBSD jail]]". A jailbroken [[iPhone]], [[iPod Touch]], or [[iPad]] running iOS can still use the App Store, [[iTunes]], and other normal functions, such as making telephone calls.<ref name="Jailbreak iPhone, iPad, iPod touch, and Apple TV">{{cite web|url=http://www.idownloadblog.com/jailbreak/|title=Jailbreak iPhone, iPad, iPod touch, and Apple TV|accessdate=March 31, 2015}}</ref> Furthermore, a jailbroken device can be reverted to a standard 'jailed' device by restoring the device in Recovery Mode, although any incompatible software installed while jailbroken will be deleted.
{{Distinguish|Bootloader unlocking|SIM unlocking|Rooting (Android)}}


{{lowercase title}}'''iOS jailbreaking''' is the use of a [[privilege escalation]] [[Exploit (computer security)|exploit]] to remove software restrictions imposed by [[Apple, Inc.|Apple]] on devices running [[iOS]] and iOS-based{{Efn|Such as [[tvOS]] (since the 2nd generation), [[watchOS]] or [[iPadOS]].}} operating systems. It is typically done through a series of [[Kernel (operating system)|kernel]] [[Patch (computing)|patches]]. A jailbroken device typically permits [[Superuser|root access]] within the operating system and provides the right to install software unavailable through the [[App Store (Apple)|App Store]]. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the [[end-user license agreement]] and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.<ref>{{Cite web|url=https://support.apple.com/en-gb/HT201954|title=Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues|website=Apple Support|language=en|access-date=March 12, 2019|archive-url=https://web.archive.org/web/20190403104456/https://support.apple.com/en-gb/HT201954|archive-date=April 3, 2019|url-status=live}}</ref>
Jailbreaking is a form of [[privilege escalation]],<ref>{{cite book |others= Miller, Charlie; Blazakis, Dion; DaiZovi, Dino; Esser, Stefan; Iozzo, Vincenzo; Weinmann, Ralf-Philip |title= iOS Hacker's Handbook |url= https://books.google.com/books?id=M7DVvMx0b6kC |accessdate= January 18, 2013 |year= 2012 |publisher= John Wiley & Sons |location= |isbn= 978-1-118-22843-2 |page= |pages= 309–310 }}</ref><ref>{{cite journal |last1= Höbarth |first1= S. |last2= Mayrhofer |first2= R. |year= |title= A framework for on-device privilege escalation exploit execution on Android |journal= Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2011 |volume= |issue= |pages= |publisher= mayrhofer.eu.org|doi= |url= http://www.mayrhofer.eu.org/downloads/publications/IWSSI2011-Android-Exploit-Framework.pdf |accessdate=January 18, 2013}}</ref> and describes privilege escalation on devices by other manufacturers as well.<ref>{{cite web |url= http://www.pcworld.com/article/153387/article.html |title= A Jailbreak for Google's Android |author= Robert McMillan |date= November 5, 2008 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=January 18, 2013}}</ref><ref>{{cite web |url= https://www.wired.com/threatlevel/2011/04/sony-settles-ps3-lawsuit/ |title= Sony Settles PlayStation Hacking Lawsuit |author= David Kravets |date= April 11, 2011 |work= Threat Level |publisher= Wired |accessdate=January 18, 2013}}</ref>


While sometimes compared to [[Rooting (Android)|rooting]] an [[Android (operating system)|Android device]], jailbreaking bypasses several types of Apple prohibitions for the end-user. Since it includes modifying the operating system (enforced by a "locked [[bootloader]]"), installing non-officially approved (not available on the App Store) applications via [[sideloading]], and granting the user elevated administration-level privileges (rooting), the concepts of iOS jailbreaking are therefore technically different from Android device rooting.
== Motivations ==

One of the reasons for jailbreaking is to expand the feature set limited by Apple and its App Store.<ref name="ars">{{cite web |url= https://arstechnica.com/apple/news/2010/12/iphone-jailbreaker-set-to-bring-cydia-to-mac-os-x.ars |title= iPhone jailbreaker set to bring Cydia to Mac OS X |author= Chris Foresman |date= December 13, 2010 | work=[[Ars Technica]] | publisher=[[Condé Nast]] |accessdate=August 2, 2011}}</ref> Apple checks apps for compliance with its iOS Developer Program License Agreement before accepting them for distribution in the App Store. However, their reasons for banning apps are not limited to safety and security and may be regarded as arbitrary and capricious.<ref>{{cite web|url=http://www.businessinsider.com/the-story-of-apples-confusing-inconsistent-rules-for-app-developers-2013-4|title=Frustration Builds With Apple's Inconsistent Rules For App Developers|author=Steve Kovach|date=13 April 2013|work=Business Insider}}</ref> In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that "contain content that ridicules public figures."<ref>{{cite news |url= https://www.wired.com/epicenter/2010/04/apple-bans-satire/ |title= Apple App Store Bans Pulitzer-Winning Satirist for Satire |author= Ryan Singel |date= April 15, 2010 |accessdate= February 12, 2011 |work=Wired}}</ref> To access banned apps,<ref>{{cite web|url=http://www.imore.com/tag/rejected-apps|title=Rejected Apps|work=imore.com|accessdate=2017-02-19}}</ref> users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,<ref>{{cite web|url=http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/|title=Jailbreak! New Rules Allow Unapproved iPhone Apps|work=Fox News}}</ref> such as user interface customization and tweaks.
== Motivation ==
Expanding the feature set that Apple and its App Store have restricted is one of the motivations for jailbreaking.<ref name="ars">{{cite web |url= https://arstechnica.com/apple/news/2010/12/iphone-jailbreaker-set-to-bring-cydia-to-mac-os-x.ars |title= iPhone jailbreaker set to bring Cydia to Mac OS X |author= Chris Foresman |date= December 13, 2010 |work= [[Ars Technica]] |publisher= [[Condé Nast]] |access-date= August 2, 2011 |archive-url= https://web.archive.org/web/20110821055315/http://arstechnica.com/apple/news/2010/12/iphone-jailbreaker-set-to-bring-cydia-to-mac-os-x.ars |archive-date= August 21, 2011 |url-status= live }}</ref> Apple checks apps for compliance with its iOS Developer Program License Agreement<ref>{{Cite web |title=Agreements and Guidelines - Support - Apple Developer |url=https://developer.apple.com/support/terms/ |access-date=February 9, 2023 |website=developer.apple.com |archive-date=February 8, 2023 |archive-url=https://web.archive.org/web/20230208175748/https://developer.apple.com/support/terms/ |url-status=live }}</ref> before accepting them for distribution in the App Store. However, the reasons for Apple to ban apps are not limited to safety and security and may be regarded as arbitrary and capricious.<ref>{{cite web|url=http://www.businessinsider.com/the-story-of-apples-confusing-inconsistent-rules-for-app-developers-2013-4|title=Frustration Builds With Apple's Inconsistent Rules For App Developers|author=Steve Kovach|date=April 13, 2013|work=Business Insider|access-date=August 23, 2013|archive-url=https://web.archive.org/web/20130806150420/http://www.businessinsider.com/the-story-of-apples-confusing-inconsistent-rules-for-app-developers-2013-4|archive-date=August 6, 2013|url-status=live}}</ref> In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that "contain content that ridicules public figures."<ref>{{cite magazine |url= https://www.wired.com/epicenter/2010/04/apple-bans-satire/ |title= Apple App Store Bans Pulitzer-Winning Satirist for Satire |author= Ryan Singel |date= April 15, 2010 |access-date= February 12, 2011 |magazine= Wired |archive-url= https://web.archive.org/web/20110326050817/http://www.wired.com/epicenter/2010/04/apple-bans-satire/ |archive-date= March 26, 2011 |url-status= live }}</ref> To access banned apps,<ref>{{cite web|url=http://www.imore.com/tag/rejected-apps|title=Rejected Apps|work=imore.com|access-date=February 19, 2017|archive-url=https://web.archive.org/web/20140715085458/http://www.imore.com/tag/rejected-apps|archive-date=July 15, 2014|url-status=dead}}</ref> users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,<ref>{{cite web|url=https://www.foxnews.com/tech/jailbreak-new-rules-allow-unapproved-iphone-apps/|title=Jailbreak! New Rules Allow Unapproved iPhone Apps|work=Fox News|date=March 27, 2015|access-date=December 7, 2012|archive-url=https://web.archive.org/web/20130521151510/http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/|archive-date=May 21, 2013|url-status=live}}</ref> such as user interface customization and tweaks.


=== Device customization ===
=== Device customization ===
Since software programs available through [[Cydia]] are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps (commonly called tweaks).<ref name="lifehacker-dachis">{{cite web |url= http://lifehacker.com/5781437/how-to-get-the-most-out-of-your-jailbroken-ios-device |title= How to Get the Most Out of Your Jailbroken iOS Device |author= Adam Dachis |date= March 14, 2011 | work=[[Lifehacker]] | publisher=[[Gawker Media]] |accessdate=August 2, 2011}}</ref> Users install these programs for purposes including personalization and customization of the interface by tweaks developed by developers and designers,<ref name="lifehacker-dachis" /> adding desired features and fixing annoyances,<ref name="nytimes">{{cite news |title= Unofficial Software Incurs Apple's Wrath |author= Jenna Wortham |url= https://www.nytimes.com/2009/05/13/technology/13jailbreak.html?pagewanted=all |newspaper= The New York Times |date= May 12, 2009 |accessdate=August 2, 2011}}</ref> and making development work on the device easier by providing access to the filesystem and command-line tools.<ref>{{cite book |title= iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain |last= Zdziarski |first= Jonathan |authorlink= |coauthors= |year= 2008 |publisher= |location= |isbn= 9780596554187|page= |pages= 3–4 |url= https://books.google.com/books?id=fkXvibFJrpIC&lpg=PA3&dq=cydia%20-pomonella%20-moth&pg=PA3#v=onepage&q&f=false |accessdate=}}</ref><ref>{{cite book |title= Take control of your iPhone |last= Landau |first= Ted |authorlink= |coauthors= |year= 2009 |publisher= |location= |isbn= 9781933671543|page= 107 |pages= |url= https://books.google.com/books?id=GiOVkVS4XZkC&lpg=PA109&dq=cydia%20iphone&pg=PA107#v=onepage&q&f=false |accessdate=}}</ref>
Software programs that are available through [[APT (Package Manager)|APT]] or [[Installer.app]] (legacy) are not required to adhere to App Store guidelines. Most of them are not typical self-contained apps, but instead are extensions and customizations for iOS or other apps (commonly called tweaks).<ref name="lifehacker-dachis">{{cite web |url= http://lifehacker.com/5781437/how-to-get-the-most-out-of-your-jailbroken-ios-device |title= How to Get the Most Out of Your Jailbroken iOS Device |author= Adam Dachis |date= March 14, 2011 |work= [[Lifehacker]] |publisher= [[Gawker Media]] |access-date= August 2, 2011 |archive-url= https://web.archive.org/web/20151225202409/http://lifehacker.com/5781437/how-to-get-the-most-out-of-your-jailbroken-ios-device |archive-date= December 25, 2015 |url-status= live }}</ref> Users can install these programs for purposes including personalization and customization of the interface using tweaks developed by developers and designers,<ref name="lifehacker-dachis" /> adding desired features such as access to the root file system and fixing annoyances,<ref name="nytimes">{{cite news |title= Unofficial Software Incurs Apple's Wrath |author= Jenna Wortham |url= https://www.nytimes.com/2009/05/13/technology/13jailbreak.html?pagewanted=all |newspaper= The New York Times |date= May 12, 2009 |access-date= August 2, 2011 |archive-url= https://web.archive.org/web/20131222134328/http://www.nytimes.com/2009/05/13/technology/13jailbreak.html?pagewanted=all |archive-date= December 22, 2013 |url-status= live }}</ref> and making development work on the device easier by providing access to the file system and command-line tools.<ref>{{cite book |title= iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain |last= Zdziarski |first= Jonathan |year= 2008 |isbn= 9780596554187 |pages= 3–4 |publisher= "O'Reilly Media, Inc." |url= https://books.google.com/books?id=fkXvibFJrpIC&q=cydia%20-pomonella%20-moth&pg=PA3 |archive-url= https://web.archive.org/web/20170219105305/https://books.google.com/books?id=fkXvibFJrpIC&lpg=PA3&dq=cydia%20-pomonella%20-moth&pg=PA3 |archive-date= February 19, 2017 |url-status= live }}</ref><ref>{{cite book |title= Take control of your iPhone |last= Landau |first= Ted |year= 2009 |isbn= 9781933671543 |page= 107 |publisher= TidBITS Publishing, Incorporated |url= https://books.google.com/books?id=GiOVkVS4XZkC&q=cydia%20iphone&pg=PA107 |archive-url= https://web.archive.org/web/20170219203841/https://books.google.com/books?id=GiOVkVS4XZkC&lpg=PA109&dq=cydia%20iphone&pg=PA107 |archive-date= February 19, 2017 |url-status= live }}</ref> Many Chinese iOS device owners also jailbreak their phones to install third-party [[Chinese input methods for computers|Chinese]] character [[input method|input systems]] because they are easier to use than Apple's.<ref>{{cite magazine |url= http://blogs.hbr.org/cs/2012/05/apple_discovers_a_new_market_i.html |title= Apple Discovers a New Market in China: Rich Boyfriends |author= Nathan T. Washburn |date= May 4, 2012 |magazine= HBR Blog Network |publisher= Harvard Business Review |access-date= January 9, 2013 |archive-url= https://web.archive.org/web/20121109111223/http://blogs.hbr.org/cs/2012/05/apple_discovers_a_new_market_i.html |archive-date= November 9, 2012 |url-status= live }}</ref>

Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character [[input method|input systems]] because they are easier to use than Apple's.<ref>{{cite web |url= http://blogs.hbr.org/cs/2012/05/apple_discovers_a_new_market_i.html |title= Apple Discovers a New Market in China: Rich Boyfriends |author= Nathan T. Washburn |date= May 4, 2012 |work= HBR Blog Network |publisher= Harvard Business Review |accessdate=January 9, 2013}}</ref>

=== Use of handset on multiple carriers ===
Jailbreaking also opens the possibility for using software to unofficially unlock [[SIM lock|carrier-locked]] iPhones so they can be used with other carriers.<ref>{{cite web |url= https://www.wired.com/gadgetlab/2009/08/reasons-to-jailbreak/ |title= 6 Reasons to Jailbreak Your iPhone |author= Brian X. Chen |date= August 7, 2009 |work= Gadget Lab |publisher= Wired |accessdate=May 1, 2012}}</ref> Software-based unlocks have been available since September 2007,<ref>{{cite web |url= https://www.engadget.com/2007/09/11/iunlock-released-the-first-free-open-source-iphone-sim-unlock/ |title= iUnlock released: the first free, open source iPhone SIM unlock software |author= Ryan Block |date= September 11, 2007 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=February 1, 2014}}</ref> with each tool applying to a specific iPhone model and [[Baseband processor|baseband]] version (or multiple models and versions).<ref>{{cite web |url= http://www.pcworld.com/article/155873/3g_iphone_unlock_expected.html |title= 3G iPhone Unlock Expected |author= Ian Paul |date= December 22, 2008 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=May 1, 2012}}</ref> This includes the [[iPhone 4S]], [[iPhone 4]], [[iPhone 3GS]], and [[iPhone 3G]] models.

An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to Install Cydia and iPad baseband as well.

=== Installation of malware ===
Computer criminals may jailbreak an iPhone to install malware, or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company [[Hacking Team]], which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.<ref name="Hacking Team hack reveals why you shouldn't jailbreak your iPhone">{{cite web|last1=Fleishman|first1=Glen|title=Hacking Team hack reveals why you shouldn't jailbreak your iPhone|url=http://www.macworld.com/article/2944712/hacking-team-hack-reveals-why-you-shouldnt-jailbreak-your-iphone.html|website=MacWorld|accessdate=2 August 2015}}</ref><ref>{{cite web|last1=Heath|first1=Alex|title=New Jailbreak App Stalks All Of Your iPhone's Activity And Makes It Available Online|url=http://www.cultofmac.com/131805/new-jailbreak-app-stalks-all-of-your-iphones-activity-and-makes-it-available-online/|website=Cult of Mac|accessdate=2 August 2015}}</ref>

=== Software piracy ===
On iPhones, the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking, therefore, allows the installation of pirated applications.<ref>{{cite web|last1=Hattersley|first1=Lou|title=Now pirated iOS apps can be installed without jailbreak|url=http://www.macworld.co.uk/news/apple/now-pirated-ios-apps-can-be-installed-without-jailbreak-3418110/|website=Macworld|accessdate=2 August 2015}}</ref> It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.<ref>{{cite web|last1=Kazmucha|first1=Allyson|title=Jailbreak, app piracy, and the true cost of theft|url=http://www.imore.com/jailbreak-app-piracy-cost-theft|website=iMore|accessdate=2 August 2015}}</ref> However, the installation of pirated applications is also possible without jailbreaking.{{citation needed|date=December 2016}}

== Types of jailbreaks ==
[[File:ScreenshotofCydia.jpg|alt=Screenshot of Cydia|thumb|[[Cydia]], a popular package manager installed on jailbroken devices]]
When a device is booting, it loads Apple's own [[Kernel (operating system)|kernel]] initially.

The device must then be [[Exploit (computer security)|exploited]] and have the kernel [[Patch (computing)|patched]] each time it is turned on.

An '''"untethered" jailbreak''' has the property that if the user turns the device off and back on, the device will start up completely, and the kernel will be patched without the help of a computer – thus enabling the user to boot without the need to use a computer.<ref name="iphone4s-engadget" /> These jailbreaks are harder to make and take a lot of reverse engineering and years of experience.

With a '''"tethered" jailbreak''', a computer is needed to turn the device on each time it is rebooted. If the device starts back up on its own, it will no longer have a patched kernel, and it may get stuck in a partially started state. By using a computer, the phone is essentially "re-jailbroken" (using the "boot tethered" feature of a jailbreaking tool) each time it is turned on.<ref name="iphone4s-readwriteweb" /> With a tethered jailbreak, the user can still restart [[SpringBoard]] ("respring") on the device without needing to reboot.

There is also '''"semi-tethered"''' solution, which means that when the device boots, it will no longer have a patched kernel (so it will not be able to run modified code), but it will still be usable for normal functions such as making phone calls, or texting.<ref name="pcworld-semitether">{{cite web|last=Fish |first=Elizabeth |url=http://www.pcworld.com/article/242469/semitethered_ios_5_jailbreak_developed_useful_on_the_move.html |title=Semi-tethered iOS 5 Jailbreak Developed, Useful On The Move |work=[[PCWorld]] |publisher=[[IDG]] |date=October 24, 2011 |accessdate=April 22, 2012}}</ref> To use any features that require running modified code, the user must start the device with the help of the jailbreaking tool in order for it to start with a patched kernel (jailbroken).

In July 2016, Pangu team introduced the '''"semi-untethered" jailbreak''', which functions like a semi-tethered solution in that when the device boots, it no longer has a patched kernel (and thus access to jailbroken functions,) but also like an untethered device, in that a computer is not required to re-patch the kernel in order to re-enable the jailbreak. It is accomplished by installing an app that re-patches the kernel after rebooting.

=== Comparison to Android rooting ===

Jailbreaking of iOS devices has sometimes been compared to "[[Rooting (Android OS)|rooting]]" of [[Android (operating system)|Android]] devices. Although both concepts involve privilege escalation, they differ in scope. Some Android devices allow users to modify or replace the operating system after unlocking the [[bootloader]].<ref>{{cite web|url=http://www.htcdev.com/bootloader|title=HTC Bootloader Unlock Instructions|website=htcdev.com|accessdate=26 October 2014}}</ref><ref>{{cite web|url=http://unlockbootloader.sonymobile.com#Sony|title=Official Bootloader Unlock instructions|website=sonymobile.com}}</ref><ref>{{cite web|url=http://source.android.com/source/building-devices.html |archive-url=https://web.archive.org/web/20110521220428/http://source.android.com/source/building-devices.html |dead-url=yes |archive-date=May 21, 2011 |title=#unlocking-the-bootloader Google instructions on bootloader unlocking |website=source.android.com |accessdate=26 October 2014 |df=mdy-all }}</ref> Moreover, nearly all Android phones have an option to allow the user to install unknown, 3rd-party apps, so no exploit is needed for normal [[sideloading]].<ref>{{cite web|url=http://www.androidcentral.com/what-sideloading-android-z|title=Android A to Z: What is sideloading?|date=2 Feb 2012|website=Android Central|last1=Hildenbrand|first1=Jerry|accessdate=9 July 2014}}</ref>

iOS is engineered with security measures including a "locked bootloader" to prevent users from modifying the operating system, and to prevent apps from gaining root privileges; jailbreaking an iOS device to defeat all security measures presents a significant technical challenge. It violates Apple's end-user license agreement for iOS.<ref>{{cite web|url=http://support.apple.com/kb/ht3743|title=Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues|website=Apple Support|quote=[U]nauthorized modification of iOS is a violation of the iOS end-user software license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software.|accessdate=9 July 2014}}</ref> Until 2015 sideloading apps in general was difficult for most individual users, requiring them to purchase developer membership, while corporations could install private applications onto corporate phones.<ref>{{cite web|url=https://9to5mac.com/2015/06/10/xcode-7-allows-anyone-to-download-build-and-sideload-ios-apps-for-free/|title=Xcode 7 allows anyone to download, build and ‘sideload’ iOS apps for free|first=Benjamin|last=Mayo|date=10 June 2015|publisher=}}</ref> After 2015, this became free for all users, however doing so requires a basic understanding of Xcode and compiling iOS Apps. Apps installed this way have the restrictions of all other apps.

== Security, privacy, and stability ==
The first [[iPhone]] [[Computer worm|worm]], iKee, appeared in early November 2009, created by a 21-year-old [[Australia]]n student in the town of [[Wollongong, New South Wales|Wollongong]]. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an [[Secure Shell|SSH]] service, which those users can leave in the default insecure state.<ref>{{cite news |title= Australian admits creating first iPhone virus |author= Brigid Andersen |url= http://www.abc.net.au/news/2009-11-09/australian-admits-creating-first-iphone-virus/1135474 |newspaper= [[ABC Online]] |date= November 9, 2009 |accessdate=October 26, 2011}}</ref> In the same month, [[F-Secure]] reported on a new malicious worm compromising bank transactions from jailbroken phones in the [[Netherlands]], similarly affecting devices where the owner had installed SSH without changing the default password.<ref>{{Cite news|url=http://news.bbc.co.uk/2/hi/technology/8373739.stm |title=New iPhone worm can act like botnet say experts |publisher=BBC News |date=November 23, 2009 |accessdate=April 10, 2010}}</ref><ref>{{cite web|url=http://www.f-secure.com/weblog/archives/00001822.html |title=Malicious iPhone Worm |work= News from the Lab |publisher=F-secure |author= Mikko |date=November 22, 2009 |accessdate=April 10, 2010}}</ref>
In 2010 blogger [[John Gruber]], who is close to Apple, said that users misunderstood some jailbreak exploits and that they were more serious than they appear. He commented that "it's odd how the press is mostly covering this as 'jailbreaking now more convenient' rather than 'remote code exploit now in the wild'", pointing out that the exploit allowed the creator of a malicious website to [[Drive-by download|take control]] of iPhones accessing it.<ref>{{cite web|last1=Gruber| first1=John| title=PDF security exploit|url=http://daringfireball.net/linked/2010/08/02/jailbreakme|website=Daring Fireball|accessdate=15 August 2015}}</ref>

Restoring a device with iTunes can remove a jailbreak.<ref>{{cite web |url= https://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-other-jailbreaking-questions-answered/ |title= 'Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered |author= Adrian Kingsley-Hughes |date= May 28, 2011 |work= Tech |publisher= Forbes |accessdate=November 14, 2012}}</ref><ref>{{cite web |url= http://howto.cnet.com/8301-11310_39-57462343-285/how-to-unjailbreak-your-iphone-ipad-or-ipod-touch/ |title= How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal |author= Sharon Vaknin |date= June 27, 2012 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=November 14, 2012}}</ref><ref>{{cite web |url= http://www.pcworld.com/article/156099/best_iphone_apps.html |title= The Best IPhone Apps Not in the App Store |author= Christopher Breen |date= December 29, 2008 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=November 14, 2012}}</ref>

In 2012, Forbes staff analyzed a UCSB study on 1407 free programs available from Apple and a third party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple's App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones.<ref name="forbes-leak" /> Also, a program available in Cydia called PrivaCy allows user to control the upload of usage statistics to remote servers.<ref name="forbes-leak">{{cite news |url=https://www.forbes.com/sites/andygreenberg/2012/02/14/unauthorized-iphone-and-ipad-apps-leak-private-data-less-often-than-approved-ones/ |title=Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones |last=Greenberg |first=Andy |work=Tech |publisher=Forbes |date=February 14, 2012 |accessdate=February 15, 2012}}</ref>

Installing software published outside the [[App Store (iOS)|App Store]] has the potential to affect [[Battery (electricity)|battery]] life and system stability if the software is poorly optimized or frequently uses resource-draining services (such as [[3G]] or [[Wi-Fi]]).<ref>{{cite web |url= http://www.businessinsider.com/reasons-not-to-jailbreak-iphone-2011-5 |title= The Truth About Jailbreaking Your iPhone: The 5 Biggest Drawbacks |author= Ellis Hamburger |date= May 3, 2011 |work=Business Insider |accessdate=October 26, 2011 }}</ref><ref>{{cite web |url= http://lifehacker.com/5799007/why-you-should-not-jailbreak-your-iphone-ipod-touch-or-ipad |title= Four Reasons Not to Jailbreak Your iPhone, iPod touch, or iPad |author= Adam Dachis |date= May 5, 2011 | work=[[Lifehacker]] | publisher=[[Gawker Media]] |accessdate=October 26, 2011 }}</ref><ref>{{cite web |url= http://www.pcworld.com/article/202441/5_reasons_to_jailbreak_your_iphone_and_5_reasons_not.html |title= 5 Reasons to Jailbreak Your iPhone – and 5 Reasons Not |author= Brennon Slattery |date= August 3, 2010 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 26, 2011 }}</ref> However, even apps from the App Store are known to cause battery issues while running in the background.<ref>{{cite web |url= https://www.macstories.net/linked/the-background-data-and-battery-usage-of-facebooks-ios-app/ |title= The Background Data and Battery Usage of Facebook's iOS App |publisher=MacStories |accessdate=January 6, 2016}}</ref>

In August 2015 the [[KeyRaider]] malware was discovered that affects only jailbroken iPhones.<ref>{{cite news| url=http://www.inc.com/joseph-steinberg/massive-iphone-user-data-breach-what-you-need-to-know.html |work=Inc. | title=Massive iPhone User Data Breach: What You Need to Know | date=August 31, 2015 | accessdate=September 2, 2015 |author=Joseph Steinberg |authorlink=Joseph Steinberg}}</ref>

== History of exploit-disabling patch releases ==

Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original [[evasi0n]] iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Bootrom exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates, but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.<ref>{{cite web|title = Apple adds jailbreak resistance to recent iPhone 3GS models|url = https://arstechnica.com/apple/2009/10/apple-adds-jailbreak-resistance-to-recent-iphone-3gs-models/|accessdate = 2015-06-20}}</ref>

On July 15, 2011, Apple released a new iOS version that closed the exploit used in [[JailbreakMe]] 3.0. The German [[Federal Office for Information Security]] had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or unwillingly downloaded [[malware]] by iOS users clicking on maliciously crafted [[PDF]] files.<ref>{{cite news|url=http://www.news-record.com/content/2011/07/08/article/security_holes_discovered_in_iphones_ipads|title=Security holes discovered in iPhones, iPads|last=Robertson|first=Jordan|work=[[News & Record]]|agency=[[Associated Press]]|date=July 8, 2011|accessdate=July 9, 2011|deadurl=yes|archiveurl=https://web.archive.org/web/20110711154914/http://www.news-record.com/content/2011/07/08/article/security_holes_discovered_in_iphones_ipads|archivedate=July 11, 2011|df=mdy-all}}</ref> Before Apple released a fix for this security hole, jailbreak users had access to a fix published by the developer of JailbreakMe.{{citation needed|date=December 2015}}

On January 27, 2015, Apple released [[iOS]] 8.1.3 that patched up the exploits used in jailbreak for [[iOS]] 8.0-8.1.2. It was not possible to jailbreak until the iOS 8.3 update. The iOS 9.1 update on October 21, 2015, included a patch for the Pangu iOS 9.0-9.0.2 Jailbreak.<ref name=":0" />

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.<ref>{{cite web|url=http://www.mobileswire.com/ios-8-4-1-jailbreak-status-updated/|title=Taig and Pangu working on Jailbreak for IOS 8.4.1 |archive-url=https://web.archive.org/web/20150923060032/http://www.mobileswire.com/ios-8-4-1-jailbreak-status-updated/ |archive-date=23 September 2015}}</ref>

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.<ref>{{cite web|url=http://ioshacker.com/news/ios-9s-rootless-security-system-dubbed-as-a-heavy-blow-to-jailbreak-community|title=iOS 9's Rootless security system dubbed as a ‘heavy blow’ to jailbreak community|accessdate=10 October 2015}}</ref>

On October 21, 2015, seven days after the Pangu iOS 9.0-9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.<ref name=":0">{{cite web|title = Apple's iOS 9.1 Shuts Down The Pangu Hacking Team's Jailbreak|url = https://techcrunch.com/2015/10/21/apples-ios-9-1-shuts-down-the-pangu-hacking-teams-jailbreak/|website = TechCrunch|accessdate = 2015-11-11|first = Sarah|last = Perez}}</ref>

On August 4, 2016, Apple released iOS version 9.3.4 to patch the semi-untethered jailbreak for 64-bit devices.

On August 25, 2016, Apple released iOS version 9.3.5 to patch three important vulnerabilities used for the secret jailbreak from the Pegasus Malware from the NSO Group.

On January 23, 2017, Apple released iOS 10.2.1 to patch jailbreak exploits released by Google for the Yalu iOS 10 jailbreak created by Luca Todesco.<ref>{{Cite news|url=https://support.apple.com/en-gb/HT207482|title=About the security content of iOS 10.2.1|work=Apple Support|access-date=2017-03-19|language=en-GB}}</ref>

On December 2, 2017, iOS 11.2 was released, and included a patch to the async_wake exploit by Ian Beer.

== Legal status ==
The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting [[digital rights management]] (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.

International treaties have influenced the development of laws affecting jailbreaking. The 1996 [[World Intellectual Property Organization Copyright Treaty|World Intellectual Property Organization (WIPO) Copyright Treaty]] requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the [[Digital Millennium Copyright Act]] (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 [[Copyright Directive|European Copyright Directive]] implemented the treaty in Europe, requiring member states of the [[European Union]] to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software,<ref name="Duncan Geere">{{cite web |author= Duncan Geere |url=https://www.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-iphone |title=Investigation: Is it legal to jailbreak a UK iPhone? |publisher= Wired UK |date=July 28, 2010 |accessdate=October 26, 2012}}</ref> but member states vary on the implementation of the directive.

While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one.<ref>{{cite web|last1=Greenberg|first1=Andy|title=iPhone Uber-Hacker Comex Is Out At Apple|url=https://www.forbes.com/sites/andygreenberg/2012/10/18/iphone-uber-hacker-comex-is-out-at-apple/|website=Forbes|accessdate=15 August 2015}}</ref><ref name="After Doing Insane Things With iOS, Jailbreak Hacker Winocm Joins Apple">{{cite web|last1=Heath|first1=Alex|title=After Doing "Insane Things With iOS," Jailbreak Hacker Winocm Joins Apple|url=http://www.cultofmac.com/267419/ios-jailbreak-hacker-winocm-joining-apple-later-year/|website=Cult of Mac|accessdate=22 November 2015}}</ref> Apple has also regularly (though possibly somewhat jokingly) thanked jailbreak communities for detecting security holes in iOS release notes.<ref name="8.4.1 release notes">{{cite web|title=8.4.1 release notes|url=https://support.apple.com/en-gb/HT205030|publisher=Apple|accessdate=15 August 2015}}</ref>

Apple's support article concerning jailbreaking claims that they "may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software."<ref>{{Cite news|url=https://support.apple.com/en-us/HT201954|title=Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues|newspaper=Apple Support|access-date=2017-02-14|language=en-US}}</ref> Therefore, anyone who is jailbroken, warranty or not, may or may not get support from Apple considering assistance with jailbreaking.

=== Australia ===
In 2010, [[Electronic Frontiers Australia]] said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply.<ref>{{cite web |url= http://www.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-jail.aspx |title= Could jailbreaking your iPhone land you in jail? |author= Rosalyn Page |date= August 5, 2010 |publisher= PC & Tech Authority |accessdate=January 21, 2013}}</ref> These laws had been strengthened by the [[Copyright law of Australia#Copyright Amendment Act 2006|Copyright Amendment Act 2006]].

=== Canada ===
In November 2012, Canada [[Copyright law of Canada#Reform (1988–2012)|amended its Copyright Act]] with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.<ref>{{cite web |url= http://www.michaelgeist.ca/content/view/6692/125/ |title= Canadian Copyright Reform In Force: Expanded User Rights Now the Law |author= [[Michael Geist]] |date= November 7, 2012 |publisher= michaelgeist.ca |accessdate=November 13, 2012}}</ref> Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, [[Bill C-61 (39th Canadian Parliament, 2nd Session)|Bill C-61]], and [[Bill C-32 (40th Canadian Parliament, 3rd Session)|Bill C-32]]) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,<ref>{{cite web |url=https://www.eff.org/deeplinks/2012/02/canadas-c-11-bill-and-hazards-digital-locks-provisions |title=Canada's C-11 Bill and the Hazards of Digital Locks Provisions |publisher=Electronic Frontier Foundation |date=February 10, 2012 |accessdate=October 17, 2012}}</ref> but those bills were set aside. In 2011, [[Michael Geist]], a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.<ref>{{cite news |author= The Canadian Press |url= http://www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-1.707707 |title= Phone 'jailbreaking' allows users to hack their phone |publisher= CTV News |date=October 13, 2011 |accessdate=October 17, 2012}}</ref>

=== India ===
[[Copyright law of India|India's copyright law]] permits circumventing DRM for non-copyright-infringing purposes.<ref name="copyright-india">{{cite web |url= http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012/tpm-copyright-amendment |title= Technological Protection Measures in the Copyright (Amendment) Bill, 2010 |author= Pranesh Prakash |date= April 29, 2010 |publisher= [[Centre for Internet and Society (India)|Centre for Internet and Society]] |accessdate=November 10, 2012}}</ref><ref name="copyright-india-ars">{{cite web |url= https://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad/ |title= India's copyright proposals are un-American (and that's bad) |author= Nate Anderson |date= April 22, 2010 | work=[[Ars Technica]] | publisher=[[Condé Nast]] |accessdate=November 10, 2012}}</ref> Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.<ref>{{cite web |url= http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012 |title= Analysis of the Copyright (Amendment) Bill 2012 |author= Pranesh Prakash |date= May 23, 2012 |publisher= [[Centre for Internet and Society (India)|Centre for Internet and Society]] |accessdate=November 10, 2012}}</ref> India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US [[Special 301 Report]] "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.<ref name="copyright-india" /><ref name="copyright-india-ars" />

=== New Zealand ===
[[Copyright law of New Zealand|New Zealand's copyright law]] allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.<ref>{{cite web |author= [[Michael Geist]] |url=http://www.michaelgeist.ca/content/view/2829/125/ |title=New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility |publisher= Michael Geist |date=April 10, 2008 |accessdate=October 26, 2012}}</ref><ref>{{cite news|author=Stephen Bell |url=http://computerworld.co.nz/news.nsf/news/law-changes-required-before-nz-ratifies-acta |archive-url=https://web.archive.org/web/20110930234801/http://computerworld.co.nz/news.nsf/news/law-changes-required-before-nz-ratifies-acta |dead-url=yes |archive-date=September 30, 2011 |title=Law changes required before NZ ratifies ACTA |publisher=ComputerWorld New Zealand |date=September 30, 2011 |accessdate=October 26, 2012 |df=mdy-all }}</ref> This law was added to the [[Copyright Act 1994]] as part of the [[Copyright (New Technologies) Amendment Act 2008]].

=== Singapore ===
Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.<ref>{{cite web|url=http://www.digitalone.com.sg/news/article/12884 |archive-url=https://web.archive.org/web/20100815122823/http://www.digitalone.com.sg/news/article/12884 |dead-url=yes |archive-date=August 15, 2010 |title=iPhone jailbreak may be legal here, but... But there will be certain legal provisions. |author=Kenny Chee |date=August 12, 2010 |work=DigitalOne |publisher=[[AsiaOne]] |accessdate=November 10, 2012 |df=mdy-all }}</ref>

=== United Kingdom ===
The law [[Copyright and Related Rights Regulations 2003]] makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court.<ref name="Duncan Geere" /><ref>{{cite web |url= http://www.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-iphone/ |title= How to jailbreak your iPhone: Unleash the full potential of your iPhone |author= Jim Martin |date= March 14, 2012 |publisher= PC Advisor |accessdate=January 21, 2013}}</ref> Competition laws may also be relevant.<ref>{{cite web |url= http://www.electronicsweekly.com/Articles/30/07/2010/49177/iphone-jailbreaking-is-okay-under-eu-law.htm |title= iPhone jailbreaking is 'okay under EU law' |author= Warwick Ashford |date= July 30, 2010 |work= Computer Weekly |publisher= Electronics Weekly |accessdate=January 21, 2013}}</ref>

=== United States ===
The main law that affects the legality of iOS jailbreaking in the United States is the 2012 [[Digital Millennium Copyright Act]] (DMCA), which says "no person shall circumvent a [[digital rights management|technological measure]] that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking.<ref>{{cite web |url= http://www.copyright.gov/fedreg/2012/77fr65260.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |author=Copyright Office, Library of Congress |date=October 2012 |website= |publisher=Federal Register |accessdate=February 3, 2014}}</ref> Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally,<ref>{{cite news |author=David Goldman |url=http://money.cnn.com/2010/07/26/technology/iphone_jailbreaking/ |title= Jailbreaking iPhone apps is now legal |work=CNN Money |date=July 26, 2010 |accessdate=September 11, 2010}}</ref> and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets.<ref>{{cite web|url = https://www.federalregister.gov/articles/2015/10/28/2015-27212/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control#h-17|title = Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies|date = October 28, 2015|accessdate = November 20, 2015|website = Federal Register|publisher = The United States Government|last = |first = }}</ref> It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning.<ref name="otm" /> It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.<ref name="otm">{{cite web |url=http://www.onthemedia.org/transcripts/2010/07/30/03 |archive-url=https://web.archive.org/web/20100731150659/http://www.onthemedia.org/transcripts/2010/07/30/03 |dead-url=yes |archive-date=July 31, 2010 |title=Transcript of "Jailbreak?" (July 30, 2010) |publisher=On The Media |date=July 30, 2010 |accessdate=September 11, 2010}}</ref>

In 2010 Apple announced that jailbreaking "can violate the warranty".<ref name="cult">{{cite web |url=http://www.cultofmac.com/apples-official-response-to-dmca-jailbreak-exemption-it-voids-your-warranty/52463 |title=Apple's Official Response To DMCA Jailbreak Exemption: It Voids Your Warranty |author= Leander Kahney |date= July 26, 2010 |publisher= Cult Of Mac |accessdate= October 26, 2011}}</ref> This may be affected by the [[Magnuson-Moss Warranty Act of 1975]].

==== Digital Millennium Copyright Act exemptions ====
In 2007, [[Tim Wu]], a professor at [[Columbia Law School]], argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."<ref name="slate-wu">{{cite web |url= http://www.slate.com/id/2175304/ |title= The iPhone Freedom Fighters |author= Tim Wu |date= October 4, 2007 |work= Technology |publisher= Slate |accessdate=October 26, 2011 }}</ref> Wu cited an explicit exemption issued by the [[Library of Congress]] in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.<ref>{{cite web |url=http://www.copyright.gov/fedreg/2006/71fr68472.pdf |title=Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for |format=PDF |date= |accessdate=September 11, 2010}}</ref> Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.<ref name="slate-wu" />

In 2010, in response to a request by the [[Electronic Frontier Foundation]], the [[United States Copyright Office|U.S. Copyright Office]] explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.<ref>{{cite web |url=http://www.copyright.gov/1201/ |title=Copyright office provides exemption to DMCA |publisher=[[United States Copyright Office]] |date=February 12, 2009 |accessdate=July 17, 2009}}</ref><ref>{{cite web |url= http://news.cnet.com/8301-13578_3-20011661-38.html |title= Feds say mobile-phone jailbreaking is OK |author= Declan McCullagh |date= July 26, 2010 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=October 26, 2011 }}</ref> [[Apple Inc.|Apple]] had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010 that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.<ref name="U.S. Copyright Office 2013 Ruling">{{cite web |url=http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |publisher=U.S. Copyright Office |accessdate=October 31, 2012}}</ref><ref name="ars-jailbreaking-2012">{{cite web |author= Timothy B. Lee |url=https://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |title=Jailbreaking now legal under DMCA for smartphones, but not tablets | work=[[Ars Technica]] | publisher=[[Condé Nast]] |date=October 25, 2012 |accessdate=October 26, 2012}}</ref><ref name="Android Police">{{cite web |url=http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |title=New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past |publisher=Android Police |accessdate=October 31, 2012}}</ref> The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.<ref name="ars-jailbreaking-2012" />

== History of tools ==
[[File:Jailbreakers.jpg|thumb|Several people (including [[Jay Freeman|saurik]], p0sixninja, and [[George Hotz|geohot]]) who have contributed to building jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at [[DEF CON]].]]
A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it,<ref name="ricker2007">{{cite web|last=Ricker |first=Thomas |url=https://www.engadget.com/2007/07/10/iphone-hackers-we-have-owned-the-filesystem/ |title=iPhone Hackers: "we have owned the filesystem" |publisher=[[Engadget]] |date=July 10, 2007 |accessdate=July 17, 2009}}</ref> and soon a jailbreak-only game app became available.<ref>{{cite web|last=Topolsky |first=Joshua |url=https://www.engadget.com/2007/08/06/first-third-party-game-app-appears-for-iphone/ |title=First third-party "game" app appears for iPhone |publisher=[[Engadget]] |date=August 6, 2007 |accessdate=July 17, 2009}}</ref> In October 2007, [[JailbreakMe]] 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod touch,<ref>{{cite web|last=Wilson |first=Ben |url=http://reviews.cnet.com/8301-19512_7-10115200-233.html |title=Official iPhone 1.1.1 jailbreak released with easy-to-follow instructions; does not require TIFF exploit |work=[[CNET]] |publisher=[[CBS Interactive]] |date=October 10, 2007 |accessdate=November 10, 2009}}</ref><ref>{{cite web |url=http://www.pcworld.com/article/139061/hacker_software_can_install_unauthorized_software_on_iphones.html |title=Hacker Software Can Install Unauthorized Software on iPhones |date=October 29, 2007 |author= Gregg Keizer |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=August 25, 2011}}</ref> and it included [[Installer.app]] as a way to get software for the jailbroken device. In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.<ref>{{cite web|last=Block|first=Ryan|url=https://www.engadget.com/2008/02/12/ziphone-jailbreak-any-version-iphone-out-of-the-box-including/|title=ZiPhone: jailbreak any version iPhone out of the box, including 1.1.3 (by Zibri) |publisher=[[Engadget]]|date=February 12, 2008 |accessdate=November 13, 2013}}</ref>

The [[iPhone Dev Team]] which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of [[PwnageTool]] to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod touch,<ref>{{cite news |url= https://www.wired.com/gadgetlab/2008/07/pwnage-20-relea/ |title= Pwnage 2.0 Released: Gadget Lab Jailbreaks iPod Touch |author= Charlie Sorrel |date= July 21, 2008 |work= Gadget Lab |publisher= Wired |accessdate=November 2, 2011 }}</ref><ref name="iphone3g-pwnage" /> newly including [[Cydia]] as the primary third-party installer for jailbroken software.<ref>{{cite web |url= http://www.tuaw.com/2008/07/20/first-look-pwnage-for-2-0/ |title= First Look: Pwnage for 2.0 |author= Erica Sadun |date= July 20, 2008 |publisher= TUAW |accessdate=November 1, 2011 }}</ref> PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.<ref>{{cite web |url= http://blog.iphone-dev.org/post/5239805497/tic-tac-toe |title= Tic tac toe... |author= Dev Team |date= May 2011 |publisher= Dev Team Blog |accessdate=November 2, 2011 }}</ref><ref name="devteam-redsn0wbeta" />

In November 2008 the iPhone Dev Team released QuickPWN to jailbreak iPhone OS 2.2 on iPhone and iPod touch, with options to enable past functionality that Apple had disabled on certain devices.<ref>{{cite news |url= https://www.wired.com/gadgetlab/2008/11/quickpwn-adds-s/ |title= QuickPWN Adds Street View to iPod Touch |author= Charlie Sorrel |date= November 25, 2008 |work= Gadget Lab |publisher= Wired |accessdate=November 2, 2011 }}</ref>

After Apple released iOS 3.0 in June 2009, the Dev Team published [[redsn0w]] as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac.<ref>{{cite web|url=https://iphonebyte.com/cydia/|title=How to Use Cydia on your iPhone|last=|first=|date=June 23, 2009|website=|publisher=iPhoneByte|access-date=|author=Daniel Pan|accessdate=November 2, 2015}}</ref> It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.<ref name="ios5-redsn0w" />

[[George Hotz]] developed the first iPhone unlock. In 2009, he released a jailbreaking tool for the iPhone 3GS on iPhone OS 3.0 called [[purplera1n]],<ref>{{cite web |url= http://news.cnet.com/8301-17938_105-10279029-1.html |title= iPhone 3GS jailbreak, 'purplera1n,' hits Web |author= Leslie Katz |date= July 3, 2009 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=November 2, 2011 }}</ref> and [[blackra1n]] for iPhone OS version 3.1.2 on the 3rd generation iPod touch and other devices.<ref>{{cite news |url= https://www.wired.com/gadgetlab/2009/11/blackra1n-plus-blacksn0w-unlock-any-iphone-in-seconds |title= BlackRa1n Plus Blacksn0w: Unlock Any iPhone in Seconds |author= Charlie Sorrel |date= November 5, 2009 |work= Gadget Lab |publisher= Wired |accessdate=November 2, 2011 }}</ref>

In October 2010, he released limera1n, a low-level [[boot ROM]] exploit that permanently works to jailbreak the iPhone 4 and is used as part of tools including redsn0w.<ref>{{cite web |url= https://www.engadget.com/2011/06/07/ios-5-jailbroken/ |title= iOS 5 jailbroken |author= Thomas Ricker |date= June 7, 2011 |work=[[Engadget]] |publisher=[[Aol]].com |accessdate=October 26, 2011 }}</ref>

Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010.{{citation needed|date=December 2015}} [[Spirit (iOS jailbreak)|Spirit]] jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iOS 3.2<ref name="spirit-register" /> In August 2010, comex released [[JailbreakMe]] 2.0, the first a web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1).<ref name="jailbreakme-iphone4" /><ref>{{cite web|url=https://www.engadget.com/2010/08/01/official-iphone-4-jailbreak-hits-from-iphone-dev-team/ |title=Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video) |publisher=Engadget |date= August 1, 2010 |author= Sean Hollister |accessdate=September 11, 2010}}</ref>
In July 2011, he released JailbreakMe 3.0,<ref>{{cite news |title=Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple |author=Andy Greenberg |url=https://www.forbes.com/sites/andygreenberg/2011/08/01/meet-comex-the-iphone-uber-hacker-who-keeps-outsmarting-apple/ |work=Forbes |date=August 1, 2011 |accessdate=December 23, 2012}}</ref> a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3).<ref name="jailbreakme-ipad2" />

In 2011, JailbreakMe 3.0 used a flaw in [[Portable Document Format|PDF]] file rendering in mobile [[Safari (web browser)|Safari]].<ref>{{cite web |url= http://labs.eweek.com/archives/apple-fixes-latest-ios-exploit |title= Apple Fixes Latest iOS Exploit |author= P. J. Connolly |date= July 15, 2011 |work= eWEEK Labs |publisher= eWEEK |accessdate=October 23, 2011 }}</ref><ref>{{cite web|url=http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit |archive-url=https://web.archive.org/web/20110722135644/http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit |dead-url=yes |archive-date=July 22, 2011 |title=Analysis of the jailbreakme v3 font exploit |author=jean |date=July 18, 2011 |publisher=Sogeti ESEC Lab |accessdate=October 23, 2011 |df=mdy-all }}</ref>


In some cases, jailbreak features are adopted by Apple and used as inspiration for features that are incorporated into iOS and [[iPadOS]].<ref name="haslam">{{Cite news |last=Haslam |first=Oliver |date=June 10, 2015 |title=9 Jailbreak Tweaks Apple Killed In iOS 9 |work=Redmond Pie |url=https://www.redmondpie.com/9-jailbreak-tweaks-apple-killed-in-ios-9/ |access-date=December 15, 2022 |archive-date=December 15, 2022 |archive-url=https://web.archive.org/web/20221215204816/https://www.redmondpie.com/9-jailbreak-tweaks-apple-killed-in-ios-9/ |url-status=live }}</ref><ref name="manalo">{{Cite news |last=Manalo |first=Amboy |date=November 2, 2018 |title=60 iOS Features Apple Stole from Jailbreakers |work=[[Gadget Hacks]] |url=https://ios.gadgethacks.com/how-to/60-ios-features-apple-stole-from-jailbreakers-0188093/ |access-date=December 15, 2022 |archive-date=December 5, 2022 |archive-url=https://web.archive.org/web/20221205145247/https://ios.gadgethacks.com/how-to/60-ios-features-apple-stole-from-jailbreakers-0188093/ |url-status=live }}</ref>
Chronic Dev Team initially released [[greenpois0n]] in October 2010, a desktop-based tool for jailbreaking iOS 4.1<ref>{{cite web |url= https://www.pcmag.com/article2/0,2817,2370522,00.asp#fbid=d7I6xbRm1XV |title= iPhone Hackers Square Off With Competing iOS 4 Jailbreaks |author= David Murphy |date= October 9, 2010 |publisher= PCMag |accessdate=November 2, 2011 }}</ref> and later iOS 4.2.1<ref>{{cite news |url= https://www.wired.com/gadgetlab/2011/02/untethered-ios-4-2-1-jailbreak-live/ |title= Untethered iOS 4.2.1 Jailbreak Live |author= Charlie Sorrel |date= February 4, 2011 |work= Gadget Lab |publisher= Wired |accessdate=November 2, 2011 }}</ref> on most devices including the Apple TV,<ref>{{cite web |url= http://www.pcworld.com/article/208388/oh_hai_apple_tv_officially_hacked.html |title= Oh Hai! Apple TV Officially Hacked |author= Elizabeth Fish |date= October 20, 2010 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=November 2, 2011 }}</ref> as well as iOS 4.2.6 on CDMA (Verizon) iPhones.<ref>{{cite web |url= http://www.pcworld.com/article/218932/verizon_iphone_now_available_for_jailbreaking.html |title= Verizon iPhone Now Available for Jailbreaking |author= Blair Hanley Frank |date= February 7, 2011 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=November 2, 2011 }}</ref>
{| class="wikitable"

|+Jailbreak features adopted by Apple
As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod touch (3rd and 4th generation).<ref name="devteam-redsn0wbeta" /> As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod touch models that support iOS 5.1.1.<ref>{{cite web |url= https://www.engadget.com/2012/06/04/ultrasn0w-unlock-iphone-4-3gs-ios-5-1-1/ |title= Newest version of ultrasn0w unlocks iPhone 4, 3GS on iOS 5.1.1, RedSn0w 0.9.12b1 also released |author= Edgar Alvarez |date= June 4, 2012 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=June 16, 2012}}</ref>
! colspan="2" |Adopted Feature

! colspan="3" |Jailbreak Tweak
The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release [[Absinthe (software)|Absinthe]] in January 2012, a desktop-based tool to jailbreak the [[iPhone 4S]] for the first time and the [[iPad 2]] for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S.<ref name="iphone4s-engadget" /><ref name="iphone4s-readwriteweb" /><ref name="absinthe-cnet">{{cite web |url= http://news.cnet.com/8301-17938_105-57362965-1/fly-be-free-jailbreak-for-iphone-4s-ipad-2-released/ |title= Fly, be free! Jailbreak for iPhone 4S, iPad 2 released |author= Eric Mack |date= January 20, 2012 |work=[[CNET]] |publisher=[[CBS Interactive]] |accessdate=January 22, 2012 }}</ref><ref name="absinthe-pcworld">{{cite web |url= http://www.pcworld.com/article/248478/how_to_jailbreak_your_iphone_4s_and_ipad_2_via_absinthe_a5.html |title= How to Jailbreak Your iPhone 4S and iPad 2 via Absinthe A5 |author= McKinley Noble |date= January 20, 2012 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=January 22, 2012 }}</ref> In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod touch models that support iOS 5.1.1, including jailbreaking the [[iPad (3rd generation)|third-generation iPad]] for the first time.<ref name="absinthe2-forbes">{{cite web |url= https://www.forbes.com/sites/adriankingsleyhughes/2012/05/26/untethered-jailbreak-for-your-ios-5-1-1-iphoneipadipod-touch-is-here/ |title= Untethered Jailbreak For Your iOS 5.1.1 iPhone/iPad/iPod Touch Is Here |author= Adrian Kingsley-Hughes |date= May 26, 2012 |work= Tech |publisher= Forbes |accessdate=June 1, 2012 }}</ref> The hackers together called the evad3rs released an iOS 6.X jailbreak tool called "evasi0n" available for Linux, OS X, and Windows on Monday, February 4, 2013 at noon Eastern Standard Time.{{citation needed|date=December 2015}} Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors.{{citation needed|date=December 2015}} When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.<ref>{{cite web|url=http://support.apple.com/kb/DL1652?viewlocale=en_US&locale=en_US|title=iOS 6.1.4 Software Update|work=apple.com}}</ref>
In April 2013, the latest versions of Sn0wbreeze was released, which added the support for tethered jailbreaking on A4 devices (i.e. devices ''not'' newer than the iPhone 4, iPad (1st generation), or iPod touch (4th generation)).<ref name="silverwindscam">{{cite web|url=http://www.ujailbreakiphone.com/2013/03/silv3rwind-ios-6-1-3-jailbreak-scam.html|title=Silv3rwind iOS 6.1.3 Jailbreak Is A Scam !|publisher=Ujailbreakiphone|accessdate=June 3, 2013}}</ref><ref name="fakejb">{{cite web|url=http://www.ujailbreakiphone.com/2013/05/icysn0w-ios-6.1.3-jailbreak-is-fake.html|title=Icysn0w iOS 6.1.3 Jailbreak Is Fake !|publisher=Ujailbreakiphone|accessdate=June 3, 2013}}</ref><ref>{{cite web|url=http://www.idownloadblog.com/2013/04/18/sn0wbreeze-v2-9-14/|title=Sn0wbreeze v2.9.14 Download Available With Support For iOS 6.1.3 Jailbreak|publisher=redsn0w|accessdate=June 27, 2013}}</ref>

On December 22, 2013, the evad3rs released a new version of [[evasi0n]] that supports jailbreaking iOS 7.0.x, known as evasi0n7.{{citation needed|date=December 2015}} On December 30, 2013, winocm, ih8sn0w and SquiffyPwn released p0sixspwn for untethering devices on iOS 6.1.3 – 6.1.5. Initially, it was necessary to jailbreak tethered using redsn0w and install p0sixpwn at Cydia. A few days later, on January 4, 2014, the same team released a version of p0sixpwn for jailbreaking using a computer.{{citation needed|date=December 2015}}

iOS 7.1 patched the exploits used by evasi0n7, and on June 23, 2014, Pangu, a Chinese untethered jailbreak was released for iOS 7.1.{{citation needed|date=December 2015}}

On October 22, 2014, [[Pangu Team]] released Pangu8 to jailbreak all devices running iOS 8-8.1. The first versions did not bundle Cydia, nor was there an iOS 8 compatible version of Cydia at the time.{{citation needed|date=December 2015}}

On November 29, 2014, TaiG team released their jailbreak tool called "TaiG" for devices running iOS 8.0-8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2.<ref>{{cite web|url=http://www.redmondpie.com/download-taig-1.2.0-to-jailbreak-ios-8.1.2/|title=Download TaiG 1.2.0 To Jailbreak iOS 8.1.2|accessdate=10 December 2014}}</ref> On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0-8.4.<ref>{{cite web|url=http://www.taig.com/en/update_log.html|title=TaiG Update Log|accessdate=3 July 2015}}</ref>

On 10 September 2015, 6 days before iOS 9 was released, iH8sn0w had demonstrated a working exploit on his Twitter page, linking to a YouTube video.<ref>{{cite web|url=https://twitter.com/iH8sn0w/status/641902260516208640 |title=iH8sn0w on Twitter: "iOS 9 Fun" |accessdate=October 10, 2015}}</ref>

On October 14, 2015, Pangu Team released Pangu 9, their jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.<ref>{{cite web|url=http://fortune.com/2015/10/14/ios-9-jailbreak/|title=iOS 9 has been jailbroken|accessdate=16 October 2015}}</ref><ref>{{cite web|url=http://www.techtimes.com/articles/95123/20151014/pangu-team-releases-ios-9-jailbreak-for-the-iphone-ipad-and-ipod-touch.htm|title=Pangu Team Releases iOS 9 Jailbreak For The iPhone, iPad And iPod Touch|accessdate=16 October 2015}}</ref><ref>{{cite web|url=https://www.theverge.com/2015/10/14/9529853/ios-9-jailbreak-download-pangu|title=The first iOS 9 jailbreak is here|accessdate=16 October 2015}}</ref>

On July 17, 2016, Pangu Team released Pangu93, a semi-untethered jailbreak tool for iOS 9.2-9.3.3. It was the first semi-untethered jailbreak and at the same time made within a sideloaded app, and included support only for 64bit devices.<ref>{{cite web|url=http://www.idownloadblog.com/2016/07/24/pangu-jailbreak-ios-9-2-9-3-3-devices/|title=Pangu releases 9.2-9.3.3 jailbreak |accessdate=24 July 2016}}</ref>

On mid-March 2017, jk9357 (aka @REALKJCMEMBER), part of the KJC (Kim Jong Cracks) hacking team released the first semi-untethered jailbreak for 32bit devices on 9.1-9.3.4. This jailbreak made use of some of the Pegasus vulnerabilities.<ref>{{cite web|url=http://www.idownloadblog.com/2017/03/21/home-depot-updated/|title=Home Depot jailbreak released|accessdate=21 March 2017}}</ref>

On December 21, 2016, well-known hacker Luca Todesco released a beta semi-untethered jailbreak tool for [[iOS 10|iOS 10.1]] known as Yalu+mach_portal for select 64-bit iOS devices. The jailbreak made use of Ian Beer's, of Google Project Zero, mach_portal exploit. This version is extremely unstable and was only meant for developers.<ref>{{Cite web|url=http://www.idownloadblog.com/2016/12/21/ios-10-jailbreak-beta-released/|title=iOS 10 jailbreak beta released (but stay away for now)|access-date=2017-04-06}}</ref> On January 26, 2017, he with help from Marco Grassi, a more stable version for [[iOS 10|iOS 10.2]] was released, eventually supporting all 64-bit iOS devices except for the iPhone 7 and 7 Plus, which is only supported by the older, more unstable version for 10.1.1. This jailbreak made use of Ian Beer's, of Project Zero, extra_recipe exploit. Both jailbreaks are installed through a computer application known as Cydia Impactor, which allows signing of apps not in the [[App Store (iOS)|App Store]].<ref>{{Citation|last=EverythingApplePro|title=How To Jailbreak iOS 10.2 (All Devices FINAL)|date=2017-01-30|url=https://www.youtube.com/watch?v=rdLQZFCLxWo|accessdate=2017-03-01}}</ref> Todesco said that the newer version would be eventually updated to support the iPhone 7 and 7 Plus up to iOS 10.1.1, however, he left the jailbreaking scene on March 28, abandoning both jailbreaks before it was released.

On April 24, 2017 a jailbreak for iOS 10.3.1 on a 64-bit iPhone 7 device was demonstrated at the Janus conference at the Mercedes Benz Arena, on Expo Avenue in Shanghai, by the Pangu Team. A release has yet to be confirmed or announced by Pangu themselves as of yet, but many speculate that if released, that it would support all 64-bit devices including the iPhone 7 and 7+, something that the Yalu 10.2 Jailbreak was not capable of doing back when it was released in late January.<ref>{{Cite web|url=https://github.com/kpwn/yalu102|title=kpwn/yalu102|website=GitHub|language=en|access-date=2017-04-06}}</ref><ref>{{Cite news|url=https://twitter.com/qwertyoruiopz/status/846410691368157185|title=qwertyoruiop on Twitter|work=Twitter|access-date=2017-04-06|language=en}}</ref>

On August 6, 2017, Siguza and Tihmstar released a semi-untethered Phoenix jailbreak tool to jailbreak iOS 9.3.5 on 32-bit iDevices.

On September 19, 2017, tihmstar released EtaSonJB, a jailbreak for all 32-bit devices on iOS 8.4.1.

On October 9, 2017, the hacker Abraham Masri (known on twitter as @cheesecakeufo) released the Saïgon jailbreak for all 64-bit devices on iOS 10.2.1.

On December 6, 2017, Abraham Masri released Houdini, the first semi-jailbreak for iOS, compatible with iOS 10.x up to 10.3.2 for all 64-bit devices. The application allows installation of themes, resolution changes etc. from basic Cydia repos. It is untethered, but it needs to run the exploit again to install content. The tool has been updated to beta 2 revision 1, adding the compatibility with iOS 11 up to 11.1.2.

On December 11, 2017, Ian Beer released async_wake, an iOS 11.0 up to 11.1.2 exploit that allows tfp0. The exploit has been updated and it has allowed jailbreak apps on jailed devices such as FilzaJailed, FilzaEscaped (which allows root access on a jailed device), MTerminal-Jailed by AppleBetas (which allows the execution of commands on a jailed device) and Torngat by 1GamerDev (a tweak manager that can set a boot logo, change resolution, disable OTA updates and more on a jailed device).

On December 23, 2017, Abraham Masri released to.panga, an iOS 11 up to 11.1.2 WIP jailbreak for developers based on the async_wake exploit by Ian Beer. It has Cydia included but since the jailbreak used a KPPless exploit, Cydia and Substrate have to be rewritten. Abraham Masri has since stated that the project wouldn't be updated due to other tools with the same goal.

On December 24, 2017, tihmstar released H3lix, a semi-untethered jailbreak for all 32-bit devices, compatible with all iOS 10 versions.

On December 26, 2017 the hacker Jonathan Levin (known on Twitter as @Morpheus____) released LiberiOS, a WIP developer-only jailbreak based on the async_wake exploit by Ian Beer for iOS 11.0 to iOS 11.1.2. Currently, LiberiOS does not come with Cydia due to it being a KPPless jailbreak.

=== By device and iOS version, 2007-present ===
{{legend2|#8CF|Device|border=1px solid #AAAAAA}}
{{legend2|#FFF9C6|IOS|border=1px solid #AAAAAA}}
{{anchor|First_jailbreaks}}

{| class="wikitable sortable" style="font-size:90%;"
|-
|-
!iOS Version
!
!Description
!Device/OS
!Title
!Release date
!Developer
!Tool
!Originally released for
!Developer(s)
!Jailbreak date
!Jailbroken<br/>after&nbsp;(days)
|-
|-
| rowspan="3" |5.0
|style="background: linear-gradient(to right, #8cf, #fff9c6);"|{{Hs|2}}||[[iPhone 2G]] / [[iOS|iPhone OS 1.0]]
|Emoji support
| {{dts|2007-6-29|format=mdy}}
|Vmoji
| (no name)
|Vintendo/ManChild Technologies
| [[iPhone Dev Team]]<ref name="How to Escape Jail">{{cite web|url=http://iphone.fiveforty.net/wiki/index.php/How_to_Escape_Jail |title=How to Escape Jail |author=iPhone Dev Team |deadurl=yes |archiveurl=https://web.archive.org/web/20071005150518/http://iphone.fiveforty.net/wiki/index.php/How_to_Escape_Jail |archivedate=October 5, 2007 }}</ref>
| rowspan="3" |iOS 4
| {{dts|2007-7-10|format=mdy}}<ref name="ricker2007" />
| {{age in days|2007|6|29|2007|7|10}}
|-
|-
|Keyboard shortcuts
| style="background:#8cf;"|{{Hs|1}}||[[iPod Touch|iPod touch]]
|Xpandr
| {{dts|2007-9-5|format=mdy}}
|Nicholas Haunold
| (no name)
| niacin and dre
| {{dts|2007-10-10|format=mdy}}<ref>{{cite web|url= http://toc2rta.com/?q=node/23|title= The iPhone / iTouch tif exploit is now officially released!|date= October 10, 2007|accessdate= August 23, 2012|deadurl= yes|archiveurl= https://web.archive.org/web/20120402064028/http://www.toc2rta.com/?q=node%2F23|archivedate= April 2, 2012|df= mdy-all}}</ref><ref>{{cite news |url= https://www.engadget.com/2007/10/10/iphone-and-ipod-touch-v1-1-1-full-jailbreak-tested-confirmed/ |title= iPhone and iPod touch v1.1.1 full jailbreak tested, confirmed! |author= Ryan Block |date= October 10, 2007 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=August 24, 2012 }}</ref>
| {{age in days|2007|9|5|2007|10|10}}
|-
|-
|Delete individual calls<ref>{{cite web|last1=Manalo|first1=Amboy|title=60 iOS Features Apple Stole from Jailbreakers|url=https://ios.gadgethacks.com/how-to/60-ios-features-apple-stole-from-jailbreakers-0188093/|access-date=October 22, 2020|website=Gadget Hacks|date=November 2, 2018|archive-date=October 27, 2020|archive-url=https://web.archive.org/web/20201027035409/https://ios.gadgethacks.com/how-to/60-ios-features-apple-stole-from-jailbreakers-0188093/|url-status=live}}</ref>
| style="background: linear-gradient(to right, #8cf, #fff9c6);"|{{Hs|2}}||[[iPhone 3G]] / [[iOS|iPhone OS 2.0]]
|Call Delete
| {{dts|2008-7-11|format=mdy}}
|IArrays
| [[PwnageTool]]
| iPhone Dev Team
| {{dts|2008-7-20|format=mdy}}<ref name="iphone3g-pwnage">{{cite news |url= http://tech.fortune.cnn.com/2008/07/20/dubious-achievement-hackers-jailbreak-the-iphone-3g/ |title= Dubious achievement: Hackers 'jailbreak' the iPhone 3G |author= Philip Elmer-DeWitt |date= July 20, 2008 |work=CNN Money |accessdate=October 26, 2011 }}</ref>
| {{age in days|2008|7|11|2008|7|20}}
|-
|-
| rowspan="3" |7.0
| style="background:#8cf;"|{{Hs|1}}||[[iPod Touch|iPod touch]] (2nd generation)
| rowspan="2" |Control Center
| {{dts|2008-9-9|format=mdy}}
|SBSettings
| [[redsn0w]]
|BigBoss
| iPhone Dev Team and Chronic Dev Team
|iPhone OS 2
| {{dts|2009-1-30|format=mdy}}<ref>{{cite web |url= http://isource.com/2009/02/01/redsn0w-tethered-jailbreak-for-ipod-touch-2g-released/ |title= redsn0w Tethered Jailbreak for iPod Touch 2G Released |author= PatrickJ |date= February 1, 2009 |publisher= iSource |accessdate=August 24, 2012 }}</ref><ref>{{cite web |url= https://arstechnica.com/apple/2009/02/redsn0w-lite-jailbreak-for-2nd-gen-ipod-touch-released/ |title= Redsn0w lite jailbreak for 2nd-gen iPod touch released |author= Justin Berka |date= February 3, 2009 | work=[[Ars Technica]] | publisher=[[Condé Nast]] |accessdate=January 9, 2013}}</ref>
| {{age in days|2008|9|9|2009|1|30}}
|-
|-
|NCSettings
| style="background:#fff9c6;"|{{Hs|3}}||data-sort-value="iOS 3.0"|[[iOS|iPhone OS 3.0]]
|JamieD360
| {{dts|2009-6-17|format=mdy}}
| rowspan="2" |iOS 5
| PwnageTool
| iPhone Dev Team
| {{dts|2009-6-19|format=mdy}}<ref>{{cite web |url= https://www.engadget.com/2009/06/20/pwnage-tool-for-iphone-os-3-0-now-live-ultrasn0w-still-on-stand/ |title= Pwnage Tool for iPhone OS 3.0 now live, ultrasn0w still on standby |author= Ross Miller |date= June 20, 2009 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=October 26, 2011 }}</ref>
| {{age in days|2009|6|17|2009|6|19}}
|-
|-
|Translucent Notification Center
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 3GS]]
|BlurredNCBackground
| {{dts|2009-6-19|format=mdy}}
|Phillippe
| [[purplera1n]]
| [[George Hotz]]
| {{dts|2009-7-3|format=mdy}}<ref>{{cite news |url= https://www.washingtonpost.com/wp-dyn/content/article/2009/07/03/AR2009070300691.html |title= First iPhone 3GS Jailbreak Hits The Web |author= Daniel Brusilovsky |date= July 3, 2009 |work= TechCrunch |publisher= The Washington Post |accessdate=October 26, 2011 }}</ref>
| {{age in days|2009|6|19|2009|7|3}}
|-
|-
| rowspan="4" |8.0
| style="background:#8cf;"|{{Hs|1}}||[[iPad]]
| rowspan="2" |Interactive Notifications
| {{dts|2010-4-30|format=mdy}}
|LockInfo
| [[Spirit (iOS jailbreak)|Spirit]]
|David Ashman
| comex
|iOS 4
| {{dts|2010-5-3|format=mdy}}<ref name="spirit-register">{{cite web |url= https://www.theregister.co.uk/2010/05/03/ipad_jailbreak/ |title= Hackers release jailbreak for iPad and newer iPhones |author= Dan Goodin |date= May 3, 2010 |publisher= The Register |accessdate=October 26, 2011 }}</ref>
| {{age in days|2010|4|30|2010|5|3}}
|-
|-
|biteSMS
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 4.0]]
|biteSMS Team
| {{dts|2010-6-21|format=mdy}}
|iOS 5
| PwnageTool
| iPhone Dev Team
| {{dts|2010-6-23|format=mdy}}<ref>{{cite web |url= http://www.pcworld.com/article/199713/does_jailbreaking_still_make_sense_with_ios_40.html |title= Does Jailbreaking Still Make Sense with iOS 4.0? |author= Mike Keller |date= June 23, 2010 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 26, 2011 }}</ref><ref>{{cite web |url= https://gizmodo.com/5558277/ios-4-jailbroken-within-a-day-of-first-release |title= iOS 4 Jailbroken Within a Day of First Release |author= John Herrman |date= June 8, 2010 |publisher= Gizmodo |accessdate=November 2, 2011 }}</ref>
| {{age in days|2010|6|21|2010|6|23}}
|-
|-
|Third-Party Keyboards
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 4]]
|Fleksy Enabler
| {{dts|2010-6-24|format=mdy}}
|Sea Comet
| [[JailbreakMe]] 2.0
| rowspan="2" |iOS 6
| comex
| {{dts|2010-8-1|format=mdy}}<ref name="jailbreakme-iphone4">{{cite news |url= http://articles.cnn.com/2010-08-02/tech/jailbreak.iphone.4_1_iphone-4-ios-4-1-jailbreak-apple-app-store?_s=PM:TECH |title= First iPhone 4 'jailbreak' posted online |author= John D. Sutter |date= August 2, 2010 |work= CNN Tech |publisher= CNN |accessdate= October 26, 2011 |deadurl= yes |archiveurl= https://web.archive.org/web/20120203163120/http://articles.cnn.com/2010-08-02/tech/jailbreak.iphone.4_1_iphone-4-ios-4-1-jailbreak-apple-app-store?_s=PM:TECH |archivedate= February 3, 2012 |df= mdy-all }}</ref>
| {{age in days|2010|6|24|2010|8|1}}
|-
|-
|Predictive Text
| style="background:#8cf;"|{{Hs|1}}||[[Apple TV]] (2nd generation)
|PredictiveKeyboard
| {{dts|2010-9-1|format=mdy}}
|Matthias Sauppe
| PwnageTool
| iPhone Dev Team
| {{dts|2010-10-20|format=mdy}}<ref name="engadget-appletv2">{{cite web |url= https://www.engadget.com/2010/10/20/apple-tv-now-jailbreakable-with-pwnagetool-4-1/|title= Apple TV now jailbreakable with PwnageTool 4.1 |author= Donald Melanson |date= October 20, 2010 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=May 22, 2012 }}</ref>
| {{age in days|2010|9|1|2010|10|20}}
|-
|-
| rowspan="2" |9.0
| style="background:#8cf;"|{{Hs|1}}||[[iPad 2]]
|Cursor Control
| {{dts|2011-3-11|format=mdy}}
|SwipeSelection
| JailbreakMe 3.0
|Kyle Howells
| comex
| rowspan="2" |iOS 4
| {{dts|2011-7-5|format=mdy}}<ref name="jailbreakme-ipad2">{{cite web |url= http://news.cnet.com/8301-17938_105-20077154-1/app-enables-ipad-2-jailbreak-from-your-browser/ |title= App enables iPad 2 jailbreak from your browser |author= Eric Mack |date= July 6, 2011 |work=[[CNET]] |publisher= [[CBS Interactive]] |accessdate=October 26, 2011 }}</ref>
| {{age in days|2011|3|11|2011|7|5}}
|-
|-
|Lowercase Keys in Keyboard
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 5.0]]
|ShowCase
| {{dts|2011-10-12|format=mdy}}
|Lance Fetters
| redsn0w
| iPhone Dev Team
| {{dts|2011-10-13|format=mdy}}<ref name="ios5-redsn0w">{{cite web |url= http://www.pcworld.com/article/241877/ios_5_jailbreak_is_already_here_geeks_not_surprised.html |title= iOS 5 Jailbreak Is Already Here; Geeks Not Surprised |author= Elizabeth Fish |date= October 13, 2011 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 26, 2011 }}</ref>
| {{age in days|2011|10|12|2011|10|13}}
|-
|-
| rowspan="7" |10.0
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 4S]]
|Drawing on Messages
| {{dts|2011-10-14|format=mdy}}
|Graffiti
| [[Absinthe (software)|Absinthe]]
|IanP
| pod2g, Chronic Dev Team, iPhone Dev Team
|iOS 5
| {{dts|2012-1-20|format=mdy}}<ref name="iphone4s-engadget">{{cite web |url= https://www.engadget.com/2012/01/20/absinthe-a5-jailbreak-released-for-iphone-4s-hacker-dream-team/ |title= Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true |author= Joseph Volpe |date= January 20, 2012 |work=[[Engadget]] |publisher=[[Aol]] |accessdate=January 20, 2012 }}</ref><ref name="iphone4s-readwriteweb">{{cite web|url=http://www.readwriteweb.com/archives/jailbreak_ios_5_iphone_4s_ipad_2.php |archive-url=https://web.archive.org/web/20120122223538/http://www.readwriteweb.com/archives/jailbreak_ios_5_iphone_4s_ipad_2.php |dead-url=yes |archive-date=January 22, 2012 |title=Now You Can Jailbreak Your iPhone 4S and iPad 2 |author=John Paul Titlow |date=January 20, 2012 |publisher=ReadWriteWeb |accessdate=January 20, 2012 |df=mdy-all }}</ref>
| {{age in days|2011|10|14|2012|1|20}}
|-
|-
|Floating Notification Center
| style="background:#8cf;"|{{Hs|1}}||[[iPad (3rd generation)]]
|Floater
| {{dts|2012-3-16|format=mdy}}
|Skylerk99
| [[Absinthe (software)|Absinthe 2.0]]
| rowspan="5" |iOS 8
| pod2g, Chronic Dev Team, iPhone Dev Team
| {{dts|2012-5-25|format=mdy}}
| {{age in days|2012|3|16|2012|5|25}}
|-
|-
|Bubble Notifications
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 6.0]]
|WatchNotifications
| {{dts|2012-9-19|format=mdy}}
|Thomas Finch
| redsn0w
| iPhone Dev Team
| {{dts|2012-9-19|format=mdy}}
| {{age in days|2012|9|19|2012|9|19}}
|-
|-
| rowspan="2" |Clear All Notifications
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 5]]
|3D Touch to Clear Notifications
| {{dts|2012-9-21|format=mdy}}
|MohammadAG
| [[evasi0n]]
| evad3rs
| {{dts|2013-2-4|format=mdy}}
| {{age in days|2012|9|21|2013|2|4}}
|-
|-
|OneTapClear
| style="background:#8cf;"|{{Hs|1}}||[[iPod touch]] (5th generation)
|Rave
| {{dts|2012-10-23|format=mdy}}
| evasi0n
| evad3rs
| {{dts|2013-2-4|format=mdy}}
| {{age in days|2012|10|23|2013|2|4}}
|-
|-
|Stickers in Messages
| style="background:#8cf;"|{{Hs|1}}||[[iPad]] (4th generation)
|StickerMe
| {{dts|2012-11-2|format=mdy}}
|Alexander Laurus
| evasi0n
| evad3rs
| {{dts|2013-2-4|format=mdy}}
| {{age in days|2012|11|2|2013|2|4}}
|-
|-
|Separate Control Center Pages
| style="background:#8cf;"|{{Hs|1}}||[[iPad Mini]]
|Auxo
| {{dts|2012-11-2|format=mdy}}
|A3Tweaks
| evasi0n
|iOS 9
| evad3rs
| {{dts|2013-2-4|format=mdy}}
| {{age in days|2012|11|2|2013|2|4}}
|-
|-
| rowspan="8" |11.0
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 7]]
| rowspan="2" |Cellular Data Control
| {{dts|2013-9-18|format=mdy}}
|SBSettings
| evasi0n7
|BigBoss
| evad3rs
|iPhone OS 2
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|9|18|2013|12|22}}
|-
|-
|CCSettings
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 5C]]
|plipala
| {{dts|2013-9-20|format=mdy}}
| rowspan="5" |iOS 8
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|9|20|2013|12|22}}
|-
|-
| rowspan="2" |Customizable Control Center
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 5S]]
|CChide/CCSettings
| {{dts|2013-9-20|format=mdy}}
|plipala
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|9|20|2013|12|22}}
|-
|-
|Onizuka
| style="background:#8cf;"|{{Hs|1}}||[[iPad Air]]
|Maximehip
| {{dts|2013-11-1|format=mdy}}
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|11|1|2013|12|22}}
|-
|-
|Colored Controls
| style="background:#8cf;"|{{Hs|1}}||[[iPad Mini 2]]
|Cream
| {{dts|2013-11-12|format=mdy}}
|CP Digital Darkroom
| evasi0n7
| evad3rs
| {{dts|2013-12-22|format=mdy}}
| {{age in days|2013|11|12|2013|12|22}}
|-
|-
|One-Handed Keyboard (iPhone)
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS7#7.1|iOS 7.1]]-[[iOS7#7.1.2|7.1.2]]
|OneHandWizard
| {{dts|2014-5-29|format=mdy}}
|TheAfricanNerd, sharedRoutine
| Pangu
| [[Pangu Team]]
| {{dts|2014-6-23|format=mdy}}
| {{age in days|2014|5|29|2014|6|23}}
|-
|-
|Low Power Mode in Control Center
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 8]]
|CCLowPower
| {{dts|2014-9-17|format=mdy}}
|Cole Cabral
| Pangu8
| rowspan="2" |iOS 10
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|9|17|2014|10|22}}
|-
|-
|Notification design tweaks
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 6]]
|CleanNotification10
| {{dts|2014-9-19|format=mdy}}
|Ayden Panhuyzen
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|9|19|2014|10|22}}
|-
|-
| rowspan="8" |13.0<ref>{{cite web|last1=Bednarz|first1=Dennis|title=Every Jailbreak Tweak Apple Copied in iOS 13|url=https://www.iphonehacks.com/2019/06/every-jailbreak-tweak-apple-copied-ios-13.html|access-date=October 23, 2020|website=iPhone Hacks|date=June 7, 2019|archive-date=October 26, 2020|archive-url=https://web.archive.org/web/20201026214213/https://www.iphonehacks.com/2019/06/every-jailbreak-tweak-apple-copied-ios-13.html|url-status=live}}</ref>
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 6 Plus]]
| rowspan="2" |Dark Mode
| {{dts|2014-9-19|format=mdy}}
|Eclipse
| Pangu8
|Guillermo Morán
| Pangu Team
| rowspan="2" |iOS 7
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|9|19|2014|10|22}}
|-
|-
|Noctis
| style="background:#8cf;"|{{Hs|1}}||[[iPad Air 2]]
|LaughingQuoll
| {{dts|2014-10-22|format=mdy}}
| Pangu8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|10|22|2014|10|22}}
|-
|-
|Download manager in Safari
| style="background:#8cf;"|{{Hs|1}}||[[iPad Mini 3]]
|Safari Plus
| {{dts|2014-10-22|format=mdy}}
|BigBoss
| Pangu8
|iOS 8
| Pangu Team
| {{dts|2014-10-22|format=mdy}}
| {{age in days|2014|10|22|2014|10|22}}
|-
|-
| rowspan="2" |Redesigned volume HUD
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 8#8.1.1|iOS 8.1.1]]-[[iOS 8#8.4|8.4]]
|Melior
| {{dts|2014-11-17|format=mdy}}
|SparkDev
| TaiG, PP Jailbreak
|iOS 7
| TaiG, [[PP Jailbreak]]
| {{dts|2014-11-29|format=mdy}}
| {{age in days|2014|11|17|2014|11|29}}
|-
|-
|Ultrasound
| style="background:#8cf;"|{{Hs|1}}||[[iPod touch]] (6th generation)
|Ayden Panhuyzen
| {{dts|2015-07-15|format=mdy}}
| rowspan="3" |iOS 11
| TaiG, PP Jailbreak
| TaiG, [[PP Jailbreak]]
| {{dts|2015-07-16|format=mdy}}
| {{age in days|2015|07|15|2015|07|16}}
|-
|-
|Wi-Fi/Bluetooth settings in Control Center
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 9]]
|WeatherVane
| {{dts|2015-09-16|format=mdy}}
|ATWiiks
| Pangu9
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|16|2015|10|14}}
|-
|-
|Unlimited app download limit on Mobile Data
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 6S]]
|Appstore Unrestrict
| {{dts|2015-09-25|format=mdy}}
|iJulioverne
| Pangu9
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|25|2015|10|14}}
|-
|-
|Third-party Controller Support
| style="background:#8cf;"|{{Hs|1}}||[[iPhone 6S Plus]]
|nControl
| {{dts|2015-09-25|format=mdy}}
|Kevin Bradley
| Pangu9
|iOS 12
| [[Pangu Team]]
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|25|2015|10|14}}
|-
|-
| rowspan="8" |14.0
| style="background:#8cf;"|{{Hs|1}}||[[iPad Mini 4]]
|Hide apps from Home screen
| {{dts|2015-09-09|format=mdy}}
|Poof
| Pangu9
|BigBoss
| [[Pangu Team]]
|iOS 5,<ref>{{Cite web |date=October 16, 2011 |title=Poof - Cydia |url=http://cydia.saurik.com/package/com.bigboss.poof/ |website=[[Cydia]] |access-date=February 13, 2023 |archive-date=April 4, 2023 |archive-url=https://web.archive.org/web/20230404212024/http://cydia.saurik.com/package/com.bigboss.poof/ |url-status=live }}</ref> possibly older
| {{dts|2015-10-14|format=mdy}}
| {{age in days|2015|09|09|2015|10|14}}
|-
|-
| rowspan="2" |Compact Call Interface
| style="background:#8cf;"|{{Hs|1}}||[[iPad Pro]]
|CallBar
| {{dts|2015-11-11|format=mdy}}
|Elias Limneos
| Pangu9
|iOS 7
| [[Pangu Team]]
| {{dts|2016-03-11|format=mdy}}
| {{age in days|2015-11-11|2016-03-11}}
|-
|-
|Scorpion
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 9#9.1|iOS 9.1]]
|Esquilli
| {{dts|2015-10-21|format=mdy}}
| rowspan="6" |iOS 13
| Pangu9
| [[Pangu Team]]
| {{dts|2016-03-11|format=mdy}}
| {{age in days|2015-10-21|2016-03-11}}
|-
|-
|App Library
| style="background:#8cf;"|{{Hs|1}}||[[Apple TV]] (4th generation)
|Vesta
| {{dts|2015-09-09|format=mdy}}
|SparkDev
| Pangu9
| [[Pangu Team]]
| {{dts|2016-03-23|format=mdy}}
| {{age in days|2015|09|09|2016|03|23}}
|-
|-
|Changing CarPlay background
| style="background:#8cf;"|{{Hs|1}}||[[iPhone SE]]
|Canvas
| {{dts|2016-03-31|format=mdy}}
|Leftyfl1p
| PPJailbreak
| PPJailbreak, [[Pangu Team]]
| {{dts|2016-07-24|format=mdy}}
| {{age in days|2016|03|31|2016|07|24}}
|-
|-
|Picture in Picture on iPhone
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 10]]
|Titan
| September 13, 2016
|TheSaltaCracka
| Yalu
| Luca Todesco
| December 28, 2016
| 106
|-
|-
|Home Screen Widgets
| style="background:#fff9c6;"|{{Hs|2}}||[[iOS 9#9.3.5|iOS 9.3.5]]
|HSWidgets
| August 25, 2016
|dgh0st
| Phoenix
| Siguza, tihmstar
| August 6, 2017
| 346
|-
|-
|Smaller Siri
| style="background:#fff9c6;"|{{Hs|2}}||[[iOS 8#8.4.1|iOS 8.4.1]]
|SmallSiri
| August 13, 2015
|Muirey03
| EtasonJB
| tihmstar
| September 19, 2017
| 768
|-
|-
| rowspan="7" |15.0
| style="background:#fff9c6;"|{{Hs|3}}||[[iOS 11]]
|Separation Alerts
| September 19, 2017
|Proximitus
| LiberiOS
|LaughingQuoll
| Jonathan Levin
|iOS 11
| December 26, 2017
| 97
|-
|-
|Low Power Mode (iPad)
|LPMPad
|iCraze
| rowspan="6" |iOS 13
|-
|Focus
|PureFocus
|Dave Van Wijk
|-
|Notification Priority
|Contacy
|XCXiao
|-
| rowspan="3" |Redesigned Notifications
|Quart
|LaughingQuoll
|-
| rowspan="2" |Velvet
|NoisyFlake
|-
|HiMyNameIsUbik
|-
| rowspan="4" |16.0
|Taptic Keyboard
|TapticKeys
|SparkDev
|iOS 10
|-
| rowspan="2" |Redesigned Now Playing Interface
|Colorflow
|David Goldman
|iOS 7
|-
|Chromaflow
|Ryan Nair
|iOS 14
|-
|Enhanced Lock Screen customization
|Complications
|Ben Giannis
|iOS 12
|-
| rowspan="16" |17.0<ref name="Bouchard 2023">{{cite web | last=Bouchard | first=Anthony | title=17 things iOS & iPadOS 17 'borrowed' from the jailbreak community | website=iDownloadBlog.com | date=July 5, 2023 | url=https://www.idownloadblog.com/2023/07/05/17-features-ios-17-took-from-the-jailbreak-community/ | access-date=January 12, 2024 | archive-date=January 12, 2024 | archive-url=https://web.archive.org/web/20240112155159/https://www.idownloadblog.com/2023/07/05/17-features-ios-17-took-from-the-jailbreak-community/ | url-status=live }}</ref>
|Camera App Composition Features
|CameraTweak
|Samball
|rowspan="2" |iOS 6
|-
|Crossfade in the Music App
|Crossfade
|H6nry
|-
|Improved Auto-correct
|ManualCorrect Pro
|Aaron Lindsay (aerialx)
|iOS 7
|-
|Live Voicemail
|Super Voicemail
|hAcx
|iOS 8
|-
|Informative App Store Downloads
|App Percent
|pxcex
|iOS 10
|-
|Change Haptic Menu Speed
|Better3DMenus
|dpkg_
|iOS 11
|-
|Safari Private Browsing Privacy
|BioProtect XS
|Elias Limneos
|rowspan="2" |iOS 12
|-
|Additional AirPods gestures
|Siliqua Pro
|LaughingQuoll
|-
|Using Non-System Apps
|EvilScheme
|Lorenzo
|iOS 13
|-
|Interactive Widgets
|PowerWidget
|Ginsu
|rowspan="4" |iOS 14
|-
|Additional CarPlay Wallpapers
|Airaw
|Dcsyhi
|-
|Contact Posters
|Phoenix
|SouthernGirlWhoCode of titand3v
|-
|Verification code auto-deleting
|NoMoreShortCodes
|Arcas
|-
|Notes App Formatting
|Textyle 3
|Ryan Nair
|iOS 15
|-
|StandBy Mode
|Photon
|cemck
|iOS 13.0
|-
|Change Lock Screen Time Weight
|SimpleTime
|p2kdev
|iOS 12.0
|}
|}


=== Releases, 2011-present ===
=== Carrier unlocking ===
Jailbreaking also opens the possibility for using software to unofficially unlock [[SIM lock|carrier-locked]] iPhones so they can be used with other carriers.<ref>{{cite web |url= https://www.wired.com/gadgetlab/2009/08/reasons-to-jailbreak/ |title= 6 Reasons to Jailbreak Your iPhone |author= Brian X. Chen |date= August 7, 2009 |work= Gadget Lab |publisher= Wired |access-date= May 1, 2012 |archive-url= https://web.archive.org/web/20120504173521/http://www.wired.com/gadgetlab/2009/08/reasons-to-jailbreak |archive-date= May 4, 2012 |url-status= live }}</ref> Software-based unlocks have been available since September 2007,<ref>{{cite web |url= https://www.engadget.com/2007/09/11/iunlock-released-the-first-free-open-source-iphone-sim-unlock/ |title= iUnlock released: the first free, open source iPhone SIM unlock software |author= Ryan Block |date= September 11, 2007 |work= [[Engadget]] |publisher= [[Aol]] |access-date= February 1, 2014 |archive-url= https://web.archive.org/web/20140203213503/http://www.engadget.com/2007/09/11/iunlock-released-the-first-free-open-source-iphone-sim-unlock/ |archive-date= February 3, 2014 |url-status= live }}</ref> with each tool applying to a specific iPhone model and [[Baseband processor|baseband]] version (or multiple models and versions).<ref>{{cite web |url= https://www.pcworld.com/article/532573/3g_iphone_unlock.html |title= 3G iPhone Unlock Expected |author= Ian Paul |date= December 22, 2008 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= July 14, 2022 |archive-date= August 13, 2022 |archive-url= https://web.archive.org/web/20220813151840/https://www.pcworld.com/article/532573/3g_iphone_unlock.html |url-status= live }}</ref> This includes the [[iPhone 4S]], [[iPhone 4]], [[iPhone 3GS]], and [[iPhone 3G]] models. An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom [[IPSW]] and unlock their device. Moreover, during the unlocking process, there are options to install Cydia the iPad baseband.

=== Installation of malware ===
Cybercriminals may jailbreak an iPhone to install malware or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company [[Hacking Team]], which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.<ref name="Hacking Team hack reveals why you shouldn't jailbreak your iPhone">{{cite web|last1=Fleishman|first1=Glen|title=Hacking Team hack reveals why you shouldn't jailbreak your iPhone|url=http://www.macworld.com/article/2944712/hacking-team-hack-reveals-why-you-shouldnt-jailbreak-your-iphone.html|website=MacWorld|access-date=August 2, 2015|date=July 6, 2015|archive-url=https://web.archive.org/web/20150803084827/http://www.macworld.com/article/2944712/hacking-team-hack-reveals-why-you-shouldnt-jailbreak-your-iphone.html|archive-date=August 3, 2015|url-status=live}}</ref><ref>{{cite web|last1=Heath|first1=Alex|title=New Jailbreak App Stalks All Of Your iPhone's Activity And Makes It Available Online|url=http://www.cultofmac.com/131805/new-jailbreak-app-stalks-all-of-your-iphones-activity-and-makes-it-available-online/|website=Cult of Mac|access-date=August 2, 2015|date=November 25, 2011|archive-url=https://web.archive.org/web/20150923004602/http://www.cultofmac.com/131805/new-jailbreak-app-stalks-all-of-your-iphones-activity-and-makes-it-available-online/|archive-date=September 23, 2015|url-status=live}}</ref>

=== Software piracy ===
On iOS devices, the installation of consumer software is [[Closed platform|generally restricted to installation through the App Store]]. Jailbreaking, therefore, allows the installation of pirated applications.<ref>{{cite web|last1=Hattersley|first1=Lucy|title=Now pirated iOS apps can be installed without jailbreak|url=https://www.macworld.com/article/670132/now-pirated-ios-apps-can-be-installed-without-jailbreak.html|website=Macworld|date=January 2, 2013|access-date=July 14, 2022|archive-date=July 14, 2022|archive-url=https://web.archive.org/web/20220714230856/https://www.macworld.com/article/670132/now-pirated-ios-apps-can-be-installed-without-jailbreak.html|url-status=live}}</ref> It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.<ref>{{cite web|last1=Kazmucha|first1=Allyson|title=Jailbreak, app piracy, and the true cost of theft|url=http://www.imore.com/jailbreak-app-piracy-cost-theft|website=iMore|access-date=August 2, 2015|date=May 26, 2012|archive-url=https://web.archive.org/web/20150821073824/http://www.imore.com/jailbreak-app-piracy-cost-theft|archive-date=August 21, 2015|url-status=live}}</ref> However, the installation of pirated applications is also possible without jailbreaking, taking advantage of enterprise certificates to facilitate the distribution of modified or pirated releases of popular applications.<ref name="Panzarino">{{cite web|url=https://thenextweb.com/apple/2013/01/01/low-down-dirty-iphone-app-pirates/|title=iOS App Piracy Continues, Now Without Jailbreak|last=Panzarino|first=Matthew|date=January 1, 2013|work=The Next Web|access-date=May 4, 2018|archive-url=https://web.archive.org/web/20180504225921/https://thenextweb.com/apple/2013/01/01/low-down-dirty-iphone-app-pirates/|archive-date=May 4, 2018|url-status=live}}</ref>

== Package managers ==
[[File:ScreenshotofCydia.jpg|alt=Screenshot of Cydia|thumb|[[Cydia]], a popular package manager installed on jailbroken devices]]A [[package manager]] or package-management system is a collection of software tools that automates the process of installing, upgrading, configuring, and removing computer programs. For jailbreaks, this is essential for the installation of third-party content. There are a few package managers specifically for jailbroken iOS devices, of which the most popular are [[Cydia]], Sileo, Zebra and [[Installer.app|Installer 5]].

== Security of the device ==
Depending on the type of the jailbreak (i.e. '<nowiki/>''rootless''<nowiki/>' or '''rootful''<nowiki/>'), different security structures may be compromised to various degrees. As jailbreaking grants freedom over running software that isn't confined to a sandbox typical to that of an [[App Store (Apple)|App Store]] application, as well as modifications to system files, it ultimately allows for the threat of [[malware]].

Users of a jailbroken device are also often forced to stay on an older iOS version that is no longer supported by Apple, commonly due to the unavailability of jailbreak on the newer versions. While using older versions of iOS is considered safe in most circumstances, the device may be vulnerable to publicly known security flaws.

In March 2021, jailbreak developer GeoSn0w<ref>{{Cite web|date=March 22, 2021|title=[Free Release] iSecureOS - iOS Security Application For Jailbroken Devices (v1.0 Beta 1)|url=http://www.reddit.com/r/jailbreak/comments/mab585/free_release_isecureos_ios_security_application/|access-date=October 1, 2021|website=r/jailbreak|archive-date=October 1, 2021|archive-url=https://web.archive.org/web/20211001235042/https://www.reddit.com/r/jailbreak/comments/mab585/free_release_isecureos_ios_security_application/|url-status=live}}</ref> released a tweak called iSecureOS which can alert the users of security issues found on their devices. The application works akin to antivirus software, in that it scans the files on the user's device and checks them against a database of known malware or unsafe repos.

In June 2021, ESET Research confirmed that malware did exist on one of the piracy repositories in the jailbreak community. The malware actively targeted iSecureOS to try to bypass the detection,<ref>{{Cite tweet|user=ESETresearch|number=1402174908680097792|title=The newer version of iOS/Spy.Postlo.A attempts to modify the definitions of @isecureos (iOS Security application for jailbroken devices) to avoid detection.|access-date=October 1, 2021}}</ref> but updates to the security app were quickly released and have mitigated the malware.

== Comparison to Android rooting ==
Jailbreaking of iOS devices has sometimes been compared to "[[Rooting (Android OS)|rooting]]" of [[Android (operating system)|Android]] devices. Although both concepts involve privilege escalation, they do differ in scope.

Where [[Android rooting]] and jailbreaking are similar is that both are used to grant the owner of the device [[superuser]] system-level privileges, which may be transferred to one or more apps. However, unlike iOS phones and tablets, nearly all Android devices already offer an option to allow the user to [[Sideloading|sideload]] 3rd-party [[Mobile app|apps]] onto the device without having to install from an official source such as the [[Google Play|Google Play store]].<ref>{{cite web|last1=Hildenbrand|first1=Jerry|date=February 2, 2012|title=Android A to Z: What is sideloading?|url=http://www.androidcentral.com/what-sideloading-android-z|url-status=live|archive-url=https://web.archive.org/web/20140708073558/http://www.androidcentral.com/what-sideloading-android-z|archive-date=July 8, 2014|access-date=July 9, 2014|website=Android Central}}</ref> Many Android devices also provide owners the capability to modify or even replace the full operating system after unlocking the [[bootloader]], although doing this requires a [[factory reset]].<ref>{{cite web|title=HTC Bootloader Unlock Instructions|url=http://www.htcdev.com/bootloader|url-status=dead|archive-url=https://web.archive.org/web/20141027141227/http://www.htcdev.com/bootloader/|archive-date=October 27, 2014|access-date=October 26, 2014|website=htcdev.com}}</ref><ref>{{cite web|title=Official Bootloader Unlock instructions|url=http://unlockbootloader.sonymobile.com#Sony|url-status=dead|archive-url=https://web.archive.org/web/20140707020506/http://unlockbootloader.sonymobile.com/#Sony|archive-date=July 7, 2014|access-date=June 4, 2020|website=sonymobile.com}}</ref><ref>{{cite web|title=#unlocking-the-bootloader Google instructions on bootloader unlocking|url=http://source.android.com/source/building-devices.html|url-status=dead|archive-url=https://web.archive.org/web/20110521220428/http://source.android.com/source/building-devices.html|archive-date=May 21, 2011|access-date=October 26, 2014|website=source.android.com}}</ref>

In contrast, iOS devices are engineered with restrictions including a "locked bootloader" which can not be unlocked by the owner to modify the operating system without violating Apple's end-user license agreement. And on iOS, until 2015, while corporations could install private applications onto corporate phones, sideloading unsanctioned, 3rd-party apps onto iOS devices from sources other than the [[App Store (iOS/iPadOS)|App Store]] was prohibited for most individual users without a purchased developer membership.<ref>{{cite web|last=Mayo|first=Benjamin|date=June 10, 2015|title=Xcode 7 allows anyone to download, build and 'sideload' iOS apps for free|url=https://9to5mac.com/2015/06/10/xcode-7-allows-anyone-to-download-build-and-sideload-ios-apps-for-free/|url-status=live|archive-url=https://web.archive.org/web/20170120175052/https://9to5mac.com/2015/06/10/xcode-7-allows-anyone-to-download-build-and-sideload-ios-apps-for-free/|archive-date=January 20, 2017|access-date=November 12, 2016}}</ref> After 2015, the ability to install 3rd-party apps became free for all users; however, doing so requires a basic understanding of [[Xcode]] and compiling iOS apps.

Jailbreaking an iOS device to defeat all these security restrictions presents a significant technical challenge.<ref>{{cite web|title=Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues|url=http://support.apple.com/kb/ht3743|url-status=live|archive-url=https://web.archive.org/web/20130510123825/http://support.apple.com/kb/HT3743|archive-date=May 10, 2013|access-date=July 9, 2014|website=Apple Support|quote=[U]nauthorized modification of iOS is a violation of the iOS end-user software license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software.}}</ref> Similar to Android, alternative iOS app stores utilizing enterprise certificates are available, offering modified or pirated releases of popular applications and video games, some of which were either previously released through Cydia or are unavailable on the App Store due to these apps not complying with Apple developer guidelines.

== Tools ==
{{Unreferenced section|date=January 2024}}
=== Types ===
Many different types of jailbreaks have been developed over the years, differing in how and when the exploit is applied.

==== Untethered ====
When a jailbroken device is booting, it loads Apple's own boot software initially. The device is then [[Exploit (computer security)|exploited]] and the kernel is [[Patch (computing)|patched]] every time it is turned on. An untethered jailbreak is a jailbreak that does not require any assistance when it reboots up. The kernel will be patched without the help of a computer or an application.

==== Tethered ====
A tethered jailbreak is the opposite of an untethered jailbreak, in the sense that a computer is required to boot the device. Without a computer running the jailbreaking software, the iOS device will not be able to boot at all. While using a tethered jailbreak, the user will still be able to restart/kill the device's [[SpringBoard]] process without needing to reboot. Many early jailbreaks were offered initially as tethered jailbreaks.

==== Semi-tethered ====
This type of jailbreak allows a user to reboot their phone normally, but upon doing so, the jailbreak and any modified code will be effectively disabled, as it will have an unpatched kernel. Any functionality independent of the jailbreak will still run as normal, such as making a phone call, texting, or using App Store applications. To be able to have a patched kernel and run modified code again, the device must be booted using a computer.

==== Semi-untethered ====
This type of jailbreak is like a semi-tethered jailbreak in which when the device reboots, it no longer has a patched kernel, but the key difference is that the kernel can be patched without using a computer. The kernel is usually patched using an application installed on the device without patches. This type of jailbreak has become increasingly popular, with most recent jailbreaks classified as semi-untethered.

=== History of tools ===

[[File:Jailbreakers.jpg|thumb|Several people (including [[Jay Freeman|saurik]], p0sixninja, and [[George Hotz|geohot]]) who have contributed to building the early jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at [[DEF CON]].]]

==== JailbreakMe and AppSnapp ====
A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it,<ref name="ricker2007">{{cite web |last=Ricker |first=Thomas |url=https://www.engadget.com/2007/07/10/iphone-hackers-we-have-owned-the-filesystem/ |title=iPhone Hackers: "we have owned the filesystem" |publisher=[[Engadget]] |date=July 10, 2007 |access-date=July 17, 2009 |archive-url=https://web.archive.org/web/20170401233052/https://www.engadget.com/2007/07/10/iphone-hackers-we-have-owned-the-filesystem/ |archive-date=April 1, 2017 |url-status=live }}</ref> and soon a jailbreak-only game app became available.<ref>{{cite web |last=Topolsky |first=Joshua |date=August 6, 2007 |title=First third-party "game" app appears for iPhone |url=https://www.engadget.com/2007-08-06-first-third-party-game-app-appears-for-iphone.html |url-status=live |archive-url=https://web.archive.org/web/20211221205856/https://www.engadget.com/2007-08-06-first-third-party-game-app-appears-for-iphone.html |archive-date=December 21, 2021 |access-date=July 17, 2009 |publisher=[[Engadget]]}}</ref> In October 2007, [[JailbreakMe]] 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod Touch,<ref>{{cite web |last=Wilson |first=Ben |url=http://reviews.cnet.com/8301-19512_7-10115200-233.html |title=Official iPhone 1.1.1 jailbreak released with easy-to-follow instructions; does not require TIFF exploit |work=[[CNET]] |publisher=[[CBS Interactive]] |date=October 10, 2007 |access-date=November 10, 2009 |archive-url=https://web.archive.org/web/20090719014856/http://reviews.cnet.com/8301-19512_7-10115200-233.html |archive-date=July 19, 2009 |url-status=dead }}</ref><ref>{{cite web |url=http://www.pcworld.com/article/139061/hacker_software_can_install_unauthorized_software_on_iphones.html |title=Hacker Software Can Install Unauthorized Software on iPhones |date=October 29, 2007 |author=Gregg Keizer |work=[[PCWorld]] |publisher=[[IDG]] |access-date=August 25, 2011 |archive-url=https://web.archive.org/web/20110925173658/http://www.pcworld.com/article/139061/hacker_software_can_install_unauthorized_software_on_iphones.html |archive-date=September 25, 2011 |url-status=dead}}</ref> and it included Installer.app as a way to get software for the jailbroken device.<ref>{{Cite web |date=2018-09-06 |title=iOS Jailbreaking - A Complete History - TechEngage |url=https://techengage.com/ios-jailbreaking-complete-history/ |access-date=2024-03-11 |language=en-US |archive-date=March 11, 2024 |archive-url=https://web.archive.org/web/20240311190833/https://techengage.com/ios-jailbreaking-complete-history/ |url-status=live }}</ref>

==== ZiPhone ====
In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.<ref>{{cite web|last=Block|first=Ryan|url=https://www.engadget.com/2008/02/12/ziphone-jailbreak-any-version-iphone-out-of-the-box-including/|title=ZiPhone: jailbreak any version iPhone out of the box, including 1.1.3 (by Zibri)|publisher=[[Engadget]]|date=February 12, 2008|access-date=November 13, 2013|archive-url=https://web.archive.org/web/20131101102508/http://www.engadget.com/2008/02/12/ziphone-jailbreak-any-version-iphone-out-of-the-box-including/|archive-date=November 1, 2013|url-status=live}}</ref>

==== PwnageTool ====
The iPhone Dev Team, which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod Touch,<ref>{{cite news |url= https://www.wired.com/gadgetlab/2008/07/pwnage-20-relea/ |title= Pwnage 2.0 Released: Gadget Lab Jailbreaks iPod Touch |author= Charlie Sorrel |date= July 21, 2008 |work= Gadget Lab |publisher= Wired |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20110911152740/http://www.wired.com/gadgetlab/2008/07/pwnage-20-relea/ |archive-date= September 11, 2011 |url-status= live }}</ref><ref name="iphone3g-pwnage">{{cite news |url= http://tech.fortune.cnn.com/2008/07/20/dubious-achievement-hackers-jailbreak-the-iphone-3g/ |title= Dubious achievement: Hackers 'jailbreak' the iPhone 3G |author= Philip Elmer-DeWitt |date= July 20, 2008 |work= CNN Money |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20131110004527/http://tech.fortune.cnn.com/2008/07/20/dubious-achievement-hackers-jailbreak-the-iphone-3g/ |archive-date= November 10, 2013 |url-status= dead }}</ref> newly including Cydia as the primary third-party installer for jailbroken software.<ref>{{cite web |url= http://www.tuaw.com/2008/07/20/first-look-pwnage-for-2-0/ |title= First Look: Pwnage for 2.0 |author= Erica Sadun |date= July 20, 2008 |publisher= TUAW |access-date= November 1, 2011 |archive-url= https://web.archive.org/web/20120119161526/http://www.tuaw.com/2008/07/20/first-look-pwnage-for-2-0/ |archive-date= January 19, 2012 |url-status= dead}}</ref> PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.<ref>{{cite web |url= http://blog.iphone-dev.org/post/5239805497/tic-tac-toe |title= Tic tac toe... |author= Dev Team |date= May 2011 |publisher= Dev Team Blog |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20111031025501/http://blog.iphone-dev.org/post/5239805497/tic-tac-toe |archive-date= October 31, 2011 |url-status= live }}</ref><ref name="devteam-redsn0wbeta" />

==== QuickPwn ====
In November 2008 the iPhone Dev Team released QuickPwn to jailbreak iPhone OS 2.2 on iPhone and iPod Touch, with options to enable past functionality that Apple had disabled on certain devices.<ref>{{cite news |url= https://www.wired.com/gadgetlab/2008/11/quickpwn-adds-s/ |title= QuickPWN Adds Street View to iPod Touch |author= Charlie Sorrel |date= November 25, 2008 |work= Gadget Lab |publisher= Wired |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20100822082420/http://www.wired.com/gadgetlab/2008/11/quickpwn-adds-s |archive-date= August 22, 2010 |url-status= live }}</ref>

==== redsn0w ====
After Apple released iPhone OS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac.<ref>{{cite web|url=https://iphonebyte.com/cydia/|title=How to Use Cydia on your iPhone|date=June 23, 2009|publisher=iPhoneByte|author=Daniel Pan|access-date=November 2, 2015|archive-url=https://web.archive.org/web/20161024153550/https://iphonebyte.com/cydia/|archive-date=October 24, 2016|url-status=unfit}}</ref> It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.<ref name="ios5-redsn0w">{{cite web |url= http://www.pcworld.com/article/241877/ios_5_jailbreak_is_already_here_geeks_not_surprised.html |title= iOS 5 Jailbreak Is Already Here; Geeks Not Surprised |author= Elizabeth Fish |date= October 13, 2011 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20120426143622/http://www.pcworld.com/article/241877/ios_5_jailbreak_is_already_here_geeks_not_surprised.html |archive-date= April 26, 2012 |url-status= live }}</ref>

==== purplera1n & blackra1n ====
[[George Hotz]] developed the first iPhone unlock, which was a hardware-based solution. Later, in 2009, he released a jailbreaking tool for the [[iPhone 3G]] and [[iPhone 3GS]] on iPhone OS 3.0 called purplera1n,<ref>{{cite web |url= https://www.cnet.com/news/iphone-3gs-jailbreak-purplera1n-hits-web/ |title= iPhone 3GS jailbreak, 'purplera1n,' hits Web |author= Leslie Katz |date= July 3, 2009 |work= [[CNET]] |publisher= [[CBS Interactive]] |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20120208172111/http://news.cnet.com/8301-17938_105-10279029-1.html |archive-date= February 8, 2012 |url-status= live }}</ref> and [[blackra1n]] for iPhone OS version 3.1.2 on the 3rd generation iPod Touch and other devices.<ref>{{cite news |url= https://www.wired.com/gadgetlab/2009/11/blackra1n-plus-blacksn0w-unlock-any-iphone-in-seconds |title= BlackRa1n Plus Blacksn0w: Unlock Any iPhone in Seconds |author= Charlie Sorrel |date= November 5, 2009 |work= Gadget Lab |publisher= Wired |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20111030000433/http://www.wired.com/gadgetlab/2009/11/blackra1n-plus-blacksn0w-unlock-any-iphone-in-seconds |archive-date= October 30, 2011 |url-status= live }}</ref>

==== limera1n ====
In October 2010, George Hotz released limera1n, a low-level exploit of [[boot ROM]] code that permanently works to jailbreak the iPhone 4 and is used as a part of tools including redsn0w.<ref>{{cite web |url= https://www.engadget.com/2011/06/07/ios-5-jailbroken/ |title= iOS 5 jailbroken |author= Thomas Ricker |date= June 7, 2011 |work= [[Engadget]] |publisher= Aol.com |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20111017103513/http://www.engadget.com/2011/06/07/ios-5-jailbroken |archive-date= October 17, 2011 |url-status= live }}</ref>

==== Spirit and JailbreakMe ====
Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010.<ref name="spirit-register">{{cite web |url= https://www.theregister.co.uk/2010/05/03/ipad_jailbreak/ |title= Hackers release jailbreak for iPad and newer iPhones |author= Dan Goodin |date= May 3, 2010 |publisher= The Register |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20111019000035/http://www.theregister.co.uk/2010/05/03/ipad_jailbreak/ |archive-date= October 19, 2011 |url-status= live }}</ref> Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iPhone OS 3.2.<ref name="spirit-register" /> In August 2010, comex released JailbreakMe 2.0, the first web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1).<ref name="jailbreakme-iphone4">{{cite news |url= http://articles.cnn.com/2010-08-02/tech/jailbreak.iphone.4_1_iphone-4-ios-4-1-jailbreak-apple-app-store?_s=PM:TECH |title= First iPhone 4 'jailbreak' posted online |author= John D. Sutter |date= August 2, 2010 |work= CNN Tech |publisher= CNN |access-date= October 26, 2011 |url-status= dead |archive-url= https://web.archive.org/web/20120203163120/http://articles.cnn.com/2010-08-02/tech/jailbreak.iphone.4_1_iphone-4-ios-4-1-jailbreak-apple-app-store?_s=PM:TECH |archive-date= February 3, 2012 |df= mdy-all }}</ref><ref>{{cite web |url=https://www.engadget.com/2010/08/01/official-iphone-4-jailbreak-hits-from-iphone-dev-team/ |title=Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video) |publisher=Engadget |date=August 1, 2010 |author=Sean Hollister |access-date=September 11, 2010 |archive-url=https://web.archive.org/web/20100813022723/http://www.engadget.com/2010/08/01/official-iphone-4-jailbreak-hits-from-iphone-dev-team/ |archive-date=August 13, 2010 |url-status=live }}</ref>
In July 2011, he released JailbreakMe 3.0,<ref>{{cite news |title=Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple |author=Andy Greenberg |url=https://www.forbes.com/sites/andygreenberg/2011/08/01/meet-comex-the-iphone-uber-hacker-who-keeps-outsmarting-apple/ |work=Forbes |date=August 1, 2011 |access-date=December 23, 2012 |archive-url=https://web.archive.org/web/20121223204731/http://www.forbes.com/sites/andygreenberg/2011/08/01/meet-comex-the-iphone-uber-hacker-who-keeps-outsmarting-apple/ |archive-date=December 23, 2012 |url-status=live }}</ref> a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3).<ref name="jailbreakme-ipad2">{{cite web |url= http://news.cnet.com/8301-17938_105-20077154-1/app-enables-ipad-2-jailbreak-from-your-browser/ |title= App enables iPad 2 jailbreak from your browser |author= Eric Mack |date= July 6, 2011 |work= [[CNET]] |publisher= [[CBS Interactive]] |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20131110003828/http://news.cnet.com/8301-17938_105-20077154-1/app-enables-ipad-2-jailbreak-from-your-browser/ |archive-date= November 10, 2013 |url-status= live }}</ref> It used a flaw in [[Portable Document Format|PDF]] file rendering in mobile [[Safari (web browser)|Safari]].<ref>{{cite web |url= https://www.eweek.com/reviews/apple-fixes-latest-ios-exploit/ |title= Apple Fixes Latest iOS Exploit |author= P. J. Connolly |date= July 15, 2011 |work= eWEEK Labs |publisher= eWEEK |access-date= July 14, 2022 |archive-date= May 24, 2024 |archive-url= https://web.archive.org/web/20240524180226/https://www.eweek.com/reviews/apple-fixes-latest-ios-exploit/ |url-status= live }}</ref><ref>{{cite web|url=http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit |archive-url=https://web.archive.org/web/20110722135644/http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit |url-status=dead |archive-date=July 22, 2011 |title=Analysis of the jailbreakme v3 font exploit |author=jean |date=July 18, 2011 |publisher=Sogeti ESEC Lab |access-date=October 23, 2011 }}</ref>

==== Greenpois0n ====
Chronic Dev Team initially released [[Greenpois0n]] in October 2010, a desktop-based tool for untethered jailbreaking iOS 4.1<ref>{{cite web |url= https://www.pcmag.com/article2/0,2817,2370522,00.asp#fbid=d7I6xbRm1XV |title= iPhone Hackers Square Off With Competing iOS 4 Jailbreaks |author= David Murphy |date= October 9, 2010 |publisher= PCMag |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20101014010627/http://www.pcmag.com/article2/0,2817,2370522,00.asp#fbid=d7I6xbRm1XV |archive-date= October 14, 2010 |url-status= live }}</ref> and later iOS 4.2.1<ref>{{cite news |url= https://www.wired.com/gadgetlab/2011/02/untethered-ios-4-2-1-jailbreak-live/ |title= Untethered iOS 4.2.1 Jailbreak Live |author= Charlie Sorrel |date= February 4, 2011 |work= Gadget Lab |publisher= Wired |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20111109193342/http://www.wired.com/gadgetlab/2011/02/untethered-ios-4-2-1-jailbreak-live |archive-date= November 9, 2011 |url-status= live }}</ref> on most devices including the Apple TV,<ref>{{cite web |url= http://www.pcworld.com/article/208388/oh_hai_apple_tv_officially_hacked.html |title= Oh Hai! Apple TV Officially Hacked |author= Elizabeth Fish |date= October 20, 2010 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20111103143030/http://www.pcworld.com/article/208388/oh_hai_apple_tv_officially_hacked.html |archive-date= November 3, 2011 |url-status= dead}}</ref> as well as iOS 4.2.6 on CDMA (Verizon) iPhones.<ref>{{cite web |url= http://www.pcworld.com/article/218932/verizon_iphone_now_available_for_jailbreaking.html |title= Verizon iPhone Now Available for Jailbreaking |author= Blair Hanley Frank |date= February 7, 2011 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= November 2, 2011 |archive-url= https://web.archive.org/web/20110314013636/http://www.pcworld.com/article/218932/verizon_iphone_now_available_for_jailbreaking.html |archive-date= March 14, 2011 |url-status= live }}</ref>

==== ultrasn0w ====
As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod Touch (3rd and 4th generation).<ref name="devteam-redsn0wbeta" /> As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1.<ref>{{cite web |url= https://www.engadget.com/2012/06/04/ultrasn0w-unlock-iphone-4-3gs-ios-5-1-1/ |title= Newest version of ultrasn0w unlocks iPhone 4, 3GS on iOS 5.1.1, RedSn0w 0.9.12b1 also released |author= Edgar Alvarez |date= June 4, 2012 |work= [[Engadget]] |publisher= Aol |access-date= June 16, 2012 |archive-url= https://web.archive.org/web/20120608082109/http://www.engadget.com/2012/06/04/ultrasn0w-unlock-iphone-4-3gs-ios-5-1-1/ |archive-date= June 8, 2012 |url-status= live }}</ref>

==== Absinthe ====
The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release [[Absinthe (software)|Absinthe]] in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the [[iPad 2]] for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S.<ref name="iphone4s-engadget">{{cite web |url= https://www.engadget.com/2012/01/20/absinthe-a5-jailbreak-released-for-iphone-4s-hacker-dream-team/ |title= Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true |author= Joseph Volpe |date= January 20, 2012 |work= [[Engadget]] |publisher= Aol |access-date= January 20, 2012 |archive-url= https://web.archive.org/web/20120121171830/http://www.engadget.com/2012/01/20/absinthe-a5-jailbreak-released-for-iphone-4s-hacker-dream-team/ |archive-date= January 21, 2012 |url-status= live }}</ref><ref name="iphone4s-readwriteweb">{{cite web|url=http://www.readwriteweb.com/archives/jailbreak_ios_5_iphone_4s_ipad_2.php |archive-url=https://web.archive.org/web/20120122223538/http://www.readwriteweb.com/archives/jailbreak_ios_5_iphone_4s_ipad_2.php |url-status=dead |archive-date=January 22, 2012 |title=Now You Can Jailbreak Your iPhone 4S and iPad 2 |author=John Paul Titlow |date=January 20, 2012 |publisher=ReadWriteWeb |access-date=January 20, 2012 |df=mdy-all }}</ref><ref name="absinthe-cnet">{{cite web |url= http://news.cnet.com/8301-17938_105-57362965-1/fly-be-free-jailbreak-for-iphone-4s-ipad-2-released/ |title= Fly, be free! Jailbreak for iPhone 4S, iPad 2 released |author= Eric Mack |date= January 20, 2012 |work= [[CNET]] |publisher= [[CBS Interactive]] |access-date= January 22, 2012 |archive-url= https://web.archive.org/web/20120122043151/http://news.cnet.com/8301-17938_105-57362965-1/fly-be-free-jailbreak-for-iphone-4s-ipad-2-released/ |archive-date= January 22, 2012 |url-status= live }}</ref><ref name="absinthe-pcworld">{{cite web |url= http://www.pcworld.com/article/248478/how_to_jailbreak_your_iphone_4s_and_ipad_2_via_absinthe_a5.html |title= How to Jailbreak Your iPhone 4S and iPad 2 via Absinthe A5 |author= McKinley Noble |date= January 20, 2012 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= January 22, 2012 |archive-url= https://web.archive.org/web/20120122181918/http://www.pcworld.com/article/248478/how_to_jailbreak_your_iphone_4s_and_ipad_2_via_absinthe_a5.html |archive-date= January 22, 2012 |url-status= live }}</ref> In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1, including jailbreaking the [[iPad (3rd generation)|third-generation iPad]] for the first time.<ref name="absinthe2-forbes">{{cite web |url= https://www.forbes.com/sites/adriankingsleyhughes/2012/05/26/untethered-jailbreak-for-your-ios-5-1-1-iphoneipadipod-touch-is-here/ |title= Untethered Jailbreak For Your iOS 5.1.1 iPhone/iPad/iPod Touch Is Here |author= Adrian Kingsley-Hughes |date= May 26, 2012 |work= Tech |publisher= Forbes |access-date= June 1, 2012 |archive-url= https://web.archive.org/web/20120530014446/http://www.forbes.com/sites/adriankingsleyhughes/2012/05/26/untethered-jailbreak-for-your-ios-5-1-1-iphoneipadipod-touch-is-here/ |archive-date= May 30, 2012 |url-status= live }}</ref>

==== evasi0n ====
An iOS 6.X untethered jailbreak tool called "evasi0n" was released for Linux, OS X, and Windows on February 4, 2013.<ref>{{Cite web |date=February 9, 2013 |title=evasi0n jailbreak used on nearly 7 million iOS 6.0/6.1 devices |url=https://www.firstpost.com/tech/news-analysis/evasi0n-jailbreak-used-on-nearly-7-million-ios-6-06-1-devices-3619349.html |access-date=March 22, 2022 |website=Tech2 |archive-date=March 22, 2022 |archive-url=https://web.archive.org/web/20220322055851/https://www.firstpost.com/tech/news-analysis/evasi0n-jailbreak-used-on-nearly-7-million-ios-6-06-1-devices-3619349.html |url-status=live }}</ref> Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.<ref>{{cite web|url=http://support.apple.com/kb/DL1652?viewlocale=en_US&locale=en_US|title=iOS 6.1.4 Software Update|work=apple.com|access-date=September 2, 2013|archive-url=https://web.archive.org/web/20130923040748/http://support.apple.com/kb/DL1652?viewlocale=en_US&locale=en_US|archive-date=September 23, 2013|url-status=dead}}</ref>

==== TaiG ====
On November 29, 2014, TaiG team released their untethered jailbreak tool called "TaiG" for devices running iOS 8.0–8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2.<ref>{{cite web|url=http://www.redmondpie.com/download-taig-1.2.0-to-jailbreak-ios-8.1.2/|title=Download TaiG 1.2.0 To Jailbreak iOS 8.1.2|access-date=December 10, 2014|date=December 10, 2014|archive-url=https://web.archive.org/web/20141210151856/http://www.redmondpie.com/download-taig-1.2.0-to-jailbreak-ios-8.1.2/|archive-date=December 10, 2014|url-status=live}}</ref> On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0–8.4.<ref>{{cite web|url=http://www.taig.com/en/update_log.html|title=TaiG Update Log|access-date=July 3, 2015|archive-url=https://web.archive.org/web/20150703062724/http://www.taig.com/en/update_log.html|archive-date=July 3, 2015|url-status=dead}}</ref>

==== Pangu9 ====
On October 14, 2015, Pangu Team released Pangu9, their untethered jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.<ref>{{cite web|url=http://fortune.com/2015/10/14/ios-9-jailbreak/|title=iOS 9 has been jailbroken|access-date=October 16, 2015|archive-url=https://web.archive.org/web/20151015235919/http://fortune.com/2015/10/14/ios-9-jailbreak/|archive-date=October 15, 2015|url-status=live}}</ref><ref>{{cite web|url=https://www.theverge.com/2015/10/14/9529853/ios-9-jailbreak-download-pangu|title=The first iOS 9 jailbreak is here|access-date=October 16, 2015|date=October 14, 2015|archive-url=https://web.archive.org/web/20151015221755/http://www.theverge.com/2015/10/14/9529853/ios-9-jailbreak-download-pangu|archive-date=October 15, 2015|url-status=live}}</ref>

=== Table of tools ===
{| class="wikitable sortable"
{| class="wikitable sortable"
|-
|-
! rowspan="2" | Name
! rowspan="2"| Name
! rowspan="2" | Release date
! rowspan="2"| Release date
! colspan="3"| Hardware
! colspan="3"| Hardware
! rowspan="2" | Firmware
! colspan="2" | Firmware
! rowspan="2" | Untethered?
! rowspan="2" | Untethered?
! rowspan="2" class="unsortable"| Developer(s)
! rowspan="2" class="unsortable"| Developer(s)
! rowspan="2" |License
|-
|-
! class="unsortable"| [[iPad]]
! class="unsortable"| [[iPad]]
! class="unsortable"| [[iPhone]]
! class="unsortable"| [[iPhone]]
! class="unsortable"| [[iPod Touch|iPod<br/>Touch]]
! class="unsortable"| [[iPod Touch|iPod<br />Touch]]
! Oldest
! Recent
|-
|-


| [[JailbreakMe]] 3.0<ref name="jailbreakme-informationweek">{{cite news|title=Apple iOS Zero-Day PDF Vulnerability Exposed |author=Mathew J. Schwartz |url=http://www.informationweek.com/news/231001147 |archive-url=https://web.archive.org/web/20110710123801/http://www.informationweek.com/news/231001147 |dead-url=yes |archive-date=July 10, 2011 |newspaper=InformationWeek |date=July 7, 2011 |accessdate=October 23, 2011 |df=mdy-all }}</ref>
| [[JailbreakMe]] 3.0<ref name="jailbreakme-informationweek">{{cite news|title=Apple iOS Zero-Day PDF Vulnerability Exposed |author=Mathew J. Schwartz |url=http://www.informationweek.com/news/231001147 |archive-url=https://web.archive.org/web/20110710123801/http://www.informationweek.com/news/231001147 |url-status=dead |archive-date=July 10, 2011 |newspaper=InformationWeek |date=July 7, 2011 |access-date=October 23, 2011 }}</ref>
| {{dts|2011-7-5|format=mdy}}<ref name="jailbreakme-informationweek" />
| {{dts|2011-7-5|format=mdy}}<ref name="jailbreakme-informationweek" />
| {{flatlist|
| {{flatlist|
Line 528: Line 463:
* [[iPhone 3GS|3GS]]
* [[iPhone 3GS|3GS]]
* [[iPhone 4|4]]}}<ref name="jailbreakme-informationweek" />
* [[iPhone 4|4]]}}<ref name="jailbreakme-informationweek" />
| [[iPod Touch|1]]<ref name="jailbreakme-informationweek" />
| [[iPod Touch (1st generation)|1]]<ref name="jailbreakme-informationweek" />
| 4.2.6
| 4.2.6 – 4.2.8<br />{{nowrap|4.3 – 4.3.3}}<ref name="jailbreakme-informationweek" />{{efn|The [[Verizon]] CDMA iPhone 4 ran on iOS 4.2.5 to 4.2.10, with incremental updates being bugfixes that were simultaneously applied from 4.3.1 to 4.3.5.}}
| 4.2.8<br />{{nowrap|4.3 – 4.3.3}}<ref name="jailbreakme-informationweek" />{{efn|The [[Verizon]] CDMA iPhone 4 ran on iOS 4.2.5 to 4.2.10, with incremental updates being bugfixes that were simultaneously applied from 4.3.1 to 4.3.5.}}
| {{yes}}<ref name="jailbreakme-informationweek" />
| {{yes}}<ref name="jailbreakme-informationweek" />
| comex<ref name="jailbreakme-informationweek" />
| comex<ref name="jailbreakme-informationweek" />
|[[Proprietary software|Proprietary]]
|-
|-


| Seas0npass<ref name="geektech-howto">{{cite web |url= http://www.pcworld.com/article/238653/jailbreaking_101_which_tool_to_use_to_hack_your_idevice.html |title= Jailbreaking 101: Which Tool to Use to Hack Your iDevice |author= Mike Keller |date= August 23, 2011 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 23, 2011 }}</ref>
| Seas0npass<ref name="geektech-howto">{{cite web |url= http://www.pcworld.com/article/238653/jailbreaking_101_which_tool_to_use_to_hack_your_idevice.html |title= Jailbreaking 101: Which Tool to Use to Hack Your iDevice |author= Mike Keller |date= August 23, 2011 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= October 23, 2011 |archive-url= https://web.archive.org/web/20120706182705/http://www.pcworld.com/article/238653/jailbreaking_101_which_tool_to_use_to_hack_your_idevice.html |archive-date= July 6, 2012 |url-status= live }}</ref>
| {{dts|2011-10-18|format=mdy}}<ref name="geektech-howto" />
| {{dts|2011-10-18|format=mdy}}<ref name="geektech-howto" />
| colspan="3" style="text-align:center" | 2nd generation [[Apple TV]]<ref name="geektech-howto" />
| colspan="3" style="text-align:center" | 2nd generation [[Apple TV]]<ref name="geektech-howto" />
| 4.3
| 4.3 – 5.3<br />{{nowrap|6.1.2 (tethered)}}<ref name="geektech-howto" />
| 5.3<br />{{nowrap|6.1.2 (tethered)}}<ref name="geektech-howto" />
| {{Yes2|4.3 – 5.3}}<ref name="geektech-howto" />
| {{Yes2|4.3 – 5.3}}<ref name="geektech-howto" />
|
|
|[[GNU General Public License#Version 3|GPLv3]]<ref>{{Cite web |title=Seas0nPass/README at master · firecore/Seas0nPass |url=https://github.com/firecore/Seas0nPass/blob/master/README |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084109/https://github.com/firecore/Seas0nPass/blob/master/README |url-status=live }}</ref>
|-
|-


| [[redsn0w]] 0.9.15 beta 3<ref name="howto-ios5">{{cite web |url= http://www.pcworld.com/article/242116/how_to_jailbreak_your_ios_5_device.html |title= How to Jailbreak Your iOS 5 Device |author= Sarah Jacobsson Purewal |date= October 18, 2011 |work=[[PCWorld]] |publisher=[[IDG]] |accessdate=October 23, 2011 }}</ref><ref name="devteam-marchmadness">{{cite web |url=http://blog.iphone-dev.org/post/18906290309/march-mayhem |title=March Mayhem |author= iPhone Dev Team |date=March 7, 2012 |publisher=Dev Team Blog |accessdate=April 22, 2012}}</ref>
| redsn0w 0.9.15 beta 3<ref name="howto-ios5">{{cite web |url= http://www.pcworld.com/article/242116/how_to_jailbreak_your_ios_5_device.html |title= How to Jailbreak Your iOS 5 Device |author= Sarah Jacobsson Purewal |date= October 18, 2011 |work= [[PCWorld]] |publisher= [[IDG]] |access-date= October 23, 2011 |archive-url= https://web.archive.org/web/20160508003229/http://www.pcworld.com/article/242116/how_to_jailbreak_your_ios_5_device.html |archive-date= May 8, 2016 |url-status= live }}</ref><ref name="devteam-marchmadness">{{cite web |url=http://blog.iphone-dev.org/post/18906290309/march-mayhem |title=March Mayhem |author=iPhone Dev Team |date=March 7, 2012 |publisher=Dev Team Blog |access-date=April 22, 2012 |archive-url=https://web.archive.org/web/20160904234756/http://blog.iphone-dev.org/post/18906290309/march-mayhem |archive-date=September 4, 2016 |url-status=live }}</ref>
| {{dts|2012-11-1|format=mdy}}
| {{dts|2012-11-1|format=mdy}}
| [[iPad 1|1]]<ref name="devteam-redsn0wbeta">{{cite web|url=http://blog.iphone-dev.org/post/14857834236/untethered-holidays |title=Untethered holidays |author=iPhone Dev Team |date=December 27, 2011 |publisher=Dev Team Blog |accessdate=December 29, 2011}}</ref><ref name="howto-ios5" /><ref name="engadget-redsn0wbeta">{{cite web|url=https://www.engadget.com/2012/04/21/redsn0w-mac-windows-corona-a5-jailbreak/ |title=RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools |author=Edgar Alvarez |date=April 21, 2012 |publisher=Engadget |accessdate=April 22, 2012}}</ref>
| [[iPad 1|1]]<ref name="devteam-redsn0wbeta">{{cite web |url=http://blog.iphone-dev.org/post/14857834236/untethered-holidays |title=Untethered holidays |author=iPhone Dev Team |date=December 27, 2011 |publisher=Dev Team Blog |access-date=December 29, 2011 |archive-url=https://web.archive.org/web/20161022105532/http://blog.iphone-dev.org/post/14857834236/untethered-holidays |archive-date=October 22, 2016 |url-status=live }}</ref><ref name="howto-ios5" /><ref name="engadget-redsn0wbeta">{{cite web |url=https://www.engadget.com/2012/04/21/redsn0w-mac-windows-corona-a5-jailbreak/ |title=RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools |author=Edgar Alvarez |date=April 21, 2012 |publisher=Engadget |access-date=April 22, 2012 |archive-url=https://web.archive.org/web/20120421202112/http://www.engadget.com/2012/04/21/redsn0w-mac-windows-corona-a5-jailbreak/ |archive-date=April 21, 2012 |url-status=live }}</ref>
| {{flatlist|
| {{flatlist|
* [[iPhone 3GS|3GS]]
* [[iPhone 3GS|3GS]]
* [[iPhone 4|4]]<ref name="devteam-redsn0wbeta" /><ref name="howto-ios5" /><ref name="engadget-redsn0wbeta" />}}
* [[iPhone 4|4]]<ref name="devteam-redsn0wbeta" /><ref name="howto-ios5" /><ref name="engadget-redsn0wbeta" />}}
| [[iPod Touch|1]]
| [[iPod Touch (1st generation)|1]]
| 4.1 6.1.6
| 4.1
| 6.1.6
| {{Rarely|}} {{Hidden begin|title=Depends}}
| {{Rarely|}} {{Hidden begin|title=Depends}}
'''Untethered''': {{Flatlist|
'''Untethered''': {{Flatlist|
Line 555: Line 495:
* 4.2.6 – 4.2.8
* 4.2.6 – 4.2.8
* 5.0.1
* 5.0.1
* 5.1.1<ref name="devteam-predc">{{cite web|url=http://blog.iphone-dev.org/post/24395681708/pre-dc |title=Dev-Team Blog – Pre-DC |date=June 4, 2012 |publisher=Dev-Team Blog |accessdate=May 30, 2013}}</ref>
* 5.1.1<ref name="devteam-predc">{{cite web |url=http://blog.iphone-dev.org/post/24395681708/pre-dc |title=Dev-Team Blog – Pre-DC |date=June 4, 2012 |publisher=Dev-Team Blog |access-date=May 30, 2013 |archive-url=https://web.archive.org/web/20161019161808/http://blog.iphone-dev.org/post/24395681708/pre-dc |archive-date=October 19, 2016 |url-status=live }}</ref>
* 5.0 / 5.1 (only for [[IPhone 3GS#New bootrom and 2011 baseband update|iPhone 3GS with old boot ROM]])<ref name="devteam-marchmadness" />}}
* 5.0 / 5.1 (only for [[IPhone 3GS#New boot ROM and 2011 baseband update|iPhone 3GS with old boot ROM]])<ref name="devteam-marchmadness" />}}
'''Tethered''': {{Flatlist|
'''Tethered''': {{Flatlist|
* 4.2.9 – 4.2.10
* 4.2.9 – 4.2.10
Line 562: Line 502:
* 5.0
* 5.0
* 5.1
* 5.1
* 6.0 – 6.1.6 (not available for devices newer than the iPhone 4, [[iPad 1]], or [[IPod Touch (4th generation)|iPad Touch 4]])<ref name="613-tutorial">{{cite web|url=http://www.redmondpie.com/jailbreak-ios-6.1.3-on-pre-a5-iphone-and-ipod-touch-using-redsn0w-how-to-tutorial |title=Jailbreak iOS 6.1.3 On Pre-A5 iPhone And iPod touch Using Redsn0w [How-To Tutorial] |date=March 20, 2013 |publisher=Redmond Pie |accessdate=May 30, 2013}}</ref>}}
* 6.0 – 6.1.6 (not available for devices newer than the iPhone 4, [[iPad 1]], or [[IPod Touch (4th generation)|iPod Touch 4]])<ref name="613-tutorial">{{cite web |url=http://www.redmondpie.com/jailbreak-ios-6.1.3-on-pre-a5-iphone-and-ipod-touch-using-redsn0w-how-to-tutorial |title=Jailbreak iOS 6.1.3 On Pre-A5 iPhone And iPod Touch Using Redsn0w [How-To Tutorial] |date=March 20, 2013 |publisher=Redmond Pie |access-date=May 30, 2013 |archive-url=https://web.archive.org/web/20170101182824/http://www.redmondpie.com/jailbreak-ios-6.1.3-on-pre-a5-iphone-and-ipod-touch-using-redsn0w-how-to-tutorial/ |archive-date=January 1, 2017 |url-status=live }}</ref>}}
{{Hidden end}}
{{Hidden end}}
| |[[iPhone Dev Team]]<ref name="devteam-redsn0wbeta" />
| [[iPhone Dev Team]]<ref name="devteam-redsn0wbeta" />
|[[Proprietary software|Proprietary]]
|-
|-


| [[Absinthe (software)|Absinthe]] 2.0.4<ref name="absinthe-cnet" />
| Absinthe 2.0.4<ref name="absinthe-cnet" />
| {{dts|2012-5-30|format=mdy}}
| {{dts|2012-5-30|format=mdy}}
| {{flatlist|
| {{flatlist|
Line 577: Line 518:
* [[iPhone 4|4]]
* [[iPhone 4|4]]
* [[iPhone 4S|4S]]<ref name="absinthe-pcworld" />}}
* [[iPhone 4S|4S]]<ref name="absinthe-pcworld" />}}
| [[iPod Touch|1]]<ref name="absinthe-pcworld" />
| [[iPod Touch (1st generation)|1]]<ref name="absinthe-pcworld" />
| {{nowrap|5.1.1}}<ref name="absinthe-pcworld" />
| colspan="2"| 5.1.1<ref name="absinthe-pcworld" />
| {{yes}}<ref name="iphone4s-engadget" />
| {{yes}}<ref name="iphone4s-engadget" />
| pod2g, Chronic Dev Team, iPhone Dev Team<ref name="absinthe-cnet" />
| pod2g, Chronic Dev Team, iPhone Dev Team<ref name="absinthe-cnet" />
|[[Proprietary software|Proprietary]]<ref>{{Citation |title=absinthe-2.0 |date=September 30, 2022 |url=https://github.com/OpenJailbreak/absinthe |access-date=August 30, 2023 |publisher=OpenJailbreak |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084112/https://github.com/OpenJailbreak/absinthe |url-status=live }}</ref>
|-
|-


Line 598: Line 540:
* [[iPod Touch (4th generation)|4]]
* [[iPod Touch (4th generation)|4]]
* [[iPod Touch (5th generation)|5]]}}
* [[iPod Touch (5th generation)|5]]}}
| 6.0
| 6.0 – 6.1.2<ref name=evashome>{{cite web|title= evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs|url=http://evasi0n.com/}}</ref>
| 6.1.2<ref name=evashome>{{cite web|title= evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs|url= http://evasi0n.com/|url-status= dead|archive-url= https://web.archive.org/web/20130204000427/http://www.evasi0n.com/|archive-date= February 4, 2013|df= mdy-all}}</ref>
| {{yes}}
| {{yes}}
| pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
| pod2g, MuscleNerd, pimskeks, and [[David Wang (hacker)|planetbeing]] (evad3rs)
|[[Proprietary software|Proprietary]]<ref>{{Citation |title=OpenJailbreak/evasi0n6 |date=June 30, 2023 |url=https://github.com/OpenJailbreak/evasi0n6 |access-date=August 30, 2023 |publisher=OpenJailbreak |archive-date=March 22, 2023 |archive-url=https://web.archive.org/web/20230322031934/https://github.com/OpenJailbreak/evasi0n6 |url-status=live }}</ref>
|-
|-


Line 619: Line 563:
* [[iPhone 5C|5C]]}}
* [[iPhone 5C|5C]]}}
| [[iPod Touch (5th generation)|5]]
| [[iPod Touch (5th generation)|5]]
| 7.0 7.0.6<ref name="evashome" />
| 7.0
| 7.0.6<ref name="evashome" />
| {{yes}}
| {{yes}}
| pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
| pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)
|[[Proprietary software|Proprietary]]
|-
|-


Line 639: Line 585:
* [[iPod Touch (4th generation)|4]]
* [[iPod Touch (4th generation)|4]]
* [[iPod Touch (5th generation)|5]]}}
* [[iPod Touch (5th generation)|5]]}}
| 6.1.3 6.1.6
| 6.1.3
| 6.1.6
| {{yes}}
| {{yes}}
| winocm, iH8sn0w, and SquiffyPwn
| winocm, iH8sn0w, and SquiffyPwn
|[[GNU General Public License#Version 3|GPLv3]]<ref>{{Cite web |title=Released under GPL licensing. · p0sixspwn/p0sixspwn@f1dff0f |url=https://github.com/p0sixspwn/p0sixspwn/commit/f1dff0ff1f6ad5390b59d6b78996b37bc32fde48 |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=January 14, 2018 |archive-url=https://web.archive.org/web/20180114173633/https://github.com/p0sixspwn/p0sixspwn/commit/f1dff0ff1f6ad5390b59d6b78996b37bc32fde48 |url-status=live }}</ref>
|-
|-


| [[Pangu Team|Pangu]]
| Pangu
| {{dts|2014-6-23|format=mdy}}<ref name=iclarified-pangu-release>{{cite web|title=Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released|url=http://www.iclarified.com/41824/pangu-untethered-jailbreak-of-ios-711-has-been-released}}</ref>
| {{dts|2014-6-23|format=mdy}}<ref name=iclarified-pangu-release>{{cite web|title=Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released|url=http://www.iclarified.com/41824/pangu-untethered-jailbreak-of-ios-711-has-been-released|date=June 23, 2014|access-date=June 23, 2014|archive-url=https://web.archive.org/web/20160828222008/http://www.iclarified.com/41824/pangu-untethered-jailbreak-of-ios-711-has-been-released|archive-date=August 28, 2016|url-status=live}}</ref>
| {{flatlist|
| {{flatlist|
* [[iPad 2|2]]
* [[iPad 2|2]]
Line 660: Line 608:
* [[iPhone 5S|5S]]<ref name="iclarified-pangu-release" />}}
* [[iPhone 5S|5S]]<ref name="iclarified-pangu-release" />}}
| [[iPod Touch (5th generation)|5]]<ref name="iclarified-pangu-release" />
| [[iPod Touch (5th generation)|5]]<ref name="iclarified-pangu-release" />
| 7.1 7.1.2
| 7.1
| 7.1.2
| {{yes}}
| {{yes}}
| dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)
| dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)
|[[Proprietary software|Proprietary]]
|-
|-


| [[Pangu Team|Pangu8]]
| Pangu8
| {{dts|2014-10-22|format=mdy}}
| {{dts|2014-10-22|format=mdy}}
| {{flatlist|
| {{flatlist|
Line 684: Line 634:
* [[iPhone 6 Plus|6 Plus]]}}
* [[iPhone 6 Plus|6 Plus]]}}
| [[iPod Touch (5th generation)|5]]
| [[iPod Touch (5th generation)|5]]
| 8.0 8.1
| 8.0
| 8.1
| {{yes}}
| {{yes}}
| windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)
| windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)
|[[Proprietary software|Proprietary]]
|-
|-


Line 710: Line 662:
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (6th generation)|6]]}}
* [[iPod Touch (6th generation)|6]]}}
| 8.0 8.4
| 8.0
| 8.4
| {{yes}}
| {{yes}}
| TaiG
| TaiG
|[[Proprietary software|Proprietary]]
|-
|-


| PPJailbreak
|[[PP Jailbreak|PPJailbreak]]
| {{dts|2015-01-18|format=mdy}}
| {{dts|2015-01-18|format=mdy}}
| {{flatlist|
| {{flatlist|
Line 736: Line 690:
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (6th generation)|6]]}}
* [[iPod Touch (6th generation)|6]]}}
| 8.0 8.4
| 8.0
| 8.4
| {{yes}}
| {{yes}}
| PanguTeam and PPJailbreak
| PanguTeam and PPJailbreak
|[[Proprietary software|Proprietary]]
|-
|-


| [[Pangu Team|Pangu9]]
| Pangu9
| {{dts|2015-10-14|format=mdy}}
| {{dts|2015-10-14|format=mdy}}
| {{flatlist|
| {{flatlist|
Line 766: Line 722:
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (5th generation)|5]]
* [[iPod Touch (6th generation)|6]]}}
* [[iPod Touch (6th generation)|6]]}}
| 9.0 9.1
| 9.0
| 9.1
| {{yes}}
| {{yes}}
| PanguTeam
| PanguTeam
|[[Proprietary software|Proprietary]]
|-
|-


| [[Pangu Team|Pangu9]]
| Pangu9
| {{dts|2016-03-23|format=mdy}}
| {{dts|2016-03-23|format=mdy}}
| colspan="3" style="text-align:center" | 4th generation [[Apple TV]]
| colspan="3" style="text-align:center" | 4th generation [[Apple TV]]
| 9.0 9.0.1
| 9.0
| 9.0.1
| {{yes}}
| {{yes}}
| PanguTeam
| PanguTeam
|[[Proprietary software|Proprietary]]
|-
|-


| LiberTV
| LiberTV
| {{dts|2017-03-03|format=mdy}}
| {{dts|2017-03-03|format=mdy}}
| colspan="3" style="text-align:center" | 4th generation [[Apple TV]]
| colspan="3" style="text-align:center" | 4th generation [[Apple TV]]
| 9.1 10.1
| 9.1
| 10.1
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Marco Grassi, Luca Todesco, Jonathan Levin
| Marco Grassi, Luca Todesco, Jonathan Levin
|[[Proprietary software|Proprietary]]
|-
|-


| LiberTV 1.1
| LiberTV 1.1
| {{dts|2017-12-24|format=mdy}}
| {{dts|2017-12-24|format=mdy}}
| colspan="3" style="text-align:center" | 4th & 5th generation (4K) [[Apple TV]]
| colspan="3" style="text-align:center" | 4th & 5th generation (4K) [[Apple TV]]
| 11.0 11.1
| 11.0
| 11.1
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Marco Grassi, Luca Todesco, Jonathan Levin
| Marco Grassi, Luca Todesco, Jonathan Levin
|[[Proprietary software|Proprietary]]
|-
|-


| PPJailbreak
|PPJailbreak
| {{dts|2016-07-24|format=mdy}}
| {{dts|2016-07-24|format=mdy}}
| {{flatlist|
| {{flatlist|
Line 810: Line 774:
* [[iPhone 6S|6S]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE|SE]]}}
* [[iPhone SE (1st generation)|SE (1st)]]}}
| {{flatlist|
| {{flatlist|
* [[iPod Touch (6th generation)|6]]}}
* [[iPod Touch (6th generation)|6]]}}
| 9.2 9.3.3
| 9.2
| 9.3.3
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| PanguTeam and PPJailbreak
| PanguTeam and PPJailbreak
|[[Proprietary software|Proprietary]]
|-
|-


| mach_portal + Yalu
| mach_portal + Yalu
| December 22, 2016
| {{dts|2016-12-22}}
| [[iPad Pro|Pro]]
| [[iPad Pro|Pro]]
| {{flatlist|
| {{flatlist|
Line 826: Line 792:
* [[IPhone 7|7]]
* [[IPhone 7|7]]
* [[IPhone 7 Plus|7 Plus]]}}
* [[IPhone 7 Plus|7 Plus]]}}
|[[IPod Touch (6th generation)|6]]
|
| 10.0.1-10.1.1 (depends on device)
| 10.0.1
| 10.1.1 (depends on device)
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Luca Todesco
| Luca Todesco
|
|-
|-


| [[Yalu (iOS)|yalu102]]
| yalu102
| January 26, 2017
| {{dts|2017-01-26}}
| {{flatlist|
| {{flatlist|
* [[iPad Air 2|Air 2]]
* [[iPad Air 2|Air 2]]
Line 845: Line 813:
* [[iPhone 6S|6S]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE|SE]]}}
* [[iPhone SE (1st generation)|SE (1st)]]}}
| [[IPod Touch (6th generation)|6]]
| [[IPod Touch (6th generation)|6]]
| 10.0.1 - 10.2
| 10.0.1
| 10.2
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Luca Todesco and Marco Grassi
| Luca Todesco and Marco Grassi
|[[WTFPL]]<ref>{{Cite web |title=yalu102/LICENSE at master · kpwn/yalu102 |url=https://github.com/kpwn/yalu102/blob/master/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084109/https://github.com/kpwn/yalu102/blob/master/LICENSE |url-status=live }}</ref>
|-
|-


| Phœnix
| Phœnix
| August 6, 2017<ref>{{Cite web|url=https://twitter.com/tihmstar/status/894341303630221314|title=Releasing Phoenix jailbreak for iOS 9.3.5 now!|last=tihmstar|first=|date=4:35 PM - 6 Aug 2017|website=@tihmstar|language=en|archive-url=|archive-date=|dead-url=|access-date=2017-12-19}}</ref>
| {{dts|2017-08-06}}<ref>{{cite tweet |user=tihmstar |number=894341303630221314 |date=August 6, 2017 |title=Releasing Phoenix jailbreak for iOS 9.3.5 now! All 32bit devices supported! Be sure to check PGP signature :) https://phoenixpwn.com |access-date=December 19, 2017}}</ref>
| {{flatlist|
| {{flatlist|
* [[IPad 2|2]]
* [[IPad 2|2]]
Line 865: Line 835:
| {{flatlist|
| {{flatlist|
* [[IPod Touch (5th generation)|5]]}}
* [[IPod Touch (5th generation)|5]]}}
| 9.3.5
| colspan="2"| 9.3.5
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Siguza and tihmstar
| Siguza and tihmstar
|[[Proprietary software|Proprietary]]
|-
|-

|Etason
| Etason
|September 19, 2017<ref>{{Cite web|url=https://etasonjb.tihmstar.net|title=EtasonJB|website=etasonjb.tihmstar.net|access-date=2017-12-19}}</ref>
| {{dts|2017-09-19}}<ref>{{Cite web|url=https://etasonjb.tihmstar.net|title=EtasonJB|website=etasonjb.tihmstar.net|access-date=December 19, 2017|archive-url=https://web.archive.org/web/20171210210421/https://etasonjb.tihmstar.net/|archive-date=December 10, 2017|url-status=live}}</ref>
|{{flatlist|
| {{flatlist|
* [[IPad 2|2]]
* [[IPad 2|2]]
* [[IPad (3rd generation)|3]]
* [[IPad (3rd generation)|3]]
* [[IPad (4th generation)|4]]
* [[IPad (4th generation)|4]]
* [[IPad Mini (1st generation)|Mini]]}}
* [[IPad Mini (1st generation)|Mini]]}}
|{{flatlist|
| {{flatlist|
* [[IPhone 4S|4S]]
* [[IPhone 4S|4S]]
* [[IPhone 5|5]]
* [[IPhone 5|5]]
* [[IPhone 5C|5C]]}}
* [[IPhone 5C|5C]]}}
|{{flatlist|
| {{flatlist|
* [[IPod Touch (5th generation)|5]]}}
* [[IPod Touch (5th generation)|5]]}}
|8.4.1| 8.4.1
| colspan="2"| 8.4.1
| {{yes}}
| {{yes}}
|tihmstar
| tihmstar
|[[Proprietary software|Proprietary]]
|-
|-


| Saïgon
| Saïgon
| October 15, 2017
| {{dts|2017-10-15}}
| {{flatlist|
| {{flatlist|
* [[iPad Air 2]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini (4th generation)|Mini 4]]}}
* [[iPad Mini (4th generation)|Mini 4]]}}
| {{flatlist|
| {{flatlist|
Line 898: Line 871:
* [[iPhone 6S|6S]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE|SE]]}}
* [[iPhone SE (1st generation)|SE (1st)]]}}
| {{flatlist|
| {{flatlist|
* [[IPod Touch (6th generation)|6]]}}
* [[IPod Touch (6th generation)|6]]}}
| 10.2.1
| colspan="2"| 10.2.1
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Abraham Masri
| Abraham Masri
|[[Proprietary software|Proprietary]]<ref>{{Cite web |last=Masri |first=Abraham |date=December 16, 2017 |title=GitHub - cheesecakeufo/saigon: iOS 10.2.1 Jailbreak - Discontinued version |url=https://github.com/cheesecakeufo/saigon |archive-url=https://web.archive.org/web/20180906063235/https://github.com/cheesecakeufo/saigon |archive-date=September 6, 2018 |access-date=August 30, 2023 |website=GitHub}}</ref>
|-
|-

|h3lix
| h3lix
|December 24, 2017
| {{dts|2017-12-24}}
|[[IPad (4th generation)|4]]
| {{flatlist|
|[[IPhone 5|5]] • [[IPhone 5C|5c]]
* [[IPad (4th generation)|4]]}}
|
| {{flatlist|
|10.0 - 10.3.3
* [[IPhone 5|5]]
* [[IPhone 5C|5c]]}}
|No support
| 10.0
| 10.3.4
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
|tihmstar
| tihmstar
|[[Proprietary software|Proprietary]]
|-
|-

|LiberiOS
| Meridian
|December 25, 2017
|{{dts|2018-01-04}}
|[[IPad Air 2|Air 2]] • [[IPad Mini 2|Mini 2]] • Mini 3 • Mini 4 • Pro
|{{flatlist|
|[[IPhone 5S|5S]] • [[IPhone 6|6]] • [[IPhone 6 Plus|6 Plus]] • [[IPhone 6S|6S]] • [[IPhone 6s Plus|6S Plus]] • [[IPhone SE|SE]] • [[IPhone 7|7]] • [[IPhone 7 Plus|7 Plus]] • [[IPhone 8|8]] • [[IPhone 8 Plus|8 Plus]] • [[IPhone X|X]]
* [[IPad (2017)|5]]
| {{flatlist|[[IPod Touch (6th generation)|6]]
* [[IPad Air|Air]]
| 11.0 - 11.1.2
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
|{{flatlist|
* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]}}
|{{flatlist|
* [[IPod Touch (6th generation)|6]]}}
| 10.0
| 10.3.3
| {{Partial|Semi-Untethered}}
| Sparkey, Ian Beer, Siguza, xerub, stek29, theninjaprawn, ARX8x, cheesecakeufo, FoxletFox, Sticktron, nullpixel, arpolix, EthanRDoesMC, CydiaBen, Comsecuris UG, Brandon Saldan, Lepidus, Cryptic, Samg_is_a_Ninja, M1sta<ref>{{Cite web|url=https://meridian.sparkes.zone|title=Meridian: iOS 10.x Jailbreak|last=Sparkes|first=Ben|website=meridian.sparkes.zone|language=en|access-date=June 22, 2018|archive-url=https://web.archive.org/web/20180623005208/https://meridian.sparkes.zone/|archive-date=June 23, 2018|url-status=live}}</ref>
|[[MIT License|MIT]]<ref>{{Cite web |title=MeridianJB/LICENSE.md at master · PsychoTea/MeridianJB |url=https://github.com/PsychoTea/MeridianJB/blob/master/LICENSE.md |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830152716/https://github.com/PsychoTea/MeridianJB/blob/master/LICENSE.md |url-status=live }}</ref>
|-

| g0blin
|{{dts|2018-01-13}}
|{{flatlist|
* [[IPad (2017)|5]]
* [[IPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
|{{flatlist|
* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]}}
|{{flatlist|
* [[IPod Touch (6th generation)|6]]}}
| 10.3
| 10.3.3
| {{Partial|Semi-Untethered}}
| Sticktron, Siguza, Ian Beer, windknown, Luca Todesco, xerub, tihmstar, saurik, uroboro, Abraham Masri, arx8x, PsychoTea, Cryptic
|[[Proprietary software|Proprietary]]
|-
|Spyware.lol<ref name="spyware_home">{{Cite web |url=https://totally-not.spyware.lol/ |title=Spyware.lol |access-date=March 22, 2019 |archive-date=December 6, 2022 |archive-url=https://web.archive.org/web/20221206191950/https://totally-not.spyware.lol/ |url-status=live }}</ref>
|September 7, 2018
|
* Air, Air 2
* iPad Mini 2, Mini 4, Mini 3
* iPad (5th generation)
* iPad Pro (9.7‑inch)
* iPad Pro (12.9‑inch)
* iPad Pro (10.5-inch)
* iPad Pro (12.9-inch) (2nd generation)
|
* iPhone SE
* iPhone 5s
* iPhone 6s
* iPhone 6
* iPhone 6s plus
* iPhone 6 plus
* iPhone 7
* iPhone 7 plus
|{{flatlist|* [[IPod Touch (6th generation)|6]]}}
|10.0
|10.3.3
|{{Partial|Semi-Untethered}}
|JakeBlair420
|[[Proprietary software|Proprietary]]
|-

| LiberiOS
| {{dts|2017-12-25}}
| {{flatlist|
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
| {{flatlist|
* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]
* [[IPhone 7|7]]
* [[IPhone 7 Plus|7 Plus]]
* [[IPhone 8|8]]
* [[IPhone 8 Plus|8 Plus]]
* [[IPhone X|X]]}}
| [[IPod Touch (6th generation)|6]]
| 11.0
| 11.1.2
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Marco Grassi, Luca Todesco, Jonathan Levin, Ian Beer
| Marco Grassi, Luca Todesco, Jonathan Levin, Ian Beer
|[[Proprietary software|Proprietary]]
|-
|-

|g0blin
| Electra1112
|January 13, 2018
| {{dts|2018-01-12}}
|[[IPad (4th generation)|4]] • [[IPad Air|Air]] • [[IPad Air 2|Air 2]] • [[IPad (2017)|iPad]] • [[IPad Mini 2|Mini 2]] • [[IPad Mini 3|Mini 3]] • [[IPad Mini 4|Mini 4]] • [[IPad Pro|Pro]]
| {{Flatlist|* [[IPad (2017)|5]]
|[[IPhone 5S|5S]] • [[IPhone 6|6]] • [[IPhone 6 Plus|6 Plus]] • [[IPhone 6S|6S]] • [[IPhone 6s Plus|6S Plus]] • [[IPhone SE|SE]]
* [[IPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
| {{flatlist|
* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]
* [[iPhone 7|7]]
* [[iPhone 7 Plus|7 Plus]]
* [[iPhone 8|8]]
* [[iPhone 8 Plus|8 Plus]]
* [[iPhone X|X]]}}
| [[IPod Touch (6th generation)|6]]
| 11.0
| 11.1.2
| {{Partial|Semi-Untethered}}
| CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, stek29, angelXwind, comex, isklikas, and goeo_, DHowett, and rpetrich
|[[GNU General Public License#Version 3|GPLv3]]<ref>{{Cite web |title=electra/LICENSE.md at master · coolstar/electra |url=https://github.com/coolstar/electra/blob/master/LICENSE.md |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084109/https://github.com/coolstar/electra/blob/master/LICENSE.md |url-status=live }}</ref>
|-

| Electra1131
| July 7, 2018
|{{Flatlist|* [[IPad (2017)|5]]
* [[IPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
|{{Flatlist|* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]
* [[iPhone 7|7]]
* [[iPhone 7 Plus|7 Plus]]
* [[iPhone 8|8]]
* [[iPhone 8 Plus|8 Plus]]
* [[iPhone X|X]]}}
|[[IPod Touch (6th generation)|6]]
|[[IPod Touch (6th generation)|6]]
| 11.0
| 10.3 - 10.3.3
| 11.4.1
| {{Partial|Semi-Untethered}}
| {{Partial|Semi-Untethered}}
| Sticktron, Siguza, Ian Beer, windknown, Luca Todesco, xerub, tihmstar, saurik, uroboro, Abraham Masri, arx8x, PsychoTea, Cryptic
| CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, Brandon Azad, stek29, Jamie Bishop, Pwn20wnd
|[[GNU General Public License#Version 3|GPLv3]]<ref>{{Cite web |title=electra1131/LICENSE.md at master · coolstar/electra1131 |url=https://github.com/coolstar/electra1131/blob/master/LICENSE.md |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084111/https://github.com/coolstar/electra1131/blob/master/LICENSE.md |url-status=live }}</ref>
|-

| ElectraTV
| {{dts|2018-07-12|format=mdy}}
| colspan="3" style="text-align:center" | 4th generation [[Apple TV]]
| 11.0
| 11.4.1
| {{Partial|Semi-Untethered}}
| nitoTV
|
|-

| unc0ver
| October 13, 2018
|{{Flatlist|* [[IPad (2017)|5]]
* [[IPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
|{{Flatlist|* [[iPhone 5S|5S]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6S|6S]]
* [[iPhone 6S Plus|6S Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]
* [[iPhone 7|7]]
* [[iPhone 7 Plus|7 Plus]]
* [[iPhone 8|8]]
* [[iPhone 8 Plus|8 Plus]]
* [[iPhone X|X]]
* [[iPhone XS|XS]]
* [[iPhone XS Max|XS Max]]
* [[iPhone XR|XR]]
* [[iPhone 11|11]]
* [[iPhone 11 Pro|11 Pro]]
* [[iPhone 11 Pro Max|11 Pro Max]]
* [[iPhone SE (2nd generation)|SE (2nd)]]}}

|{{Flatlist|* [[iPod Touch (6th generation)|6]]
* [[iPod Touch (7th generation)|7]]}}
| 11.0
| 14.8.1 (excludes 13.5.1)
| {{Partial|Semi-Untethered}}
|Pwn20wnd, Sam Bingner, Ian Beer, Brandon Azad, Jonathan Levin, xerub, sparkey, stek29, theninjaprawn
|[[BSD licenses#3-clause license ("BSD License 2.0", "Revised BSD License", "New BSD License", or "Modified BSD License")|New BSD License]]<ref>{{Cite web |title=Undecimus/LICENSE at master · pwn20wndstuff/Undecimus |url=https://github.com/pwn20wndstuff/Undecimus/blob/master/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830152719/https://github.com/pwn20wndstuff/Undecimus/blob/master/LICENSE |url-status=live }}</ref>
|-

| Chimera
|April 30, 2019
|{{Flatlist|* [[iPad (2017)|5]]
* [[iPad Air|Air]]
* [[iPad Air 2|Air 2]]
* [[iPad Mini 2|Mini 2]]
* [[iPad Mini 3|Mini 3]]
* [[iPad Mini (4th generation)|Mini 4]]
* [[iPad Pro|Pro]]}}
|{{Flatlist|* [[iPhone 5s|5s]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6s|6s]]
* [[iPhone 6s Plus|6s Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]
* [[iPhone 7|7]]
* [[iPhone 7 Plus|7 Plus]]
* [[iPhone 8|8]]
* [[iPhone 8 Plus|8 Plus]]
* [[iPhone X|X]]
* [[iPhone XS|XS]]
* [[iPhone XS Max|XS Max]]
* [[iPhone XR|XR]]}}
|{{Flatlist|* [[iPod Touch (6th generation)|6]]
* [[iPod Touch (7th generation)|7]]}}
| 12.0
| 12.5.7
| {{Partial|Semi-Untethered}}
|Coolstar, Jamie Bishop, tri'angle, ninjaprawn, Brandon Azad, PsychoTea, Ayden Panhuyzen, Umang Raghuvanshi, aesign
|
|-

| checkra1n
|November 10, 2019
|{{Flatlist|* All 64-bit iPads}}
|{{Flatlist|* [[iPhone 5s|5s]]
* [[iPhone 6|6]]
* [[iPhone 6 Plus|6 Plus]]
* [[iPhone 6s|6s]]
* [[iPhone 6s Plus|6s Plus]]
* [[iPhone SE (1st generation)|SE (1st)]]
* [[iPhone 7|7]]
* [[iPhone 7 Plus|7 Plus]]
* [[iPhone 8|8]]
* [[iPhone 8 Plus|8 Plus]]
* [[iPhone X|X]] (all iPhones with A7 to A11 chips)<ref>{{Cite web|url=https://arstechnica.com/information-technology/2019/09/unpatchable-bug-in-millions-of-ios-devices-exploited-developer-claims/?amp=1|title=Unpatchable bug in millions of iOS devices exploited, developer claims – Ars Technica|website=arstechnica.com|date=September 27, 2019 |access-date=December 19, 2019|archive-url=https://web.archive.org/web/20191224135534/https://arstechnica.com/information-technology/2019/09/unpatchable-bug-in-millions-of-ios-devices-exploited-developer-claims/?amp=1|archive-date=December 24, 2019|url-status=live}}</ref>
4th & 5th generation (4K) [[Apple TV]]}}
|{{Flatlist|* [[iPod Touch (6th generation)|6]]
* [[iPod Touch (7th generation)|7]]}}
| 12.0+
|14.8.1
| {{Rarely|Semi-Tethered}}<ref>{{Cite web|url=https://checkra.in|title=checkra1n Official Website|website=checkra.in|access-date=June 4, 2020|archive-url=https://web.archive.org/web/20200603223453/https://checkra.in/|archive-date=June 3, 2020|url-status=live}}</ref>
|argp, axi0mx, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza, haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini, Cellebrite, et al.
|[[Proprietary software|Proprietary]]
|-

| EtasonATV
| {{dts|2020-01-22|format=mdy}}
| colspan="3" style="text-align:center" | 3rd generation [[Apple TV]]
| colspan="2"| 7.4+
| {{yes}}
| tihmstar
|[[Proprietary software|Proprietary]]
|-
|Fugu
|February 2, 2020
|All [[Apple A10|A10]]-[[Apple A10X|A10X]]-based iPads
|{{Flatlist|* [[iPhone 7|7]]
* [[iPhone 7 Plus|7 Plus]]}}
|[[IPod Touch (7th generation)|7]]
|13.0
|13.5.1| 13.5.1
| {{Rarely|Semi-Tethered}}
|Linus Henze
|[[GNU General Public License#Version 3|GPLv3]]<ref>{{Cite web |title=Fugu/LICENSE at master · LinusHenze/Fugu |url=https://github.com/LinusHenze/Fugu/blob/master/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084112/https://github.com/LinusHenze/Fugu/blob/master/LICENSE |url-status=live }}</ref>
|-
|Odyssey
|August 28, 2020
|All iPads that support iOS 13
|iPhone 6s or newer
|[[IPod Touch (7th generation)|7]]
|13.0
|13.7
| {{Partial|Semi-Untethered}}
|CoolStar, Hayden Seay, 23Aaron, Tihmstar
|[[BSD licenses#3-clause license ("BSD License 2.0", "Revised BSD License", "New BSD License", or "Modified BSD License")|New BSD License]]<ref>{{Cite web |title=Odyssey/LICENSE.md at master · Odyssey-Team/Odyssey |url=https://github.com/Odyssey-Team/Odyssey/blob/master/LICENSE.md |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084109/https://github.com/Odyssey-Team/Odyssey/blob/master/LICENSE.md |url-status=live }}</ref>
|-
|Taurine
|April 1, 2021
|[[Apple A14|A14]] and below that support [[iOS 14]]
|[[Apple A14|A14]] and below that support [[iOS 14]]
|[[IPod Touch (7th generation)|7]]
|14.0
|14.3| 14.8.1<ref>{{Cite web |title=Taurine |url=https://taurine.app/ |access-date=2024-04-22 |website=taurine.app |language=en |archive-date=April 27, 2024 |archive-url=https://web.archive.org/web/20240427120354/https://taurine.app/ |url-status=live }}</ref>
| {{Partial|Semi-Untethered}}
|CoolStar, tihmstar, Diatrus, 23 Aaron, ModernPwner, pattern-f
|[[BSD licenses#4-clause license (original "BSD License")|BSD License]]<ref>{{Cite web |title=Taurine/LICENSE.md at main · Odyssey-Team/Taurine |url=https://github.com/Odyssey-Team/Taurine/blob/main/LICENSE.md |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830152715/https://github.com/Odyssey-Team/Taurine/blob/main/LICENSE.md |url-status=live }}</ref>
|-
|Fugu14
|October 24, 2021
|All [[Apple A12|A12]]-[[Apple A14|A14]]-based iPads
|All [[Apple A12|A12]]-[[Apple A14|A14]]-based iPhones
|No support
|14.2
|14.5.1| 14.5.1
| {{yes}}
|Linus Henze
|[[MIT License|MIT]]<ref>{{Cite web |title=Fugu14/LICENSE at master · LinusHenze/Fugu14 |url=https://github.com/LinusHenze/Fugu14/blob/master/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=May 24, 2024 |archive-url=https://web.archive.org/web/20240524180232/https://github.com/LinusHenze/Fugu14/blob/master/LICENSE |url-status=live }}</ref>
|-
|p0laris<ref name="Bouchard">{{Cite web |last=Bouchard |first=Anthony |date=April 20, 2022 |title=New p0laris jailbreak for legacy iOS 9.x firmware released |url=https://www.idownloadblog.com/2022/04/20/p0laris-ios-9-jailbreak/ |access-date=May 5, 2022 |website=iDownloadBlog.com |language=en-US |archive-date=May 6, 2022 |archive-url=https://web.archive.org/web/20220506082006/https://www.idownloadblog.com/2022/04/20/p0laris-ios-9-jailbreak/ |url-status=live }}</ref>
|April 20, 2022
| colspan="2" style="text-align:center" | All [[Apple A5|A5]]/[[Apple A5X|A5X]]-[[Apple A6|A6]]/[[Apple A6X|A6X]]-based devices
|[[IPod Touch (5th generation)|5]]
|9.3.5
|9.3.6
| {{Partial|Semi-Untethered}}
|spv
|[[GNU Lesser General Public License|LGPLv2.1]]<ref>{{Cite web |title=app/LICENSE at master · p0larisdev/app |url=https://github.com/p0larisdev/app/blob/master/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830152721/https://github.com/p0larisdev/app/blob/master/LICENSE |url-status=live }}</ref>
|-
|openpwnage<ref name="0xilis">{{cite web |url=https://github.com/0xilis/openpwnage |title=openpwnage GitHub Page |website=[[GitHub]] |access-date=February 23, 2023 |archive-date=January 14, 2023 |archive-url=https://web.archive.org/web/20230114105925/https://github.com/0xilis/openpwnage |url-status=live }}</ref>
|May 19, 2022
| colspan="2" style="text-align:center" | All [[Apple A5|A5]]/[[Apple A5X|A5X]]-[[Apple A6|A6]]/[[Apple A6X|A6X]]-based devices
| [[IPod Touch (5th generation)|5]]
|8.4b4
|9.3.6
| {{Partial|Semi-Untethered}}
|0xilis
|[[GNU Lesser General Public License|LGPLv2.1]]<ref>{{Cite web |title=openpwnage/LICENSE at main · 0xilis/openpwnage |url=https://github.com/0xilis/openpwnage/blob/main/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084109/https://github.com/0xilis/openpwnage/blob/main/LICENSE |url-status=live }}</ref>
|-
|Blizzard Jailbreak<ref name="blizzard">{{cite web |url=https://idevicecentral.com/jailbreak-news/new-blizzard-jailbreak-released-by-geosn0w-for-ios-9-0-9-3-6-32-bit-devices/ |title=New Blizzard Jailbreak released by GeoSn0w For iOS 9.0 – 9.3.6, 32-Bit Devices |website=idevicecentral.com |date=August 4, 2022 |access-date=October 21, 2023 |archive-date=November 3, 2023 |archive-url=https://web.archive.org/web/20231103030537/https://idevicecentral.com/jailbreak-news/new-blizzard-jailbreak-released-by-geosn0w-for-ios-9-0-9-3-6-32-bit-devices/ |url-status=live }}</ref>
|August 4, 2022
| colspan="2" style="text-align:center" | All [[Apple A5|A5]]/[[Apple A5X|A5X]]-[[Apple A6|A6]]/[[Apple A6X|A6X]]-based devices
| [[IPod Touch (5th generation)|5]]
|8.4b4
|9.3.6
| {{Partial|Semi-Untethered}}
|GeoSn0w
|[[GNU General Public License|LGPLv3.0]]<ref>{{Cite web |title=Blizzard-Jailbreak-9/LICENSE at main · geosn0w/Blizzard-Jailbreak-9 |url=https://github.com/GeoSn0w/Blizzard-Jailbreak-9/blob/main/LICENSE |access-date=October 21, 2023 |website=GitHub |language=en |archive-date=August 2, 2022 |archive-url=https://web.archive.org/web/20220802231142/https://github.com/GeoSn0w/Blizzard-Jailbreak-9/blob/main/LICENSE |url-status=live }}</ref>
|-
|palera1n
|September 17, 2022
|A11 and below that support iOS 15/16/17
|A11 and below that support iOS 15/16
|[[IPod Touch (7th generation)|7]]
|15.0
|18.0 Betas
| {{Partial|Semi-Tethered{{efn|A tethered variant is also available prior to v2.0.0-beta.1.<ref>{{Cite web |date=February 12, 2023 |title=Release 2.0 beta 1 · palera1n/palera1n-c |url=https://github.com/palera1n/palera1n-c/releases/tag/v2.0.0-beta.1 |website=GitHub |access-date=October 13, 2023 |archive-date=March 19, 2023 |archive-url=https://web.archive.org/web/20230319120341/https://github.com/palera1n/palera1n-c/releases/tag/v2.0.0-beta.1 |url-status=live }}</ref>}}}}
|Nebula, Mineek, Nathan, Lakhan Lothiyi, Tom, Nick Chan, Flower
|[[MIT License|MIT]]<ref>{{Cite web |title=palera1n/LICENSE at main · palera1n/palera1n |url=https://github.com/palera1n/palera1n/blob/main/LICENSE |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084109/https://github.com/palera1n/palera1n/blob/main/LICENSE |url-status=live }}</ref>
|-
|XinaA15<ref>{{Cite web |title=XinaA15 GitHub Page |url=https://github.com/jacksight/xina520_official_jailbreak |access-date=January 1, 2023 |website=[[GitHub]] |archive-date=January 1, 2023 |archive-url=https://web.archive.org/web/20230101202858/https://github.com/jacksight/xina520_official_jailbreak |url-status=live }}</ref>
|December 7, 2022
| colspan="2" style="text-align:center" |All [[Apple A12|A12]]-[[Apple A15|A15]] based devices
[[Apple M1|M1]] based iPads
|No support
|15.0
|15.4.1
| {{Partial|Semi-Untethered}}
|Xina520
|[[Proprietary software|Proprietary]]
|-
|Dopamine<ref>{{Citation |last=Fröder |first=Lars |title=Dopamine GitHub Page |date=August 18, 2023 |url=https://github.com/opa334/Dopamine |access-date=August 18, 2023 |website=[[GitHub]] |archive-date=August 16, 2023 |archive-url=https://web.archive.org/web/20230816013648/https://github.com/opa334/Dopamine |url-status=live }}</ref>
|May 3, 2023
|All [[Apple A9|A9]]-[[Apple A16|A16]], [[Apple M1|M1]]-[[Apple M2|M2]] based iPads
|All [[Apple A9|A9]]-[[Apple A16|A16]] based iPhones
|[[IPod Touch (7th generation)|7]]
|15.0
|16.6.1 ([[Apple A9|A9]]-[[Apple A11|A11]])
16.5.1 ([[Apple A12|A12]]-[[Apple A14|A14]], [[Apple M1|M1]])

16.5 ([[Apple A15|A15]]-[[Apple A16|A16]], [[Apple M2|M2]])
| {{Partial|Semi-Unthethered}}
|Lars Fröder
|[[MIT License|MIT]]<ref>{{Cite web |title=Dopamine/LICENSE.md at master · opa334/Dopamine |url=https://github.com/opa334/Dopamine/blob/master/LICENSE.md |access-date=August 30, 2023 |website=GitHub |language=en |archive-date=August 30, 2023 |archive-url=https://web.archive.org/web/20230830084111/https://github.com/opa334/Dopamine/blob/master/LICENSE.md |url-status=live }}</ref>
|-
|Bootstrap<ref>{{Cite web |title=roothide/Bootstrap GitHub Page |url=https://github.com/roothide/Bootstrap |access-date=February 7, 2024 |website=[[GitHub]] |archive-date=February 7, 2024 |archive-url=https://web.archive.org/web/20240207131238/https://github.com/roothide/Bootstrap |url-status=live }}</ref>
|February 7, 2024
| colspan="2" style="text-align:center" |All [[Apple A8|A8]]-[[Apple A15|A15]] based devices
[[Apple M1|M1]]-[[Apple M2|M2]] based iPads
|[[IPod Touch (7th generation)|7]]
|15.0
|17.0
| {{Partial|Semi-Untethered}}
|Tb
|[[MIT License|MIT]]<ref>{{Cite web |title=Bootstrap/LICENSE at main · roothide/Bootstrap |url=https://github.com/roothide/Bootstrap/blob/main/LICENSE |access-date=2024-04-08 |website=GitHub |language=en |archive-date=April 8, 2024 |archive-url=https://web.archive.org/web/20240408050347/https://github.com/roothide/Bootstrap/blob/main/LICENSE |url-status=live }}</ref>
|-
|nathanlr<ref>{{Cite tweet |number=1823487844750442687 |user=dedbeddedbed |title=nathanlr}}</ref>
|August 13, 2024
| colspan="2" style="text-align:center" |All [[Apple A12|A12]]-[[Apple A15|A15]] based devices
[[Apple M1|M1]]-[[Apple M2|M2]] based iPads
|No support
|16.5.1
|16.6.1<ref>{{Cite tweet |number=1823488171738312882 |user=dedbeddedbed |title=16.5.1-16.6.1}}</ref>
| {{Partial|Semi-Untethered}}
|verygenericname
|[[BSD licenses#3-clause license ("BSD License 2.0", "Revised BSD License", "New BSD License", or "Modified BSD License")|New BSD License]]<ref>{{Cite web |title=nathanlr/LICENSE at main · verygenericname/nathanlr |url=https://github.com/verygenericname/nathanlr/blob/main/LICENSE |access-date=2024-10-06 |website=GitHub |language=en}}</ref>
|}
|}

== History of exploit-disabling patch releases ==
Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original [[evasi0n]] iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Boot ROM exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.<ref>{{cite web|title = Apple adds jailbreak resistance to recent iPhone 3GS models|url = https://arstechnica.com/apple/2009/10/apple-adds-jailbreak-resistance-to-recent-iphone-3gs-models/|access-date = June 20, 2015|date = October 14, 2009|archive-url = https://web.archive.org/web/20150621040227/http://arstechnica.com/apple/2009/10/apple-adds-jailbreak-resistance-to-recent-iphone-3gs-models/|archive-date = June 21, 2015|url-status = live}}</ref>

On July 15, 2011, Apple released a new iOS version that closed the exploit used in [[JailbreakMe]] 3.0. The German [[Federal Office for Information Security]] had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or [[malware]] unwillingly downloaded by iOS users clicking on maliciously crafted [[PDF]] files.<ref>{{cite news|url=http://www.news-record.com/content/2011/07/08/article/security_holes_discovered_in_iphones_ipads|title=Security holes discovered in iPhones, iPads|last=Robertson|first=Jordan|work=[[News & Record]]|agency=[[Associated Press]]|date=July 8, 2011|access-date=July 9, 2011|url-status=dead|archive-url=https://web.archive.org/web/20110711154914/http://www.news-record.com/content/2011/07/08/article/security_holes_discovered_in_iphones_ipads|archive-date=July 11, 2011}}</ref>

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.<ref>{{cite web|url=http://www.mobileswire.com/ios-8-4-1-jailbreak-status-updated/|title=Taig and Pangu working on Jailbreak for IOS 8.4.1 |archive-url=https://web.archive.org/web/20150923060032/http://www.mobileswire.com/ios-8-4-1-jailbreak-status-updated/ |archive-date=September 23, 2015}}</ref>{{Clarification needed|date=September 2022|reason=This doesn’t make sense. The source does mention this, but it’s very unclear what it means and it’s not a very good source anyway.}}

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.<ref>{{cite web|url=http://ioshacker.com/news/ios-9s-rootless-security-system-dubbed-as-a-heavy-blow-to-jailbreak-community|title=iOS 9's Rootless security system dubbed as a 'heavy blow' to jailbreak community|access-date=October 10, 2015|date=May 22, 2015|archive-url=https://web.archive.org/web/20151122034602/http://ioshacker.com/news/ios-9s-rootless-security-system-dubbed-as-a-heavy-blow-to-jailbreak-community|archive-date=November 22, 2015|url-status=live}}</ref>

On October 21, 2015, seven days after the Pangu iOS 9.0–9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.<ref name="TechCrunch Pangu">{{cite web|title = Apple's iOS 9.1 Shuts Down The Pangu Hacking Team's Jailbreak|url = https://techcrunch.com/2015/10/21/apples-ios-9-1-shuts-down-the-pangu-hacking-teams-jailbreak/|website = TechCrunch|access-date = November 11, 2015|first = Sarah|last = Perez| date=October 21, 2015 |archive-url = https://web.archive.org/web/20151111113527/http://techcrunch.com/2015/10/21/apples-ios-9-1-shuts-down-the-pangu-hacking-teams-jailbreak/|archive-date = November 11, 2015|url-status = live}}</ref>

On January 23, 2017, Apple released iOS 10.2.1 to patch jailbreak exploits released by Google for the Yalu iOS 10 jailbreak created by Luca Todesco.<ref>{{Cite news|url=https://support.apple.com/en-gb/HT207482|title=About the security content of iOS 10.2.1|work=Apple Support|access-date=March 19, 2017|language=en-GB|archive-url=https://web.archive.org/web/20170216105636/https://support.apple.com/en-gb/HT207482|archive-date=February 16, 2017|url-status=live}}</ref>

On December 10, 2019, Apple used [[Digital Millennium Copyright Act|DMCA]] takedown requests to remove posts from Twitter. The tweet contained an encryption key that could potentially be used to reverse engineer the iPhone's Secure Enclave. Apple later retracted the claim, and the tweet was reinstated.<ref>{{cite web |last1=Clover |first1=Juli |title=Apple Used DMCA Takedown to Temporarily Remove Tweet With iPhone Encryption Key |url=https://www.macrumors.com/2019/12/11/apple-iphone-encryption-dmca-tweet-takedown/ |website=macrumors.com |date=December 11, 2019 |access-date=December 16, 2019 |language=en |archive-url=https://web.archive.org/web/20191213092141/https://www.macrumors.com/2019/12/11/apple-iphone-encryption-dmca-tweet-takedown/ |archive-date=December 13, 2019 |url-status=live }}</ref>

On June 1, 2020, Apple released the 13.5.1 update, patching the zero-day exploit used by the Unc0ver jailbreak.<ref>{{Cite web|last=Gartenberg|first=Chaim|date=June 1, 2020|title=Apple releases iOS 13.5.1, patching out the Unc0ver jailbreak|url=https://www.theverge.com/2020/6/1/21277281/apple-ios-13-5-1-patch-unc0ver-jailbreak-update-software-install|access-date=June 16, 2020|website=The Verge|language=en|archive-date=December 17, 2020|archive-url=https://web.archive.org/web/20201217073212/https://www.theverge.com/2020/6/1/21277281/apple-ios-13-5-1-patch-unc0ver-jailbreak-update-software-install|url-status=live}}</ref>

On September 20, 2021, Apple released [[IOS 15|iOS/iPadOS 15]], which introduced signed system volume security to iOS/iPadOS, meaning that any changes to the root file system would revert to the latest snapshot on a reboot, and changes to the snapshot would make the device unbootable.<ref>{{Cite web |title=Signed system volume security in macOS |url=https://support.apple.com/guide/security/signed-system-volume-security-secd698747c9/web |access-date=April 15, 2022 |website=Apple Support |language=en |archive-date=May 14, 2022 |archive-url=https://web.archive.org/web/20220514042145/https://support.apple.com/guide/security/signed-system-volume-security-secd698747c9/web |url-status=live }}</ref> As a result, jailbreak development slowed considerably, and for the first time in jailbreaking history, the latest iPhone did not get a jailbreak before a new model was released.

On September 12, 2022, Apple released iOS 16, which introduced a new firmware component known as Cryptex1. New Cryptex1 versions are almost never compatible with old iOS versions, making downgrading impossible except within patch versions (i.e. 16.3 and 16.3.1).{{Citation needed|date=March 2023}}

== Legality ==
The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting [[digital rights management]] (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.

International treaties have influenced the development of laws affecting jailbreaking. The 1996 [[World Intellectual Property Organization Copyright Treaty|World Intellectual Property Organization (WIPO) Copyright Treaty]] requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the [[Digital Millennium Copyright Act]] (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 [[Copyright Directive|European Copyright Directive]] implemented the treaty in Europe, requiring member states of the [[European Union]] to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software,<ref name="Duncan Geere">{{cite magazine |author=Duncan Geere |url=https://www.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-iphone |title=Investigation: Is it legal to jailbreak a UK iPhone? |magazine=Wired UK |date=July 28, 2010 |access-date=October 26, 2012 |archive-url=https://web.archive.org/web/20121031034914/http://www.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-iphone |archive-date=October 31, 2012 |url-status=live }}</ref> but member states vary on the implementation of the directive.

While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one.<ref>{{cite web|last1=Greenberg|first1=Andy|title=iPhone Uber-Hacker Comex Is Out At Apple|url=https://www.forbes.com/sites/andygreenberg/2012/10/18/iphone-uber-hacker-comex-is-out-at-apple/|website=Forbes|access-date=August 15, 2015|archive-url=https://web.archive.org/web/20150923004600/http://www.forbes.com/sites/andygreenberg/2012/10/18/iphone-uber-hacker-comex-is-out-at-apple/|archive-date=September 23, 2015|url-status=live}}</ref><ref name="After Doing Insane Things With iOS, Jailbreak Hacker Winocm Joins Apple">{{cite web|last1=Heath|first1=Alex|title=After Doing "Insane Things With iOS," Jailbreak Hacker Winocm Joins Apple|url=http://www.cultofmac.com/267419/ios-jailbreak-hacker-winocm-joining-apple-later-year/|website=Cult of Mac|access-date=November 22, 2015|date=February 21, 2014|archive-url=https://web.archive.org/web/20151122234134/http://www.cultofmac.com/267419/ios-jailbreak-hacker-winocm-joining-apple-later-year/|archive-date=November 22, 2015|url-status=live}}</ref> Apple has also regularly credited jailbreak developers with detecting security holes in iOS release notes.<ref name="8.4.1 release notes">{{cite web|title=8.4.1 release notes|url=https://support.apple.com/en-gb/HT205030|publisher=Apple|access-date=August 15, 2015|archive-url=https://web.archive.org/web/20150906165029/https://support.apple.com/en-gb/HT205030|archive-date=September 6, 2015|url-status=live}}</ref>

Apple's support article concerning jailbreaking claims that they "may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software," which includes jailbreaking.<ref>{{Cite news|url=https://support.apple.com/en-us/HT201954|title=Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues|newspaper=Apple Support|access-date=February 14, 2017|language=en-US|archive-url=https://web.archive.org/web/20161223205502/https://support.apple.com/en-us/HT201954|archive-date=December 23, 2016|url-status=live}}</ref>

=== Australia ===
In 2010, [[Electronic Frontiers Australia]] said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply.<ref>{{cite web |url= http://www.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-jail.aspx |title= Could jailbreaking your iPhone land you in jail? |author= Rosalyn Page |date= August 5, 2010 |publisher= PC & Tech Authority |access-date= January 21, 2013 |archive-url= https://web.archive.org/web/20131021010517/http://www.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-jail.aspx |archive-date= October 21, 2013 |url-status= dead }}</ref> These laws had been strengthened by the [[Copyright law of Australia#Copyright Amendment Act 2006|Copyright Amendment Act 2006]].

=== Canada ===
In November 2012, Canada [[Copyright law of Canada#Reform (1988–2012)|amended its Copyright Act]] with new provisions prohibiting tampering with DRM protection, with exceptions including software interoperability.<ref>{{cite web |url= http://www.michaelgeist.ca/content/view/6692/125/ |title= Canadian Copyright Reform In Force: Expanded User Rights Now the Law |author= [[Michael Geist]] |date= November 7, 2012 |publisher= michaelgeist.ca |access-date= November 13, 2012 |archive-url= https://web.archive.org/web/20121109182709/http://www.michaelgeist.ca/content/view/6692/125 |archive-date= November 9, 2012 |url-status= dead }}</ref> Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, [[Bill C-61 (39th Canadian Parliament, 2nd Session)|Bill C-61]], and [[Bill C-32 (40th Canadian Parliament, 3rd Session)|Bill C-32]]) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,<ref>{{cite web |url=https://www.eff.org/deeplinks/2012/02/canadas-c-11-bill-and-hazards-digital-locks-provisions |title=Canada's C-11 Bill and the Hazards of Digital Locks Provisions |publisher=Electronic Frontier Foundation |date=February 10, 2012 |access-date=October 17, 2012 |archive-url=https://web.archive.org/web/20121017235618/https://www.eff.org/deeplinks/2012/02/canadas-c-11-bill-and-hazards-digital-locks-provisions |archive-date=October 17, 2012 |url-status=live }}</ref> but those bills were set aside. In 2011, [[Michael Geist]], a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.<ref>{{cite news |author= The Canadian Press |url= http://www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-1.707707 |title= Phone 'jailbreaking' allows users to hack their phone |publisher= CTV News |date= October 13, 2011 |access-date= October 17, 2012 |archive-url= https://web.archive.org/web/20121107105637/http://www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-1.707707 |archive-date= November 7, 2012 |url-status= live }}</ref>

=== India ===
[[Copyright law of India|India's copyright law]] permits circumventing DRM for non-copyright-infringing purposes.<ref name="copyright-india">{{cite web |url= https://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012/tpm-copyright-amendment |title= Technological Protection Measures in the Copyright (Amendment) Bill, 2010 |author= Pranesh Prakash |date= April 29, 2010 |publisher= [[Centre for Internet and Society (India)|Centre for Internet and Society]] |access-date= July 14, 2022 |archive-date= November 1, 2013 |archive-url= https://web.archive.org/web/20131101053020/http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012/tpm-copyright-amendment |url-status= live }}</ref><ref name="copyright-india-ars">{{cite web |url= https://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad/ |title= India's copyright proposals are un-American (and that's bad) |author= Nate Anderson |date= April 22, 2010 |work= [[Ars Technica]] |publisher= [[Condé Nast]] |access-date= November 10, 2012 |archive-url= https://web.archive.org/web/20121203011221/http://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad/ |archive-date= December 3, 2012 |url-status= live }}</ref> Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.<ref>{{cite web |url= https://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012 |title= Analysis of the Copyright (Amendment) Bill 2012 |author= Pranesh Prakash |date= May 23, 2012 |publisher= [[Centre for Internet and Society (India)|Centre for Internet and Society]] |access-date= July 14, 2022 |archive-date= April 24, 2014 |archive-url= https://web.archive.org/web/20140424051435/http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012 |url-status= live }}</ref> India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US [[Special 301 Report]] "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.<ref name="copyright-india" /><ref name="copyright-india-ars" />

=== New Zealand ===
[[Copyright law of New Zealand|New Zealand's copyright law]] allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.<ref>{{cite web |author=[[Michael Geist]] |url=http://www.michaelgeist.ca/content/view/2829/125/ |title=New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility |publisher=Michael Geist |date=April 10, 2008 |access-date=October 26, 2012 |archive-url=https://web.archive.org/web/20120419083000/http://www.michaelgeist.ca/content/view/2829/125/ |archive-date=April 19, 2012 |url-status=dead }}</ref><ref>{{cite news|author=Stephen Bell |url=http://computerworld.co.nz/news.nsf/news/law-changes-required-before-nz-ratifies-acta |archive-url=https://web.archive.org/web/20110930234801/http://computerworld.co.nz/news.nsf/news/law-changes-required-before-nz-ratifies-acta |url-status=dead |archive-date=September 30, 2011 |title=Law changes required before NZ ratifies ACTA |publisher=ComputerWorld New Zealand |date=September 30, 2011 |access-date=October 26, 2012 }}</ref> This law was added to the [[Copyright Act 1994]] as part of the [[Copyright (New Technologies) Amendment Act 2008]].

=== Singapore ===
Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.<ref>{{cite web|url=http://www.digitalone.com.sg/news/article/12884 |archive-url=https://web.archive.org/web/20100815122823/http://www.digitalone.com.sg/news/article/12884 |url-status=dead |archive-date=August 15, 2010 |title=iPhone jailbreak may be legal here, but... But there will be certain legal provisions. |author=Kenny Chee |date=August 12, 2010 |work=DigitalOne |publisher=[[AsiaOne]] |access-date=November 10, 2012 }}</ref>

=== United Kingdom ===
The law [[Copyright and Related Rights Regulations 2003]] makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court.<ref name="Duncan Geere" /><ref>{{cite web |url= http://www.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-iphone/ |title= How to jailbreak your iPhone: Unleash the full potential of your iPhone |author= Jim Martin |date= March 14, 2012 |publisher= PC Advisor |access-date= January 21, 2013 |archive-url= https://web.archive.org/web/20121222040110/http://www.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-iphone/ |archive-date= December 22, 2012 |url-status= dead }}</ref> Competition laws may also be relevant.<ref>{{cite web |url= https://www.electronicsweekly.com/news/business/information-technology/iphone-jailbreaking-is-okay-under-eu-law-2010-07/ |title= iPhone jailbreaking is 'okay under EU law' |author= Warwick Ashford |date= July 30, 2010 |work= Computer Weekly |publisher= Electronics Weekly |access-date= July 14, 2022 |archive-date= July 14, 2022 |archive-url= https://web.archive.org/web/20220714234544/https://www.electronicsweekly.com/news/business/information-technology/iphone-jailbreaking-is-okay-under-eu-law-2010-07/ |url-status= live }}</ref>

=== United States ===
The main law that affects the legality of iOS jailbreaking in the United States is the 1998 [[Digital Millennium Copyright Act]] (DMCA), which says "no person shall circumvent a [[digital rights management|technological measure]] that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking.<ref>{{cite web |url=http://www.copyright.gov/fedreg/2012/77fr65260.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |author=Copyright Office, Library of Congress |date=October 2012 |publisher=Federal Register |access-date=February 3, 2014 |archive-url=https://web.archive.org/web/20140104025052/http://www.copyright.gov/fedreg/2012/77fr65260.pdf |archive-date=January 4, 2014 |url-status=live }}</ref> Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally,<ref>{{cite news |author=David Goldman |url=https://money.cnn.com/2010/07/26/technology/iphone_jailbreaking/ |title=Jailbreaking iPhone apps is now legal |work=CNN Money |date=July 26, 2010 |access-date=September 11, 2010 |archive-url=https://web.archive.org/web/20100830035354/http://money.cnn.com/2010/07/26/technology/iphone_jailbreaking/ |archive-date=August 30, 2010 |url-status=live }}</ref> and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets.<ref>{{cite web|url = https://www.federalregister.gov/articles/2015/10/28/2015-27212/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control#h-17|title = Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies|date = October 28, 2015|access-date = November 20, 2015|website = Federal Register|publisher = The United States Government|archive-url = https://web.archive.org/web/20151121174458/https://www.federalregister.gov/articles/2015/10/28/2015-27212/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control#h-17|archive-date = November 21, 2015|url-status = live}}</ref> It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning.<ref name="otm" /> It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.<ref name="otm">{{cite web |url=http://www.onthemedia.org/transcripts/2010/07/30/03 |archive-url=https://web.archive.org/web/20100731150659/http://www.onthemedia.org/transcripts/2010/07/30/03 |url-status=dead |archive-date=July 31, 2010 |title=Transcript of "Jailbreak?" (July 30, 2010) |publisher=On The Media |date=July 30, 2010 |access-date=September 11, 2010}}</ref>

In 2010, Apple announced that jailbreaking "can violate the warranty".<ref name="cult">{{cite web |url= http://www.cultofmac.com/apples-official-response-to-dmca-jailbreak-exemption-it-voids-your-warranty/52463 |title= Apple's Official Response To DMCA Jailbreak Exemption: It Voids Your Warranty |author= Leander Kahney |date= July 26, 2010 |publisher= Cult Of Mac |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20131123142844/http://www.cultofmac.com/apples-official-response-to-dmca-jailbreak-exemption-it-voids-your-warranty/52463 |archive-date= November 23, 2013 |url-status= dead }}</ref>

==== Digital Millennium Copyright Act exemptions ====
In 2007, [[Tim Wu]], a professor at [[Columbia Law School]], argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."<ref name="slate-wu">{{cite web |url= http://www.slate.com/id/2175304/ |title= The iPhone Freedom Fighters |author= Tim Wu |date= October 4, 2007 |work= Technology |publisher= Slate |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20110924084544/http://www.slate.com/id/2175304 |archive-date= September 24, 2011 |url-status= live }}</ref> Wu cited an explicit exemption issued by the [[Library of Congress]] in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.<ref>{{cite web |url=http://www.copyright.gov/fedreg/2006/71fr68472.pdf |title=Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for |access-date=September 11, 2010 |archive-url=https://web.archive.org/web/20100710102554/http://www.copyright.gov/fedreg/2006/71fr68472.pdf |archive-date=July 10, 2010 |url-status=dead }}</ref> Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.<ref name="slate-wu" />

In 2010, in response to a request by the [[Electronic Frontier Foundation]], the [[United States Copyright Office|U.S. Copyright Office]] explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.<ref>{{cite web |url=http://www.copyright.gov/1201/ |title=Copyright office provides exemption to DMCA |publisher=[[United States Copyright Office]] |date=February 12, 2009 |access-date=July 17, 2009 |archive-url=https://web.archive.org/web/20090806213422/http://www.copyright.gov/1201/ |archive-date=August 6, 2009 |url-status=dead }}</ref><ref>{{cite web |url= http://news.cnet.com/8301-13578_3-20011661-38.html |title= Feds say mobile-phone jailbreaking is OK |author= Declan McCullagh |date= July 26, 2010 |work= [[CNET]] |publisher= [[CBS Interactive]] |access-date= October 26, 2011 |archive-url= https://web.archive.org/web/20111007193710/http://news.cnet.com/8301-13578_3-20011661-38.html |archive-date= October 7, 2011 |url-status= live }}</ref> [[Apple Inc.|Apple]] had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010, that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.<ref name="U.S. Copyright Office 2013 Ruling">{{cite web |url=http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |publisher=U.S. Copyright Office |access-date=October 31, 2012 |archive-url=https://web.archive.org/web/20121119084311/http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |archive-date=November 19, 2012 |url-status=dead }}</ref><ref name="ars-jailbreaking-2012">{{cite web |author=Timothy B. Lee |url=https://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |title=Jailbreaking now legal under DMCA for smartphones, but not tablets |work=[[Ars Technica]] |publisher=[[Condé Nast]] |date=October 25, 2012 |access-date=October 26, 2012 |archive-url=https://web.archive.org/web/20121027192318/http://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |archive-date=October 27, 2012 |url-status=live }}</ref><ref name="Android Police">{{cite web |url=http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |title=New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past |publisher=Android Police |access-date=October 31, 2012 |date=October 27, 2012 |archive-url=https://web.archive.org/web/20121030123310/http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |archive-date=October 30, 2012 |url-status=dead }}</ref> The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.<ref name="ars-jailbreaking-2012" /> In 2015, these exemptions were extended to include other devices, including tablets.<ref>{{Cite web|last=Statt|first=Nick|date=October 27, 2015|title=US government says it's now okay to jailbreak your tablet and smart TV|url=https://www.theverge.com/2015/10/27/9622066/jailbreak-unlocked-tablet-smart-tvs-dmca-exemption-library-of-congress|access-date=August 14, 2020|website=The Verge|language=en|archive-date=August 13, 2020|archive-url=https://web.archive.org/web/20200813040011/https://www.theverge.com/2015/10/27/9622066/jailbreak-unlocked-tablet-smart-tvs-dmca-exemption-library-of-congress|url-status=live}}</ref>

== Risks ==
=== Security, privacy and stability ===
The first [[iPhone]] [[Computer worm|worm]], [[Ikee|iKee]], appeared in early November 2009, created by a 21-year-old Australian student in the town of [[Wollongong, New South Wales|Wollongong]]. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an [[Secure Shell|SSH]] service, which those users can leave in the default insecure state.<ref>{{cite news|author=Brigid Andersen|date=November 9, 2009|title=Australian admits creating first iPhone virus|newspaper=[[ABC Online]]|url=http://www.abc.net.au/news/2009-11-09/australian-admits-creating-first-iphone-virus/1135474|url-status=live|access-date=October 26, 2011|archive-url=https://web.archive.org/web/20111202235511/http://www.abc.net.au/news/2009-11-09/australian-admits-creating-first-iphone-virus/1135474|archive-date=December 2, 2011}}</ref> In the same month, [[F-Secure]] reported on a new malicious worm compromising bank transactions from jailbroken phones in the [[Netherlands]], similarly affecting devices where the owner had installed SSH without changing the default password.<ref>{{Cite news|date=November 23, 2009|title=New iPhone worm can act like botnet say experts|work=BBC News|url=http://news.bbc.co.uk/2/hi/technology/8373739.stm|url-status=live|access-date=April 10, 2010|archive-url=https://web.archive.org/web/20100112072331/http://news.bbc.co.uk/2/hi/technology/8373739.stm|archive-date=January 12, 2010}}</ref><ref>{{cite web|author=Mikko|date=November 22, 2009|title=Malicious iPhone Worm|url=http://www.f-secure.com/weblog/archives/00001822.html|url-status=live|archive-url=https://web.archive.org/web/20091125151635/http://www.f-secure.com/weblog/archives/00001822.html|archive-date=November 25, 2009|access-date=April 10, 2010|work=News from the Lab|publisher=F-secure}}</ref>

Restoring a device with iTunes removes a jailbreak.<ref>{{cite web|author=Adrian Kingsley-Hughes|date=May 28, 2011|title='Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered|url=https://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-other-jailbreaking-questions-answered/|url-status=live|archive-url=https://web.archive.org/web/20121111071651/http://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-other-jailbreaking-questions-answered/|archive-date=November 11, 2012|access-date=November 14, 2012|work=Tech|publisher=Forbes}}</ref><ref>{{cite web|author=Sharon Vaknin|date=June 27, 2012|title=How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal|url=http://howto.cnet.com/8301-11310_39-57462343-285/how-to-unjailbreak-your-iphone-ipad-or-ipod-touch/|url-status=live|archive-url=https://web.archive.org/web/20121117235856/http://howto.cnet.com/8301-11310_39-57462343-285/how-to-unjailbreak-your-iphone-ipad-or-ipod-touch/|archive-date=November 17, 2012|access-date=November 14, 2012|work=[[CNET]]|publisher=[[CBS Interactive]]}}</ref><ref>{{cite web|author=Christopher Breen|date=December 29, 2008|title=The Best IPhone Apps Not in the App Store|url=http://www.pcworld.com/article/156099/best_iphone_apps.html|url-status=live|archive-url=https://web.archive.org/web/20121017135219/http://www.pcworld.com/article/156099/best_iphone_apps.html|archive-date=October 17, 2012|access-date=November 14, 2012|work=[[PCWorld]]|publisher=[[IDG]]}}</ref> However, doing so generally updates the device to the latest, and possibly non-jailbreakable, version, due to Apple's use of [[SHSH blob]]s. There are many applications that aim to prevent this, by restoring the devices to the same version they are currently running whilst removing the jailbreaks. Examples are, Succession, Semi-Restore and Cydia Eraser.

In 2012, Forbes staff analyzed a UCSB study on 1,407 free programs available from Apple and a third-party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple's App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones.<ref name="forbes-leak">{{cite news|last=Greenberg|first=Andy|date=February 14, 2012|title=Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones|work=Tech|publisher=Forbes|url=https://www.forbes.com/sites/andygreenberg/2012/02/14/unauthorized-iphone-and-ipad-apps-leak-private-data-less-often-than-approved-ones/|url-status=live|access-date=February 15, 2012|archive-url=https://web.archive.org/web/20120214225355/http://www.forbes.com/sites/andygreenberg/2012/02/14/unauthorized-iphone-and-ipad-apps-leak-private-data-less-often-than-approved-ones/|archive-date=February 14, 2012}}</ref> Also, a program available in Cydia called PrivaCy allows user to control the upload of usage statistics to remote servers.<ref name="forbes-leak" />

In August 2015, the [[KeyRaider]] malware was discovered, affecting only jailbroken iPhones.<ref>{{cite news|author=Joseph Steinberg|date=August 31, 2015|title=Massive iPhone User Data Breach: What You Need to Know|work=Inc.|url=http://www.inc.com/joseph-steinberg/massive-iphone-user-data-breach-what-you-need-to-know.html|url-status=live|access-date=September 2, 2015|archive-url=https://web.archive.org/web/20150902233723/http://www.inc.com/joseph-steinberg/massive-iphone-user-data-breach-what-you-need-to-know.html|archive-date=September 2, 2015}}</ref>

=== Fake/scam jailbreaks ===
In recent years, due to the technical complexity and often rarity of legitimate jailbreaking software (especially untethered jailbreaks) there has been an increase in websites offering fake iOS jailbreaks. These websites often ask for payment or make heavy use of advertising, but have no actual jailbreak to offer. Others install a fake, lookalike version of the [[Cydia]] package manager.<ref>{{Cite web|first=Paul|last=Wagenseil|date=October 16, 2019|title=iPhone Jailbreak Scam Puts Ads on Your Phone|url=https://www.tomsguide.com/news/iphone-jailbreak-scam-puts-ads-on-your-phone|url-status=live|archive-url=https://web.archive.org/web/20191109233301/https://www.tomsguide.com/news/iphone-jailbreak-scam-puts-ads-on-your-phone|archive-date=November 9, 2019|access-date=November 9, 2019|website=Tom's Guide|language=en}}</ref> In some cases, users have been asked to download [[free-to-play]] apps or fill out surveys to complete a (non-existent) jailbreak.


== See also ==
== See also ==
* [[Hacking of consumer electronics]]
* [[Hacking of consumer electronics]]
* [[iOS version history]]
* [[iOS version history]]
* [[PP Jailbreak]]
* [[Linux on Apple devices]]
* [[Cydia]]


== Notes ==
== Notes ==
Line 943: Line 1,387:


== References ==
== References ==
{{Reflist|30em}}
{{Reflist}}


{{iOS}}
{{iOS}}


{{DEFAULTSORT:iOS jailbreaking}}
[[Category:IOS jailbreaking| ]]
[[Category:IPhone|Jailbreaking]]
[[Category:IPhone|Jailbreaking]]
[[Category:Hacker culture]]
[[Category:Hacker culture]]
[[Category:IOS jailbreaking| ]]

Latest revision as of 03:36, 6 December 2024

iOS jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based[a] operating systems. It is typically done through a series of kernel patches. A jailbroken device typically permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.[1]

While sometimes compared to rooting an Android device, jailbreaking bypasses several types of Apple prohibitions for the end-user. Since it includes modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting), the concepts of iOS jailbreaking are therefore technically different from Android device rooting.

Motivation

[edit]

Expanding the feature set that Apple and its App Store have restricted is one of the motivations for jailbreaking.[2] Apple checks apps for compliance with its iOS Developer Program License Agreement[3] before accepting them for distribution in the App Store. However, the reasons for Apple to ban apps are not limited to safety and security and may be regarded as arbitrary and capricious.[4] In one case, Apple mistakenly banned an app by a Pulitzer-Winning cartoonist because it violated its developer license agreement, which specifically bans apps that "contain content that ridicules public figures."[5] To access banned apps,[6] users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,[7] such as user interface customization and tweaks.

Device customization

[edit]

Software programs that are available through APT or Installer.app (legacy) are not required to adhere to App Store guidelines. Most of them are not typical self-contained apps, but instead are extensions and customizations for iOS or other apps (commonly called tweaks).[8] Users can install these programs for purposes including personalization and customization of the interface using tweaks developed by developers and designers,[8] adding desired features such as access to the root file system and fixing annoyances,[9] and making development work on the device easier by providing access to the file system and command-line tools.[10][11] Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character input systems because they are easier to use than Apple's.[12]

In some cases, jailbreak features are adopted by Apple and used as inspiration for features that are incorporated into iOS and iPadOS.[13][14]

Jailbreak features adopted by Apple
Adopted Feature Jailbreak Tweak
iOS Version Description Title Developer Originally released for
5.0 Emoji support Vmoji Vintendo/ManChild Technologies iOS 4
Keyboard shortcuts Xpandr Nicholas Haunold
Delete individual calls[15] Call Delete IArrays
7.0 Control Center SBSettings BigBoss iPhone OS 2
NCSettings JamieD360 iOS 5
Translucent Notification Center BlurredNCBackground Phillippe
8.0 Interactive Notifications LockInfo David Ashman iOS 4
biteSMS biteSMS Team iOS 5
Third-Party Keyboards Fleksy Enabler Sea Comet iOS 6
Predictive Text PredictiveKeyboard Matthias Sauppe
9.0 Cursor Control SwipeSelection Kyle Howells iOS 4
Lowercase Keys in Keyboard ShowCase Lance Fetters
10.0 Drawing on Messages Graffiti IanP iOS 5
Floating Notification Center Floater Skylerk99 iOS 8
Bubble Notifications WatchNotifications Thomas Finch
Clear All Notifications 3D Touch to Clear Notifications MohammadAG
OneTapClear Rave
Stickers in Messages StickerMe Alexander Laurus
Separate Control Center Pages Auxo A3Tweaks iOS 9
11.0 Cellular Data Control SBSettings BigBoss iPhone OS 2
CCSettings plipala iOS 8
Customizable Control Center CChide/CCSettings plipala
Onizuka Maximehip
Colored Controls Cream CP Digital Darkroom
One-Handed Keyboard (iPhone) OneHandWizard TheAfricanNerd, sharedRoutine
Low Power Mode in Control Center CCLowPower Cole Cabral iOS 10
Notification design tweaks CleanNotification10 Ayden Panhuyzen
13.0[16] Dark Mode Eclipse Guillermo Morán iOS 7
Noctis LaughingQuoll
Download manager in Safari Safari Plus BigBoss iOS 8
Redesigned volume HUD Melior SparkDev iOS 7
Ultrasound Ayden Panhuyzen iOS 11
Wi-Fi/Bluetooth settings in Control Center WeatherVane ATWiiks
Unlimited app download limit on Mobile Data Appstore Unrestrict iJulioverne
Third-party Controller Support nControl Kevin Bradley iOS 12
14.0 Hide apps from Home screen Poof BigBoss iOS 5,[17] possibly older
Compact Call Interface CallBar Elias Limneos iOS 7
Scorpion Esquilli iOS 13
App Library Vesta SparkDev
Changing CarPlay background Canvas Leftyfl1p
Picture in Picture on iPhone Titan TheSaltaCracka
Home Screen Widgets HSWidgets dgh0st
Smaller Siri SmallSiri Muirey03
15.0 Separation Alerts Proximitus LaughingQuoll iOS 11
Low Power Mode (iPad) LPMPad iCraze iOS 13
Focus PureFocus Dave Van Wijk
Notification Priority Contacy XCXiao
Redesigned Notifications Quart LaughingQuoll
Velvet NoisyFlake
HiMyNameIsUbik
16.0 Taptic Keyboard TapticKeys SparkDev iOS 10
Redesigned Now Playing Interface Colorflow David Goldman iOS 7
Chromaflow Ryan Nair iOS 14
Enhanced Lock Screen customization Complications Ben Giannis iOS 12
17.0[18] Camera App Composition Features CameraTweak Samball iOS 6
Crossfade in the Music App Crossfade H6nry
Improved Auto-correct ManualCorrect Pro Aaron Lindsay (aerialx) iOS 7
Live Voicemail Super Voicemail hAcx iOS 8
Informative App Store Downloads App Percent pxcex iOS 10
Change Haptic Menu Speed Better3DMenus dpkg_ iOS 11
Safari Private Browsing Privacy BioProtect XS Elias Limneos iOS 12
Additional AirPods gestures Siliqua Pro LaughingQuoll
Using Non-System Apps EvilScheme Lorenzo iOS 13
Interactive Widgets PowerWidget Ginsu iOS 14
Additional CarPlay Wallpapers Airaw Dcsyhi
Contact Posters Phoenix SouthernGirlWhoCode of titand3v
Verification code auto-deleting NoMoreShortCodes Arcas
Notes App Formatting Textyle 3 Ryan Nair iOS 15
StandBy Mode Photon cemck iOS 13.0
Change Lock Screen Time Weight SimpleTime p2kdev iOS 12.0

Carrier unlocking

[edit]

Jailbreaking also opens the possibility for using software to unofficially unlock carrier-locked iPhones so they can be used with other carriers.[19] Software-based unlocks have been available since September 2007,[20] with each tool applying to a specific iPhone model and baseband version (or multiple models and versions).[21] This includes the iPhone 4S, iPhone 4, iPhone 3GS, and iPhone 3G models. An example of unlocking an iPhone through a Jailbreak utility would be Redsn0w. Through this software, iPhone users will be able to create a custom IPSW and unlock their device. Moreover, during the unlocking process, there are options to install Cydia the iPad baseband.

Installation of malware

[edit]

Cybercriminals may jailbreak an iPhone to install malware or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company Hacking Team, which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.[22][23]

Software piracy

[edit]

On iOS devices, the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking, therefore, allows the installation of pirated applications.[24] It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.[25] However, the installation of pirated applications is also possible without jailbreaking, taking advantage of enterprise certificates to facilitate the distribution of modified or pirated releases of popular applications.[26]

Package managers

[edit]
Screenshot of Cydia
Cydia, a popular package manager installed on jailbroken devices

A package manager or package-management system is a collection of software tools that automates the process of installing, upgrading, configuring, and removing computer programs. For jailbreaks, this is essential for the installation of third-party content. There are a few package managers specifically for jailbroken iOS devices, of which the most popular are Cydia, Sileo, Zebra and Installer 5.

Security of the device

[edit]

Depending on the type of the jailbreak (i.e. 'rootless' or 'rootful'), different security structures may be compromised to various degrees. As jailbreaking grants freedom over running software that isn't confined to a sandbox typical to that of an App Store application, as well as modifications to system files, it ultimately allows for the threat of malware.

Users of a jailbroken device are also often forced to stay on an older iOS version that is no longer supported by Apple, commonly due to the unavailability of jailbreak on the newer versions. While using older versions of iOS is considered safe in most circumstances, the device may be vulnerable to publicly known security flaws.

In March 2021, jailbreak developer GeoSn0w[27] released a tweak called iSecureOS which can alert the users of security issues found on their devices. The application works akin to antivirus software, in that it scans the files on the user's device and checks them against a database of known malware or unsafe repos.

In June 2021, ESET Research confirmed that malware did exist on one of the piracy repositories in the jailbreak community. The malware actively targeted iSecureOS to try to bypass the detection,[28] but updates to the security app were quickly released and have mitigated the malware.

Comparison to Android rooting

[edit]

Jailbreaking of iOS devices has sometimes been compared to "rooting" of Android devices. Although both concepts involve privilege escalation, they do differ in scope.

Where Android rooting and jailbreaking are similar is that both are used to grant the owner of the device superuser system-level privileges, which may be transferred to one or more apps. However, unlike iOS phones and tablets, nearly all Android devices already offer an option to allow the user to sideload 3rd-party apps onto the device without having to install from an official source such as the Google Play store.[29] Many Android devices also provide owners the capability to modify or even replace the full operating system after unlocking the bootloader, although doing this requires a factory reset.[30][31][32]

In contrast, iOS devices are engineered with restrictions including a "locked bootloader" which can not be unlocked by the owner to modify the operating system without violating Apple's end-user license agreement. And on iOS, until 2015, while corporations could install private applications onto corporate phones, sideloading unsanctioned, 3rd-party apps onto iOS devices from sources other than the App Store was prohibited for most individual users without a purchased developer membership.[33] After 2015, the ability to install 3rd-party apps became free for all users; however, doing so requires a basic understanding of Xcode and compiling iOS apps.

Jailbreaking an iOS device to defeat all these security restrictions presents a significant technical challenge.[34] Similar to Android, alternative iOS app stores utilizing enterprise certificates are available, offering modified or pirated releases of popular applications and video games, some of which were either previously released through Cydia or are unavailable on the App Store due to these apps not complying with Apple developer guidelines.

Tools

[edit]

Types

[edit]

Many different types of jailbreaks have been developed over the years, differing in how and when the exploit is applied.

Untethered

[edit]

When a jailbroken device is booting, it loads Apple's own boot software initially. The device is then exploited and the kernel is patched every time it is turned on. An untethered jailbreak is a jailbreak that does not require any assistance when it reboots up. The kernel will be patched without the help of a computer or an application.

Tethered

[edit]

A tethered jailbreak is the opposite of an untethered jailbreak, in the sense that a computer is required to boot the device. Without a computer running the jailbreaking software, the iOS device will not be able to boot at all. While using a tethered jailbreak, the user will still be able to restart/kill the device's SpringBoard process without needing to reboot. Many early jailbreaks were offered initially as tethered jailbreaks.

Semi-tethered

[edit]

This type of jailbreak allows a user to reboot their phone normally, but upon doing so, the jailbreak and any modified code will be effectively disabled, as it will have an unpatched kernel. Any functionality independent of the jailbreak will still run as normal, such as making a phone call, texting, or using App Store applications. To be able to have a patched kernel and run modified code again, the device must be booted using a computer.

Semi-untethered

[edit]

This type of jailbreak is like a semi-tethered jailbreak in which when the device reboots, it no longer has a patched kernel, but the key difference is that the kernel can be patched without using a computer. The kernel is usually patched using an application installed on the device without patches. This type of jailbreak has become increasingly popular, with most recent jailbreaks classified as semi-untethered.

History of tools

[edit]
Several people (including saurik, p0sixninja, and geohot) who have contributed to building the early jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at DEF CON.

JailbreakMe and AppSnapp

[edit]

A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it,[35] and soon a jailbreak-only game app became available.[36] In October 2007, JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod Touch,[37][38] and it included Installer.app as a way to get software for the jailbroken device.[39]

ZiPhone

[edit]

In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.[40]

PwnageTool

[edit]

The iPhone Dev Team, which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod Touch,[41][42] newly including Cydia as the primary third-party installer for jailbroken software.[43] PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.[44][45]

QuickPwn

[edit]

In November 2008 the iPhone Dev Team released QuickPwn to jailbreak iPhone OS 2.2 on iPhone and iPod Touch, with options to enable past functionality that Apple had disabled on certain devices.[46]

redsn0w

[edit]

After Apple released iPhone OS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac.[47] It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.[48]

purplera1n & blackra1n

[edit]

George Hotz developed the first iPhone unlock, which was a hardware-based solution. Later, in 2009, he released a jailbreaking tool for the iPhone 3G and iPhone 3GS on iPhone OS 3.0 called purplera1n,[49] and blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod Touch and other devices.[50]

limera1n

[edit]

In October 2010, George Hotz released limera1n, a low-level exploit of boot ROM code that permanently works to jailbreak the iPhone 4 and is used as a part of tools including redsn0w.[51]

Spirit and JailbreakMe

[edit]

Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010.[52] Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iPhone OS 3.2.[52] In August 2010, comex released JailbreakMe 2.0, the first web-based tool to jailbreak the iPhone 4 (on iOS 4.0.1).[53][54] In July 2011, he released JailbreakMe 3.0,[55] a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3).[56] It used a flaw in PDF file rendering in mobile Safari.[57][58]

Greenpois0n

[edit]

Chronic Dev Team initially released Greenpois0n in October 2010, a desktop-based tool for untethered jailbreaking iOS 4.1[59] and later iOS 4.2.1[60] on most devices including the Apple TV,[61] as well as iOS 4.2.6 on CDMA (Verizon) iPhones.[62]

ultrasn0w

[edit]

As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod Touch (3rd and 4th generation).[45] As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1.[63]

Absinthe

[edit]

The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S.[64][65][66][67] In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1, including jailbreaking the third-generation iPad for the first time.[68]

evasi0n

[edit]

An iOS 6.X untethered jailbreak tool called "evasi0n" was released for Linux, OS X, and Windows on February 4, 2013.[69] Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.[70]

TaiG

[edit]

On November 29, 2014, TaiG team released their untethered jailbreak tool called "TaiG" for devices running iOS 8.0–8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2.[71] On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0–8.4.[72]

Pangu9

[edit]

On October 14, 2015, Pangu Team released Pangu9, their untethered jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.[73][74]

Table of tools

[edit]
Name Release date Hardware Firmware Untethered? Developer(s) License
iPad iPhone iPod
Touch
Oldest Recent
JailbreakMe 3.0[75] July 5, 2011[75]
[75]
1[75] 4.2.6 4.2.8
4.3 – 4.3.3[75][b]
Yes[75] comex[75] Proprietary
Seas0npass[76] October 18, 2011[76] 2nd generation Apple TV[76] 4.3 5.3
6.1.2 (tethered)[76]
4.3 – 5.3[76] GPLv3[77]
redsn0w 0.9.15 beta 3[78][79] November 1, 2012 1[45][78][80] 1 4.1 6.1.6
Depends
Untethered:
Tethered:
  • 4.2.9 – 4.2.10
  • 4.3.4 – 4.3.5
  • 5.0
  • 5.1
  • 6.0 – 6.1.6 (not available for devices newer than the iPhone 4, iPad 1, or iPod Touch 4)[82]
iPhone Dev Team[45] Proprietary
Absinthe 2.0.4[66] May 30, 2012 1[67] 5.1.1[67] Yes[64] pod2g, Chronic Dev Team, iPhone Dev Team[66] Proprietary[83]
evasi0n February 4, 2013
6.0 6.1.2[84] Yes pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs) Proprietary[85]
evasi0n7 December 22, 2013
5 7.0 7.0.6[84] Yes pod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs) Proprietary
p0sixspwn December 30, 2013
6.1.3 6.1.6 Yes winocm, iH8sn0w, and SquiffyPwn GPLv3[86]
Pangu June 23, 2014[87] 5[87] 7.1 7.1.2 Yes dm557, windknown, ogc557, and Daniel_K4 (@PanguTeam) Proprietary
Pangu8 October 22, 2014 5 8.0 8.1 Yes windknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam) Proprietary
TaiG November 29, 2014
8.0 8.4 Yes TaiG Proprietary
PPJailbreak January 18, 2015
8.0 8.4 Yes PanguTeam and PPJailbreak Proprietary
Pangu9 October 14, 2015
9.0 9.1 Yes PanguTeam Proprietary
Pangu9 March 23, 2016 4th generation Apple TV 9.0 9.0.1 Yes PanguTeam Proprietary
LiberTV March 3, 2017 4th generation Apple TV 9.1 10.1 Semi-Untethered Marco Grassi, Luca Todesco, Jonathan Levin Proprietary
LiberTV 1.1 December 24, 2017 4th & 5th generation (4K) Apple TV 11.0 11.1 Semi-Untethered Marco Grassi, Luca Todesco, Jonathan Levin Proprietary
PPJailbreak July 24, 2016
9.2 9.3.3 Semi-Untethered PanguTeam and PPJailbreak Proprietary
mach_portal + Yalu December 22, 2016 Pro 6 10.0.1 10.1.1 (depends on device) Semi-Untethered Luca Todesco
yalu102 January 26, 2017 6 10.0.1 10.2 Semi-Untethered Luca Todesco and Marco Grassi WTFPL[88]
Phœnix August 6, 2017[89]
9.3.5 Semi-Untethered Siguza and tihmstar Proprietary
Etason September 19, 2017[90]
8.4.1 Yes tihmstar Proprietary
Saïgon October 15, 2017
10.2.1 Semi-Untethered Abraham Masri Proprietary[91]
h3lix December 24, 2017
No support 10.0 10.3.4 Semi-Untethered tihmstar Proprietary
Meridian January 4, 2018
10.0 10.3.3 Semi-Untethered Sparkey, Ian Beer, Siguza, xerub, stek29, theninjaprawn, ARX8x, cheesecakeufo, FoxletFox, Sticktron, nullpixel, arpolix, EthanRDoesMC, CydiaBen, Comsecuris UG, Brandon Saldan, Lepidus, Cryptic, Samg_is_a_Ninja, M1sta[92] MIT[93]
g0blin January 13, 2018
10.3 10.3.3 Semi-Untethered Sticktron, Siguza, Ian Beer, windknown, Luca Todesco, xerub, tihmstar, saurik, uroboro, Abraham Masri, arx8x, PsychoTea, Cryptic Proprietary
Spyware.lol[94] September 7, 2018
  • Air, Air 2
  • iPad Mini 2, Mini 4, Mini 3
  • iPad (5th generation)
  • iPad Pro (9.7‑inch)
  • iPad Pro (12.9‑inch)
  • iPad Pro (10.5-inch)
  • iPad Pro (12.9-inch) (2nd generation)
  • iPhone SE
  • iPhone 5s
  • iPhone 6s
  • iPhone 6
  • iPhone 6s plus
  • iPhone 6 plus
  • iPhone 7
  • iPhone 7 plus
10.0 10.3.3 Semi-Untethered JakeBlair420 Proprietary
LiberiOS December 25, 2017 6 11.0 11.1.2 Semi-Untethered Marco Grassi, Luca Todesco, Jonathan Levin, Ian Beer Proprietary
Electra1112 January 12, 2018 6 11.0 11.1.2 Semi-Untethered CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, stek29, angelXwind, comex, isklikas, and goeo_, DHowett, and rpetrich GPLv3[95]
Electra1131 July 7, 2018 6 11.0 11.4.1 Semi-Untethered CoolStar, Ian Beer, xerub, Siguza, theninjaprawn, Brandon Azad, stek29, Jamie Bishop, Pwn20wnd GPLv3[96]
ElectraTV July 12, 2018 4th generation Apple TV 11.0 11.4.1 Semi-Untethered nitoTV
unc0ver October 13, 2018
11.0 14.8.1 (excludes 13.5.1) Semi-Untethered Pwn20wnd, Sam Bingner, Ian Beer, Brandon Azad, Jonathan Levin, xerub, sparkey, stek29, theninjaprawn New BSD License[97]
Chimera April 30, 2019
12.0 12.5.7 Semi-Untethered Coolstar, Jamie Bishop, tri'angle, ninjaprawn, Brandon Azad, PsychoTea, Ayden Panhuyzen, Umang Raghuvanshi, aesign
checkra1n November 10, 2019
  • All 64-bit iPads

4th & 5th generation (4K) Apple TV

12.0+ 14.8.1 Semi-Tethered[99] argp, axi0mx, danyl931, jaywalker, kirb, littlelailo, nitoTV, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza, haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini, Cellebrite, et al. Proprietary
EtasonATV January 22, 2020 3rd generation Apple TV 7.4+ Yes tihmstar Proprietary
Fugu February 2, 2020 All A10-A10X-based iPads 7 13.0 13.5.1 Semi-Tethered Linus Henze GPLv3[100]
Odyssey August 28, 2020 All iPads that support iOS 13 iPhone 6s or newer 7 13.0 13.7 Semi-Untethered CoolStar, Hayden Seay, 23Aaron, Tihmstar New BSD License[101]
Taurine April 1, 2021 A14 and below that support iOS 14 A14 and below that support iOS 14 7 14.0 14.8.1[102] Semi-Untethered CoolStar, tihmstar, Diatrus, 23 Aaron, ModernPwner, pattern-f BSD License[103]
Fugu14 October 24, 2021 All A12-A14-based iPads All A12-A14-based iPhones No support 14.2 14.5.1 Yes Linus Henze MIT[104]
p0laris[105] April 20, 2022 All A5/A5X-A6/A6X-based devices 5 9.3.5 9.3.6 Semi-Untethered spv LGPLv2.1[106]
openpwnage[107] May 19, 2022 All A5/A5X-A6/A6X-based devices 5 8.4b4 9.3.6 Semi-Untethered 0xilis LGPLv2.1[108]
Blizzard Jailbreak[109] August 4, 2022 All A5/A5X-A6/A6X-based devices 5 8.4b4 9.3.6 Semi-Untethered GeoSn0w LGPLv3.0[110]
palera1n September 17, 2022 A11 and below that support iOS 15/16/17 A11 and below that support iOS 15/16 7 15.0 18.0 Betas Semi-Tethered[c] Nebula, Mineek, Nathan, Lakhan Lothiyi, Tom, Nick Chan, Flower MIT[112]
XinaA15[113] December 7, 2022 All A12-A15 based devices

M1 based iPads

No support 15.0 15.4.1 Semi-Untethered Xina520 Proprietary
Dopamine[114] May 3, 2023 All A9-A16, M1-M2 based iPads All A9-A16 based iPhones 7 15.0 16.6.1 (A9-A11)

16.5.1 (A12-A14, M1)

16.5 (A15-A16, M2)

Semi-Unthethered Lars Fröder MIT[115]
Bootstrap[116] February 7, 2024 All A8-A15 based devices

M1-M2 based iPads

7 15.0 17.0 Semi-Untethered Tb MIT[117]
nathanlr[118] August 13, 2024 All A12-A15 based devices

M1-M2 based iPads

No support 16.5.1 16.6.1[119] Semi-Untethered verygenericname New BSD License[120]

History of exploit-disabling patch releases

[edit]

Apple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original evasi0n iOS 6–6.1.2 jailbreak, in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Boot ROM exploits (exploits found in the hardware of the device) cannot be patched by Apple system updates but can be fixed in hardware revisions such as new chips or new hardware in its entirety, as occurred with the iPhone 3GS in 2009.[121]

On July 15, 2011, Apple released a new iOS version that closed the exploit used in JailbreakMe 3.0. The German Federal Office for Information Security had reported that JailbreakMe uncovered the "critical weakness" that information could be stolen or malware unwillingly downloaded by iOS users clicking on maliciously crafted PDF files.[122]

On August 13, 2015, Apple updated iOS to 8.4.1, patching the TaiG exploit. Pangu and Taig teams both said they were working on exploiting iOS 8.4.1, and Pangu demonstrated these chances at the WWDC 2015.[123][clarification needed]

On September 16, 2015, iOS 9 was announced and made available; it was released with a new "Rootless" security system, dubbed a "heavy blow" to the jailbreaking community.[124]

On October 21, 2015, seven days after the Pangu iOS 9.0–9.0.2 Jailbreak release, Apple pushed the iOS 9.1 update, which contained a patch that rendered it nonfunctional.[125]

On January 23, 2017, Apple released iOS 10.2.1 to patch jailbreak exploits released by Google for the Yalu iOS 10 jailbreak created by Luca Todesco.[126]

On December 10, 2019, Apple used DMCA takedown requests to remove posts from Twitter. The tweet contained an encryption key that could potentially be used to reverse engineer the iPhone's Secure Enclave. Apple later retracted the claim, and the tweet was reinstated.[127]

On June 1, 2020, Apple released the 13.5.1 update, patching the zero-day exploit used by the Unc0ver jailbreak.[128]

On September 20, 2021, Apple released iOS/iPadOS 15, which introduced signed system volume security to iOS/iPadOS, meaning that any changes to the root file system would revert to the latest snapshot on a reboot, and changes to the snapshot would make the device unbootable.[129] As a result, jailbreak development slowed considerably, and for the first time in jailbreaking history, the latest iPhone did not get a jailbreak before a new model was released.

On September 12, 2022, Apple released iOS 16, which introduced a new firmware component known as Cryptex1. New Cryptex1 versions are almost never compatible with old iOS versions, making downgrading impossible except within patch versions (i.e. 16.3 and 16.3.1).[citation needed]

Legality

[edit]

The legal status of jailbreaking is affected by laws regarding circumvention of digital locks, such as laws protecting digital rights management (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.

International treaties have influenced the development of laws affecting jailbreaking. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software,[130] but member states vary on the implementation of the directive.

While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least two prominent jailbreakers have been given positions at Apple, albeit in at least one case a temporary one.[131][132] Apple has also regularly credited jailbreak developers with detecting security holes in iOS release notes.[133]

Apple's support article concerning jailbreaking claims that they "may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software," which includes jailbreaking.[134]

Australia

[edit]

In 2010, Electronic Frontiers Australia said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply.[135] These laws had been strengthened by the Copyright Amendment Act 2006.

Canada

[edit]

In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with DRM protection, with exceptions including software interoperability.[136] Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008–2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[137] but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.[138]

India

[edit]

India's copyright law permits circumventing DRM for non-copyright-infringing purposes.[139][140] Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.[141] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.[139][140]

New Zealand

[edit]

New Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.[142][143] This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.

Singapore

[edit]

Jailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.[144]

United Kingdom

[edit]

The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court.[130][145] Competition laws may also be relevant.[146]

United States

[edit]

The main law that affects the legality of iOS jailbreaking in the United States is the 1998 Digital Millennium Copyright Act (DMCA), which says "no person shall circumvent a technological measure that effectively controls access to a work protected under" the DMCA, since this may apply to jailbreaking.[147] Every three years, the law allows the public to propose exemptions for legitimate reasons for circumvention, which last three years if approved. In 2010 and 2012, the U.S. Copyright Office approved exemptions that allowed smartphone users to jailbreak their devices legally,[148] and in 2015 the Copyright Office approved an expanded exemption that also covers other all-purpose mobile computing devices, such as tablets.[149] It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning.[150] It is unclear whether it is legal to traffic in the tools used to make jailbreaking easy.[150]

In 2010, Apple announced that jailbreaking "can violate the warranty".[151]

[edit]

In 2007, Tim Wu, a professor at Columbia Law School, argued that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."[152] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal carrier unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[153] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[152]

In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.[154][155] Apple had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010, that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office released a new exemption ruling. The jailbreaking of smartphones continued to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[156][157][158] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[157] In 2015, these exemptions were extended to include other devices, including tablets.[159]

Risks

[edit]

Security, privacy and stability

[edit]

The first iPhone worm, iKee, appeared in early November 2009, created by a 21-year-old Australian student in the town of Wollongong. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an SSH service, which those users can leave in the default insecure state.[160] In the same month, F-Secure reported on a new malicious worm compromising bank transactions from jailbroken phones in the Netherlands, similarly affecting devices where the owner had installed SSH without changing the default password.[161][162]

Restoring a device with iTunes removes a jailbreak.[163][164][165] However, doing so generally updates the device to the latest, and possibly non-jailbreakable, version, due to Apple's use of SHSH blobs. There are many applications that aim to prevent this, by restoring the devices to the same version they are currently running whilst removing the jailbreaks. Examples are, Succession, Semi-Restore and Cydia Eraser.

In 2012, Forbes staff analyzed a UCSB study on 1,407 free programs available from Apple and a third-party source. Of the 1,407 free apps investigated, 825 were downloaded from Apple's App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. Unauthorized apps tended to respect privacy better than official ones.[166] Also, a program available in Cydia called PrivaCy allows user to control the upload of usage statistics to remote servers.[166]

In August 2015, the KeyRaider malware was discovered, affecting only jailbroken iPhones.[167]

Fake/scam jailbreaks

[edit]

In recent years, due to the technical complexity and often rarity of legitimate jailbreaking software (especially untethered jailbreaks) there has been an increase in websites offering fake iOS jailbreaks. These websites often ask for payment or make heavy use of advertising, but have no actual jailbreak to offer. Others install a fake, lookalike version of the Cydia package manager.[168] In some cases, users have been asked to download free-to-play apps or fill out surveys to complete a (non-existent) jailbreak.

See also

[edit]

Notes

[edit]
  1. ^ Such as tvOS (since the 2nd generation), watchOS or iPadOS.
  2. ^ The Verizon CDMA iPhone 4 ran on iOS 4.2.5 to 4.2.10, with incremental updates being bugfixes that were simultaneously applied from 4.3.1 to 4.3.5.
  3. ^ A tethered variant is also available prior to v2.0.0-beta.1.[111]

References

[edit]
  1. ^ "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on April 3, 2019. Retrieved March 12, 2019.
  2. ^ Chris Foresman (December 13, 2010). "iPhone jailbreaker set to bring Cydia to Mac OS X". Ars Technica. Condé Nast. Archived from the original on August 21, 2011. Retrieved August 2, 2011.
  3. ^ "Agreements and Guidelines - Support - Apple Developer". developer.apple.com. Archived from the original on February 8, 2023. Retrieved February 9, 2023.
  4. ^ Steve Kovach (April 13, 2013). "Frustration Builds With Apple's Inconsistent Rules For App Developers". Business Insider. Archived from the original on August 6, 2013. Retrieved August 23, 2013.
  5. ^ Ryan Singel (April 15, 2010). "Apple App Store Bans Pulitzer-Winning Satirist for Satire". Wired. Archived from the original on March 26, 2011. Retrieved February 12, 2011.
  6. ^ "Rejected Apps". imore.com. Archived from the original on July 15, 2014. Retrieved February 19, 2017.
  7. ^ "Jailbreak! New Rules Allow Unapproved iPhone Apps". Fox News. March 27, 2015. Archived from the original on May 21, 2013. Retrieved December 7, 2012.
  8. ^ a b Adam Dachis (March 14, 2011). "How to Get the Most Out of Your Jailbroken iOS Device". Lifehacker. Gawker Media. Archived from the original on December 25, 2015. Retrieved August 2, 2011.
  9. ^ Jenna Wortham (May 12, 2009). "Unofficial Software Incurs Apple's Wrath". The New York Times. Archived from the original on December 22, 2013. Retrieved August 2, 2011.
  10. ^ Zdziarski, Jonathan (2008). iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain. "O'Reilly Media, Inc.". pp. 3–4. ISBN 9780596554187. Archived from the original on February 19, 2017.
  11. ^ Landau, Ted (2009). Take control of your iPhone. TidBITS Publishing, Incorporated. p. 107. ISBN 9781933671543. Archived from the original on February 19, 2017.
  12. ^ Nathan T. Washburn (May 4, 2012). "Apple Discovers a New Market in China: Rich Boyfriends". HBR Blog Network. Harvard Business Review. Archived from the original on November 9, 2012. Retrieved January 9, 2013.
  13. ^ Haslam, Oliver (June 10, 2015). "9 Jailbreak Tweaks Apple Killed In iOS 9". Redmond Pie. Archived from the original on December 15, 2022. Retrieved December 15, 2022.
  14. ^ Manalo, Amboy (November 2, 2018). "60 iOS Features Apple Stole from Jailbreakers". Gadget Hacks. Archived from the original on December 5, 2022. Retrieved December 15, 2022.
  15. ^ Manalo, Amboy (November 2, 2018). "60 iOS Features Apple Stole from Jailbreakers". Gadget Hacks. Archived from the original on October 27, 2020. Retrieved October 22, 2020.
  16. ^ Bednarz, Dennis (June 7, 2019). "Every Jailbreak Tweak Apple Copied in iOS 13". iPhone Hacks. Archived from the original on October 26, 2020. Retrieved October 23, 2020.
  17. ^ "Poof - Cydia". Cydia. October 16, 2011. Archived from the original on April 4, 2023. Retrieved February 13, 2023.
  18. ^ Bouchard, Anthony (July 5, 2023). "17 things iOS & iPadOS 17 'borrowed' from the jailbreak community". iDownloadBlog.com. Archived from the original on January 12, 2024. Retrieved January 12, 2024.
  19. ^ Brian X. Chen (August 7, 2009). "6 Reasons to Jailbreak Your iPhone". Gadget Lab. Wired. Archived from the original on May 4, 2012. Retrieved May 1, 2012.
  20. ^ Ryan Block (September 11, 2007). "iUnlock released: the first free, open source iPhone SIM unlock software". Engadget. Aol. Archived from the original on February 3, 2014. Retrieved February 1, 2014.
  21. ^ Ian Paul (December 22, 2008). "3G iPhone Unlock Expected". PCWorld. IDG. Archived from the original on August 13, 2022. Retrieved July 14, 2022.
  22. ^ Fleishman, Glen (July 6, 2015). "Hacking Team hack reveals why you shouldn't jailbreak your iPhone". MacWorld. Archived from the original on August 3, 2015. Retrieved August 2, 2015.
  23. ^ Heath, Alex (November 25, 2011). "New Jailbreak App Stalks All Of Your iPhone's Activity And Makes It Available Online". Cult of Mac. Archived from the original on September 23, 2015. Retrieved August 2, 2015.
  24. ^ Hattersley, Lucy (January 2, 2013). "Now pirated iOS apps can be installed without jailbreak". Macworld. Archived from the original on July 14, 2022. Retrieved July 14, 2022.
  25. ^ Kazmucha, Allyson (May 26, 2012). "Jailbreak, app piracy, and the true cost of theft". iMore. Archived from the original on August 21, 2015. Retrieved August 2, 2015.
  26. ^ Panzarino, Matthew (January 1, 2013). "iOS App Piracy Continues, Now Without Jailbreak". The Next Web. Archived from the original on May 4, 2018. Retrieved May 4, 2018.
  27. ^ "[Free Release] iSecureOS - iOS Security Application For Jailbroken Devices (v1.0 Beta 1)". r/jailbreak. March 22, 2021. Archived from the original on October 1, 2021. Retrieved October 1, 2021.
  28. ^ @ESETresearch (June 8, 2021). "The newer version of iOS/Spy.Postlo.A attempts to modify the definitions of @isecureos (iOS Security application for jailbroken devices) to avoid detection" (Tweet). Retrieved October 1, 2021 – via Twitter.
  29. ^ Hildenbrand, Jerry (February 2, 2012). "Android A to Z: What is sideloading?". Android Central. Archived from the original on July 8, 2014. Retrieved July 9, 2014.
  30. ^ "HTC Bootloader Unlock Instructions". htcdev.com. Archived from the original on October 27, 2014. Retrieved October 26, 2014.
  31. ^ "Official Bootloader Unlock instructions". sonymobile.com. Archived from the original on July 7, 2014. Retrieved June 4, 2020.
  32. ^ "#unlocking-the-bootloader Google instructions on bootloader unlocking". source.android.com. Archived from the original on May 21, 2011. Retrieved October 26, 2014.
  33. ^ Mayo, Benjamin (June 10, 2015). "Xcode 7 allows anyone to download, build and 'sideload' iOS apps for free". Archived from the original on January 20, 2017. Retrieved November 12, 2016.
  34. ^ "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on May 10, 2013. Retrieved July 9, 2014. [U]nauthorized modification of iOS is a violation of the iOS end-user software license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod Touch that has installed any unauthorized software.
  35. ^ Ricker, Thomas (July 10, 2007). "iPhone Hackers: "we have owned the filesystem"". Engadget. Archived from the original on April 1, 2017. Retrieved July 17, 2009.
  36. ^ Topolsky, Joshua (August 6, 2007). "First third-party "game" app appears for iPhone". Engadget. Archived from the original on December 21, 2021. Retrieved July 17, 2009.
  37. ^ Wilson, Ben (October 10, 2007). "Official iPhone 1.1.1 jailbreak released with easy-to-follow instructions; does not require TIFF exploit". CNET. CBS Interactive. Archived from the original on July 19, 2009. Retrieved November 10, 2009.
  38. ^ Gregg Keizer (October 29, 2007). "Hacker Software Can Install Unauthorized Software on iPhones". PCWorld. IDG. Archived from the original on September 25, 2011. Retrieved August 25, 2011.
  39. ^ "iOS Jailbreaking - A Complete History - TechEngage". September 6, 2018. Archived from the original on March 11, 2024. Retrieved March 11, 2024.
  40. ^ Block, Ryan (February 12, 2008). "ZiPhone: jailbreak any version iPhone out of the box, including 1.1.3 (by Zibri)". Engadget. Archived from the original on November 1, 2013. Retrieved November 13, 2013.
  41. ^ Charlie Sorrel (July 21, 2008). "Pwnage 2.0 Released: Gadget Lab Jailbreaks iPod Touch". Gadget Lab. Wired. Archived from the original on September 11, 2011. Retrieved November 2, 2011.
  42. ^ Philip Elmer-DeWitt (July 20, 2008). "Dubious achievement: Hackers 'jailbreak' the iPhone 3G". CNN Money. Archived from the original on November 10, 2013. Retrieved October 26, 2011.
  43. ^ Erica Sadun (July 20, 2008). "First Look: Pwnage for 2.0". TUAW. Archived from the original on January 19, 2012. Retrieved November 1, 2011.
  44. ^ Dev Team (May 2011). "Tic tac toe..." Dev Team Blog. Archived from the original on October 31, 2011. Retrieved November 2, 2011.
  45. ^ a b c d e iPhone Dev Team (December 27, 2011). "Untethered holidays". Dev Team Blog. Archived from the original on October 22, 2016. Retrieved December 29, 2011.
  46. ^ Charlie Sorrel (November 25, 2008). "QuickPWN Adds Street View to iPod Touch". Gadget Lab. Wired. Archived from the original on August 22, 2010. Retrieved November 2, 2011.
  47. ^ Daniel Pan (June 23, 2009). "How to Use Cydia on your iPhone". iPhoneByte. Archived from the original on October 24, 2016. Retrieved November 2, 2015.{{cite web}}: CS1 maint: unfit URL (link)
  48. ^ Elizabeth Fish (October 13, 2011). "iOS 5 Jailbreak Is Already Here; Geeks Not Surprised". PCWorld. IDG. Archived from the original on April 26, 2012. Retrieved October 26, 2011.
  49. ^ Leslie Katz (July 3, 2009). "iPhone 3GS jailbreak, 'purplera1n,' hits Web". CNET. CBS Interactive. Archived from the original on February 8, 2012. Retrieved November 2, 2011.
  50. ^ Charlie Sorrel (November 5, 2009). "BlackRa1n Plus Blacksn0w: Unlock Any iPhone in Seconds". Gadget Lab. Wired. Archived from the original on October 30, 2011. Retrieved November 2, 2011.
  51. ^ Thomas Ricker (June 7, 2011). "iOS 5 jailbroken". Engadget. Aol.com. Archived from the original on October 17, 2011. Retrieved October 26, 2011.
  52. ^ a b Dan Goodin (May 3, 2010). "Hackers release jailbreak for iPad and newer iPhones". The Register. Archived from the original on October 19, 2011. Retrieved October 26, 2011.
  53. ^ John D. Sutter (August 2, 2010). "First iPhone 4 'jailbreak' posted online". CNN Tech. CNN. Archived from the original on February 3, 2012. Retrieved October 26, 2011.
  54. ^ Sean Hollister (August 1, 2010). "Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video)". Engadget. Archived from the original on August 13, 2010. Retrieved September 11, 2010.
  55. ^ Andy Greenberg (August 1, 2011). "Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple". Forbes. Archived from the original on December 23, 2012. Retrieved December 23, 2012.
  56. ^ Eric Mack (July 6, 2011). "App enables iPad 2 jailbreak from your browser". CNET. CBS Interactive. Archived from the original on November 10, 2013. Retrieved October 26, 2011.
  57. ^ P. J. Connolly (July 15, 2011). "Apple Fixes Latest iOS Exploit". eWEEK Labs. eWEEK. Archived from the original on May 24, 2024. Retrieved July 14, 2022.
  58. ^ jean (July 18, 2011). "Analysis of the jailbreakme v3 font exploit". Sogeti ESEC Lab. Archived from the original on July 22, 2011. Retrieved October 23, 2011.
  59. ^ David Murphy (October 9, 2010). "iPhone Hackers Square Off With Competing iOS 4 Jailbreaks". PCMag. Archived from the original on October 14, 2010. Retrieved November 2, 2011.
  60. ^ Charlie Sorrel (February 4, 2011). "Untethered iOS 4.2.1 Jailbreak Live". Gadget Lab. Wired. Archived from the original on November 9, 2011. Retrieved November 2, 2011.
  61. ^ Elizabeth Fish (October 20, 2010). "Oh Hai! Apple TV Officially Hacked". PCWorld. IDG. Archived from the original on November 3, 2011. Retrieved November 2, 2011.
  62. ^ Blair Hanley Frank (February 7, 2011). "Verizon iPhone Now Available for Jailbreaking". PCWorld. IDG. Archived from the original on March 14, 2011. Retrieved November 2, 2011.
  63. ^ Edgar Alvarez (June 4, 2012). "Newest version of ultrasn0w unlocks iPhone 4, 3GS on iOS 5.1.1, RedSn0w 0.9.12b1 also released". Engadget. Aol. Archived from the original on June 8, 2012. Retrieved June 16, 2012.
  64. ^ a b Joseph Volpe (January 20, 2012). "Absinthe A5 jailbreak released for iPhone 4S, Hacker Dream Team makes untethered dreams come true". Engadget. Aol. Archived from the original on January 21, 2012. Retrieved January 20, 2012.
  65. ^ John Paul Titlow (January 20, 2012). "Now You Can Jailbreak Your iPhone 4S and iPad 2". ReadWriteWeb. Archived from the original on January 22, 2012. Retrieved January 20, 2012.
  66. ^ a b c Eric Mack (January 20, 2012). "Fly, be free! Jailbreak for iPhone 4S, iPad 2 released". CNET. CBS Interactive. Archived from the original on January 22, 2012. Retrieved January 22, 2012.
  67. ^ a b c d e McKinley Noble (January 20, 2012). "How to Jailbreak Your iPhone 4S and iPad 2 via Absinthe A5". PCWorld. IDG. Archived from the original on January 22, 2012. Retrieved January 22, 2012.
  68. ^ Adrian Kingsley-Hughes (May 26, 2012). "Untethered Jailbreak For Your iOS 5.1.1 iPhone/iPad/iPod Touch Is Here". Tech. Forbes. Archived from the original on May 30, 2012. Retrieved June 1, 2012.
  69. ^ "evasi0n jailbreak used on nearly 7 million iOS 6.0/6.1 devices". Tech2. February 9, 2013. Archived from the original on March 22, 2022. Retrieved March 22, 2022.
  70. ^ "iOS 6.1.4 Software Update". apple.com. Archived from the original on September 23, 2013. Retrieved September 2, 2013.
  71. ^ "Download TaiG 1.2.0 To Jailbreak iOS 8.1.2". December 10, 2014. Archived from the original on December 10, 2014. Retrieved December 10, 2014.
  72. ^ "TaiG Update Log". Archived from the original on July 3, 2015. Retrieved July 3, 2015.
  73. ^ "iOS 9 has been jailbroken". Archived from the original on October 15, 2015. Retrieved October 16, 2015.
  74. ^ "The first iOS 9 jailbreak is here". October 14, 2015. Archived from the original on October 15, 2015. Retrieved October 16, 2015.
  75. ^ a b c d e f g h Mathew J. Schwartz (July 7, 2011). "Apple iOS Zero-Day PDF Vulnerability Exposed". InformationWeek. Archived from the original on July 10, 2011. Retrieved October 23, 2011.
  76. ^ a b c d e Mike Keller (August 23, 2011). "Jailbreaking 101: Which Tool to Use to Hack Your iDevice". PCWorld. IDG. Archived from the original on July 6, 2012. Retrieved October 23, 2011.
  77. ^ "Seas0nPass/README at master · firecore/Seas0nPass". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  78. ^ a b c Sarah Jacobsson Purewal (October 18, 2011). "How to Jailbreak Your iOS 5 Device". PCWorld. IDG. Archived from the original on May 8, 2016. Retrieved October 23, 2011.
  79. ^ a b iPhone Dev Team (March 7, 2012). "March Mayhem". Dev Team Blog. Archived from the original on September 4, 2016. Retrieved April 22, 2012.
  80. ^ a b Edgar Alvarez (April 21, 2012). "RedSn0w updated for Mac and Windows: adds Corona A5 jailbreak, other tools". Engadget. Archived from the original on April 21, 2012. Retrieved April 22, 2012.
  81. ^ "Dev-Team Blog – Pre-DC". Dev-Team Blog. June 4, 2012. Archived from the original on October 19, 2016. Retrieved May 30, 2013.
  82. ^ "Jailbreak iOS 6.1.3 On Pre-A5 iPhone And iPod Touch Using Redsn0w [How-To Tutorial]". Redmond Pie. March 20, 2013. Archived from the original on January 1, 2017. Retrieved May 30, 2013.
  83. ^ absinthe-2.0, OpenJailbreak, September 30, 2022, archived from the original on August 30, 2023, retrieved August 30, 2023
  84. ^ a b "evasi0n iOS 7.0.x Jailbreak – official website of the evad3rs". Archived from the original on February 4, 2013.
  85. ^ OpenJailbreak/evasi0n6, OpenJailbreak, June 30, 2023, archived from the original on March 22, 2023, retrieved August 30, 2023
  86. ^ "Released under GPL licensing. · p0sixspwn/p0sixspwn@f1dff0f". GitHub. Archived from the original on January 14, 2018. Retrieved August 30, 2023.
  87. ^ a b c d "Pangu Untethered Jailbreak of iOS 7.1.1 Has Been Released". June 23, 2014. Archived from the original on August 28, 2016. Retrieved June 23, 2014.
  88. ^ "yalu102/LICENSE at master · kpwn/yalu102". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  89. ^ @tihmstar (August 6, 2017). "Releasing Phoenix jailbreak for iOS 9.3.5 now! All 32bit devices supported! Be sure to check PGP signature :) https://phoenixpwn.com" (Tweet). Retrieved December 19, 2017 – via Twitter.
  90. ^ "EtasonJB". etasonjb.tihmstar.net. Archived from the original on December 10, 2017. Retrieved December 19, 2017.
  91. ^ Masri, Abraham (December 16, 2017). "GitHub - cheesecakeufo/saigon: iOS 10.2.1 Jailbreak - Discontinued version". GitHub. Archived from the original on September 6, 2018. Retrieved August 30, 2023.
  92. ^ Sparkes, Ben. "Meridian: iOS 10.x Jailbreak". meridian.sparkes.zone. Archived from the original on June 23, 2018. Retrieved June 22, 2018.
  93. ^ "MeridianJB/LICENSE.md at master · PsychoTea/MeridianJB". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  94. ^ "Spyware.lol". Archived from the original on December 6, 2022. Retrieved March 22, 2019.
  95. ^ "electra/LICENSE.md at master · coolstar/electra". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  96. ^ "electra1131/LICENSE.md at master · coolstar/electra1131". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  97. ^ "Undecimus/LICENSE at master · pwn20wndstuff/Undecimus". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  98. ^ "Unpatchable bug in millions of iOS devices exploited, developer claims – Ars Technica". arstechnica.com. September 27, 2019. Archived from the original on December 24, 2019. Retrieved December 19, 2019.
  99. ^ "checkra1n Official Website". checkra.in. Archived from the original on June 3, 2020. Retrieved June 4, 2020.
  100. ^ "Fugu/LICENSE at master · LinusHenze/Fugu". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  101. ^ "Odyssey/LICENSE.md at master · Odyssey-Team/Odyssey". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  102. ^ "Taurine". taurine.app. Archived from the original on April 27, 2024. Retrieved April 22, 2024.
  103. ^ "Taurine/LICENSE.md at main · Odyssey-Team/Taurine". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  104. ^ "Fugu14/LICENSE at master · LinusHenze/Fugu14". GitHub. Archived from the original on May 24, 2024. Retrieved August 30, 2023.
  105. ^ Bouchard, Anthony (April 20, 2022). "New p0laris jailbreak for legacy iOS 9.x firmware released". iDownloadBlog.com. Archived from the original on May 6, 2022. Retrieved May 5, 2022.
  106. ^ "app/LICENSE at master · p0larisdev/app". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  107. ^ "openpwnage GitHub Page". GitHub. Archived from the original on January 14, 2023. Retrieved February 23, 2023.
  108. ^ "openpwnage/LICENSE at main · 0xilis/openpwnage". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  109. ^ "New Blizzard Jailbreak released by GeoSn0w For iOS 9.0 – 9.3.6, 32-Bit Devices". idevicecentral.com. August 4, 2022. Archived from the original on November 3, 2023. Retrieved October 21, 2023.
  110. ^ "Blizzard-Jailbreak-9/LICENSE at main · geosn0w/Blizzard-Jailbreak-9". GitHub. Archived from the original on August 2, 2022. Retrieved October 21, 2023.
  111. ^ "Release 2.0 beta 1 · palera1n/palera1n-c". GitHub. February 12, 2023. Archived from the original on March 19, 2023. Retrieved October 13, 2023.
  112. ^ "palera1n/LICENSE at main · palera1n/palera1n". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  113. ^ "XinaA15 GitHub Page". GitHub. Archived from the original on January 1, 2023. Retrieved January 1, 2023.
  114. ^ Fröder, Lars (August 18, 2023), "Dopamine GitHub Page", GitHub, archived from the original on August 16, 2023, retrieved August 18, 2023
  115. ^ "Dopamine/LICENSE.md at master · opa334/Dopamine". GitHub. Archived from the original on August 30, 2023. Retrieved August 30, 2023.
  116. ^ "roothide/Bootstrap GitHub Page". GitHub. Archived from the original on February 7, 2024. Retrieved February 7, 2024.
  117. ^ "Bootstrap/LICENSE at main · roothide/Bootstrap". GitHub. Archived from the original on April 8, 2024. Retrieved April 8, 2024.
  118. ^ @dedbeddedbed (August 13, 2024). "nathanlr" (Tweet) – via Twitter.
  119. ^ @dedbeddedbed (August 13, 2024). "16.5.1-16.6.1" (Tweet) – via Twitter.
  120. ^ "nathanlr/LICENSE at main · verygenericname/nathanlr". GitHub. Retrieved October 6, 2024.
  121. ^ "Apple adds jailbreak resistance to recent iPhone 3GS models". October 14, 2009. Archived from the original on June 21, 2015. Retrieved June 20, 2015.
  122. ^ Robertson, Jordan (July 8, 2011). "Security holes discovered in iPhones, iPads". News & Record. Associated Press. Archived from the original on July 11, 2011. Retrieved July 9, 2011.
  123. ^ "Taig and Pangu working on Jailbreak for IOS 8.4.1". Archived from the original on September 23, 2015.
  124. ^ "iOS 9's Rootless security system dubbed as a 'heavy blow' to jailbreak community". May 22, 2015. Archived from the original on November 22, 2015. Retrieved October 10, 2015.
  125. ^ Perez, Sarah (October 21, 2015). "Apple's iOS 9.1 Shuts Down The Pangu Hacking Team's Jailbreak". TechCrunch. Archived from the original on November 11, 2015. Retrieved November 11, 2015.
  126. ^ "About the security content of iOS 10.2.1". Apple Support. Archived from the original on February 16, 2017. Retrieved March 19, 2017.
  127. ^ Clover, Juli (December 11, 2019). "Apple Used DMCA Takedown to Temporarily Remove Tweet With iPhone Encryption Key". macrumors.com. Archived from the original on December 13, 2019. Retrieved December 16, 2019.
  128. ^ Gartenberg, Chaim (June 1, 2020). "Apple releases iOS 13.5.1, patching out the Unc0ver jailbreak". The Verge. Archived from the original on December 17, 2020. Retrieved June 16, 2020.
  129. ^ "Signed system volume security in macOS". Apple Support. Archived from the original on May 14, 2022. Retrieved April 15, 2022.
  130. ^ a b Duncan Geere (July 28, 2010). "Investigation: Is it legal to jailbreak a UK iPhone?". Wired UK. Archived from the original on October 31, 2012. Retrieved October 26, 2012.
  131. ^ Greenberg, Andy. "iPhone Uber-Hacker Comex Is Out At Apple". Forbes. Archived from the original on September 23, 2015. Retrieved August 15, 2015.
  132. ^ Heath, Alex (February 21, 2014). "After Doing "Insane Things With iOS," Jailbreak Hacker Winocm Joins Apple". Cult of Mac. Archived from the original on November 22, 2015. Retrieved November 22, 2015.
  133. ^ "8.4.1 release notes". Apple. Archived from the original on September 6, 2015. Retrieved August 15, 2015.
  134. ^ "Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues". Apple Support. Archived from the original on December 23, 2016. Retrieved February 14, 2017.
  135. ^ Rosalyn Page (August 5, 2010). "Could jailbreaking your iPhone land you in jail?". PC & Tech Authority. Archived from the original on October 21, 2013. Retrieved January 21, 2013.
  136. ^ Michael Geist (November 7, 2012). "Canadian Copyright Reform In Force: Expanded User Rights Now the Law". michaelgeist.ca. Archived from the original on November 9, 2012. Retrieved November 13, 2012.
  137. ^ "Canada's C-11 Bill and the Hazards of Digital Locks Provisions". Electronic Frontier Foundation. February 10, 2012. Archived from the original on October 17, 2012. Retrieved October 17, 2012.
  138. ^ The Canadian Press (October 13, 2011). "Phone 'jailbreaking' allows users to hack their phone". CTV News. Archived from the original on November 7, 2012. Retrieved October 17, 2012.
  139. ^ Pranesh Prakash (May 23, 2012). "Analysis of the Copyright (Amendment) Bill 2012". Centre for Internet and Society. Archived from the original on April 24, 2014. Retrieved July 14, 2022.
  140. ^ Michael Geist (April 10, 2008). "New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility". Michael Geist. Archived from the original on April 19, 2012. Retrieved October 26, 2012.
  141. ^ Stephen Bell (September 30, 2011). "Law changes required before NZ ratifies ACTA". ComputerWorld New Zealand. Archived from the original on September 30, 2011. Retrieved October 26, 2012.
  142. ^ Kenny Chee (August 12, 2010). "iPhone jailbreak may be legal here, but... But there will be certain legal provisions". DigitalOne. AsiaOne. Archived from the original on August 15, 2010. Retrieved November 10, 2012.
  143. ^ Jim Martin (March 14, 2012). "How to jailbreak your iPhone: Unleash the full potential of your iPhone". PC Advisor. Archived from the original on December 22, 2012. Retrieved January 21, 2013.
  144. ^ Warwick Ashford (July 30, 2010). "iPhone jailbreaking is 'okay under EU law'". Computer Weekly. Electronics Weekly. Archived from the original on July 14, 2022. Retrieved July 14, 2022.
  145. ^ Copyright Office, Library of Congress (October 2012). "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies" (PDF). Federal Register. Archived (PDF) from the original on January 4, 2014. Retrieved February 3, 2014.
  146. ^ David Goldman (July 26, 2010). "Jailbreaking iPhone apps is now legal". CNN Money. Archived from the original on August 30, 2010. Retrieved September 11, 2010.
  147. ^ "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". Federal Register. The United States Government. October 28, 2015. Archived from the original on November 21, 2015. Retrieved November 20, 2015.
  148. ^ a b "Transcript of "Jailbreak?" (July 30, 2010)". On The Media. July 30, 2010. Archived from the original on July 31, 2010. Retrieved September 11, 2010.
  149. ^ Leander Kahney (July 26, 2010). "Apple's Official Response To DMCA Jailbreak Exemption: It Voids Your Warranty". Cult Of Mac. Archived from the original on November 23, 2013. Retrieved October 26, 2011.
  150. ^ a b Tim Wu (October 4, 2007). "The iPhone Freedom Fighters". Technology. Slate. Archived from the original on September 24, 2011. Retrieved October 26, 2011.
  151. ^ "Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for" (PDF). Archived from the original (PDF) on July 10, 2010. Retrieved September 11, 2010.
  152. ^ "Copyright office provides exemption to DMCA". United States Copyright Office. February 12, 2009. Archived from the original on August 6, 2009. Retrieved July 17, 2009.
  153. ^ Declan McCullagh (July 26, 2010). "Feds say mobile-phone jailbreaking is OK". CNET. CBS Interactive. Archived from the original on October 7, 2011. Retrieved October 26, 2011.
  154. ^ a b Timothy B. Lee (October 25, 2012). "Jailbreaking now legal under DMCA for smartphones, but not tablets". Ars Technica. Condé Nast. Archived from the original on October 27, 2012. Retrieved October 26, 2012.
  155. ^ "New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past". Android Police. October 27, 2012. Archived from the original on October 30, 2012. Retrieved October 31, 2012.
  156. ^ Statt, Nick (October 27, 2015). "US government says it's now okay to jailbreak your tablet and smart TV". The Verge. Archived from the original on August 13, 2020. Retrieved August 14, 2020.
  157. ^ Brigid Andersen (November 9, 2009). "Australian admits creating first iPhone virus". ABC Online. Archived from the original on December 2, 2011. Retrieved October 26, 2011.
  158. ^ "New iPhone worm can act like botnet say experts". BBC News. November 23, 2009. Archived from the original on January 12, 2010. Retrieved April 10, 2010.
  159. ^ Mikko (November 22, 2009). "Malicious iPhone Worm". News from the Lab. F-secure. Archived from the original on November 25, 2009. Retrieved April 10, 2010.
  160. ^ Adrian Kingsley-Hughes (May 28, 2011). "'Should I Jailbreak My iPhone?' And Other Jailbreaking Questions Answered". Tech. Forbes. Archived from the original on November 11, 2012. Retrieved November 14, 2012.
  161. ^ Sharon Vaknin (June 27, 2012). "How to unjailbreak your iPhone, iPad, or iPod Touch and is illegal". CNET. CBS Interactive. Archived from the original on November 17, 2012. Retrieved November 14, 2012.
  162. ^ Christopher Breen (December 29, 2008). "The Best IPhone Apps Not in the App Store". PCWorld. IDG. Archived from the original on October 17, 2012. Retrieved November 14, 2012.
  163. ^ a b Greenberg, Andy (February 14, 2012). "Unauthorized iPhone And iPad Apps Leak Private Data Less Often Than Approved Ones". Tech. Forbes. Archived from the original on February 14, 2012. Retrieved February 15, 2012.
  164. ^ Joseph Steinberg (August 31, 2015). "Massive iPhone User Data Breach: What You Need to Know". Inc. Archived from the original on September 2, 2015. Retrieved September 2, 2015.
  165. ^ Wagenseil, Paul (October 16, 2019). "iPhone Jailbreak Scam Puts Ads on Your Phone". Tom's Guide. Archived from the original on November 9, 2019. Retrieved November 9, 2019.