<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Boxingcow</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Boxingcow"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Boxingcow"/>
	<updated>2026-05-17T12:08:53Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:IDroid&amp;diff=21499</id>
		<title>Talk:IDroid</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:IDroid&amp;diff=21499"/>
		<updated>2011-10-11T20:20:07Z</updated>

		<summary type="html">&lt;p&gt;Boxingcow: /* Major edits... */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Q:''' Hmmm... I install Ubuntu 8.10 on Parallels Desktop on my MacBook Pro, I've downloaded all required files, but after I run command&lt;br /&gt;
 sudo ./oibc&lt;br /&gt;
Terminal says that I type incorrect syntax... WTF?&lt;br /&gt;
&lt;br /&gt;
'''A:''' First of all, OpeniBoot might not work under a virtual machine (Parallel Desktop). And you are suppose to use loadibec BEFORE oibc to upload openiboot on the phone. Be sure to send the file corresponding to your device.&lt;br /&gt;
&lt;br /&gt;
'''Q:''' Of course I've upload patched iBoot before I've run ./oibc command... And iPhone show me &amp;quot;standard patched bootloader screen&amp;quot;, where I choose console iBoot. And after this steps I've try to run ./oibc, but ... (see first q's)&lt;br /&gt;
&lt;br /&gt;
'''A:''' So, you need to have a pwn iBoot (just jailbreak on 2.x and you'll be fine), if you use the files comming with the linux demo, make sure you are at 2.x+ (pwned 1.1.4 or 1.1.5 won't work). Be sure to upload the correct version of OpeniBoot (2g, 3g or iPod for the first gen iPhone, the 3g iPhone and the iPod Touch 1G; no support for the iPod Touch 2G, yet). After launching loadibec, check your device's screen to see wether you have the same image as in [[iPhoneLinux]]. Then you can launch oibc. Beware, after launching loadibec, the device is recognised as a different usb device, so you might need to load it in Ubuntu from OS X in Parallel Desktop options.&lt;br /&gt;
&lt;br /&gt;
'''Q:''' I've got pwned iPhone 3G with 2.2.1 firmware. All steps I do with manual [[iPhoneLinux]] in hands... Before I run oibc, of course, I've connect &amp;quot;another USB device&amp;quot; to virtual machine (and disconnect it from main system). I've see picture like [[iPhoneLinux]] manual, but after I run oibc nothing happen...&lt;br /&gt;
&lt;br /&gt;
You can also check out the required libraries (I just added the list to the installation section) on the article :&lt;br /&gt;
* Required libraries (install as a package for Uuntu).:&lt;br /&gt;
** libpthread&lt;br /&gt;
** libncurses&lt;br /&gt;
** libusb&lt;br /&gt;
** libreadline&lt;br /&gt;
&lt;br /&gt;
== Is this project dead? ==&lt;br /&gt;
So is this project still alive or is it dead now?&lt;br /&gt;
&lt;br /&gt;
Planetbeing was onto developing iPhoneLinux. You can try contacting him by Twitter, but it seems that he abandoned his account. --[[User:Pjakuszew|Pjakuszew]] 10:47, 17 October 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Please don't let this project die :( I wanna run Android on my iPhone :D --[[User:Rekoil|adriaaan]] 22:19, 17 October 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Major edits... ==&lt;br /&gt;
&lt;br /&gt;
This page needed a little updating, so I though I would give it a quick bash, I think some may not like it, but Planetbeing AFAIK has a new job and is under 'gag-order' and can no longer take care of this stuff. iDroid picked this up ages ago, so iPhonelinux became iDroid, so maybe a page name change? A little more info is needed, and if these changes stick I will add some in my spare time - if I find moar. --[[User:Boxingcow|Boxingcow]] 14:20, 11 October 2011 (MDT)&lt;/div&gt;</summary>
		<author><name>Boxingcow</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IDroid&amp;diff=21498</id>
		<title>IDroid</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IDroid&amp;diff=21498"/>
		<updated>2011-10-11T20:16:45Z</updated>

		<summary type="html">&lt;p&gt;Boxingcow: iPhonelinux --&amp;gt; iDroid, Planetbeing no longer works this and everything iPhonelinux is now iDroid&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{DISPLAYTITLE:iDroid-Project}}&lt;br /&gt;
[[Image:Openiboot.png|thumb|right|200px|Device running the OpeniBoot console.]]&lt;br /&gt;
iDroid is a project which goals are to port linux and Android to the iPhone/iPod/iPad and make a Free (free software) OS alternative to the Apple proprietary &amp;quot;{{wp|iOS (Apple)|iOS}}&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
iDroid is not actually a hack/exploit neither an unlock, but it is based on BootROM exploits which allowing the running of unsigned code at low level.&lt;br /&gt;
&lt;br /&gt;
=== OpeniBoot ===&lt;br /&gt;
&lt;br /&gt;
The goals of OpeniBoot are&lt;br /&gt;
* to run low-level code, &lt;br /&gt;
* to have low and critical drivers (NAND and NOR driver, NVRAM...), and&lt;br /&gt;
* to have a debugger and development environment (chainloading, upgrading itself and USB mass storage).&lt;br /&gt;
&lt;br /&gt;
=== Linux ===&lt;br /&gt;
A linux Bootloader, a working linux kernel (just a question of cross-compiler), porting drivers, run wifi and command line through SSH.&lt;br /&gt;
&lt;br /&gt;
=== Android ===&lt;br /&gt;
&lt;br /&gt;
On April 21, 2010, an Android distribution based on iPhoneLinux called iDroid was released.&lt;br /&gt;
&lt;br /&gt;
* Announcement on the linuxoniphone blog: [http://linuxoniphone.blogspot.com/2010/04/ive-been-working-on-this-quietly-in.html iDroid initial release]&lt;br /&gt;
* Official iDroid Wiki: [http://www.idroidproject.org/ iDroid Project]&lt;br /&gt;
&lt;br /&gt;
== Frequently Asked Questions ==&lt;br /&gt;
&lt;br /&gt;
To see answers to frequently-asked questions about iPhoneLinux and iDroid, go to the [http://www.idroidproject.org/wiki/Frequently_Asked_Questions iPhoneLinux FAQ] page.&lt;/div&gt;</summary>
		<author><name>Boxingcow</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IBoot_(Bootloader)&amp;diff=21497</id>
		<title>IBoot (Bootloader)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IBoot_(Bootloader)&amp;diff=21497"/>
		<updated>2011-10-11T20:06:59Z</updated>

		<summary type="html">&lt;p&gt;Boxingcow: Update link + a little info. Now iDroid, not planetbeing.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
This is Apple's stage 2 bootloader for all of the iDevices. It runs what is known as [[Recovery Mode]]. It has an interactive interface which can be used over USB or serial.&lt;br /&gt;
&lt;br /&gt;
== [[Bootrom]] ==&lt;br /&gt;
The bootrom also goes by the name &amp;quot;iBoot.&amp;quot; The list of bootroms can be found on [[Bootrom|their own page]].&lt;br /&gt;
&lt;br /&gt;
== Revisions ==&lt;br /&gt;
* [[iBoot-99]] (1A420 a.k.a. Prototype)&lt;br /&gt;
* [[iBoot-159]] (1.0.x)&lt;br /&gt;
* [[iBoot-204]] (1.1 and 1.1.1 Build 3A109a)&lt;br /&gt;
* [[iBoot-204.0.2]] (1.1.1 Build 3A110a)&lt;br /&gt;
* [[iBoot-204.2.9]] (1.1.2)&lt;br /&gt;
* [[iBoot-204.3.14]] (1.1.3 and 1.1.4)&lt;br /&gt;
* [[iBoot-204.3.16]] (1.1.5)&lt;br /&gt;
* [[iBoot-320.20]] (2.0.x)&lt;br /&gt;
* [[iBoot-385.22]] (2.1 and 2.1.1)&lt;br /&gt;
* [[iBoot-385.49]] (2.2 and 2.2.1)&lt;br /&gt;
* [[iBoot-596.24]] (3.0 and 3.0.1)&lt;br /&gt;
* [[iBoot-636.65]] (3.1)&lt;br /&gt;
* [[iBoot-636.66]] (3.1.1 and 3.1.2)&lt;br /&gt;
* [[iBoot-636.66.33]] (3.1.3)&lt;br /&gt;
* [[iBoot-817.28]] (3.2)&lt;br /&gt;
* [[iBoot-817.29]] (3.2.1 and 3.2.2)&lt;br /&gt;
* [[iBoot-872]] (4.0 Beta 1)&lt;br /&gt;
* [[iBoot-889.3]] (4.0 Beta 2)&lt;br /&gt;
* [[iBoot-889.12]] (4.0 Beta 3)&lt;br /&gt;
* [[iBoot-889.19]] (4.0 Beta 4)&lt;br /&gt;
* [[iBoot-889.24]] (4.0.x)&lt;br /&gt;
* [[iBoot-931.18.1]] (4.1 Beta 1)&lt;br /&gt;
* [[iBoot-931.18.27]] (4.1 Builds 8B117 and 8B118)&lt;br /&gt;
* [[iBoot-931.44.21]] (4.1 Build 8M89)&lt;br /&gt;
* [[iBoot-931.67]] (4.2 Beta 1)&lt;br /&gt;
* [[iBoot-931.71.13]] (4.2 Beta 3)&lt;br /&gt;
* [[iBoot-931.71.16]] (4.2 GM and 4.2.1 Builds 8C148, 8C148a, and 8C154)&lt;br /&gt;
* [[iBoot-931.72.14]] (4.2.5, 4.2.6, 4.2.7, 4.2.8, 4.2.9 and 4.2.10)&lt;br /&gt;
* [[iBoot-1072.33~1]] (4.3 Beta 1)&lt;br /&gt;
* [[iBoot-1072.38]] (4.3 Beta 2)&lt;br /&gt;
* [[iBoot-1072.49]] (4.3 Beta 3)&lt;br /&gt;
* [[iBoot-1072.58]] (4.3 Build 8F190)&lt;br /&gt;
* [[iBoot-1072.59]] (4.3 Builds 8F191, 8F191m, 8F202 and 8F305, and 4.3.1)&lt;br /&gt;
* [[iBoot-1072.61]] (4.3.2, 4.3.3, 4.3.4 and 4.3.5)&lt;br /&gt;
* [[iBoot-1219.35.80~1]] (5.0 beta 1)&lt;br /&gt;
* [[iBoot-1219.40.25]] (5.0 beta 2)&lt;br /&gt;
* [[iBoot-1219.41.11~1]] (5.0 beta 3)&lt;br /&gt;
* [[iBoot-1219.42.8]] (5.0 beta 4)&lt;br /&gt;
* [[iBoot-1219.43.9]] (5.0 beta 5)&lt;br /&gt;
* iBoot-1219.43.?? (5.0 beta 6)&lt;br /&gt;
* iBoot-1219.43.?? (5.0 beta 7)&lt;br /&gt;
* [[iBoot-1219.43.32]] (5.0 GM)&lt;br /&gt;
&lt;br /&gt;
== Commands used as an exploit vector ==&lt;br /&gt;
* '''diags''': Until 2.0 beta 6, the [[diags]] command would jump to code at the address provided to it. For example, if you sent &amp;quot;diags 0x9000000&amp;quot;, it would directly jump to the code at 0x9000000. There is now a check that only allows engineering devices to utilize this backdoor.&lt;br /&gt;
* '''arm7_go''': For firmware 2.1.1, the [[N72ap|iPod touch 2G]] iBoot contains the [[ARM7 Go]] command, which could be used to run a payload on the ARM7 in the device.&lt;br /&gt;
&lt;br /&gt;
== OpeniBoot ==&lt;br /&gt;
There is an open source version of iBoot designed so that custom kernels can be run on the iPhone/iPod/iPad. You can check out the source [http://github.com/iDroid-Project/OpeniBoot here]. It is VERY useful if you are ever reversing iBoot and do not feel like finding out what certain hardware registers are yourself.&lt;br /&gt;
OpeniBoot currently supports all S5l8900, S5l8720, S5l8920 and S5l8930 devices. More info can be found about OpeniBoot and Linux on these devices on the iDroid-Project [http://idroidproject.org website.]&lt;br /&gt;
&lt;br /&gt;
== Remappings ==&lt;br /&gt;
 // n88 (3GS)&lt;br /&gt;
 0x4FF00000 =&amp;gt; 0x0&lt;br /&gt;
 0x40000000 =&amp;gt; 0xC0000000&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[iBoot (Enums)]]&lt;/div&gt;</summary>
		<author><name>Boxingcow</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=11538</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=11538"/>
		<updated>2010-10-28T17:44:14Z</updated>

		<summary type="html">&lt;p&gt;Boxingcow: Undo useless and pointless info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 20 -- The [[iPhone Dev Team|Dev Team]] releases [[PwnageTool]] 4.1 which jailbreaks iOS 4.1 and 3.2.2 on every device  available at the time of release. [http://blog.iphone-dev.org/post/1359246784/20102010-event (see blog post)]&lt;br /&gt;
*October 12 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[greenpois0n]] after switching its exploit from SHAtter to the exploit [[limera1n]] uses. By doing this, SHAtter remains undisclosed, meaning there is a chance that the 5th generation devices are vulnerable. (The exploit [[limera1n]] uses appears to be fixed in the [[iBoot]] revision found in iOS 4.2 beta 2, which means Apple probably knows about the vulnerability and the next [[bootrom]] revision may have it patched.)&lt;br /&gt;
*October 10 -- Following the first [[limera1n]] beta release, [[User:geohot|geohot]] released multiple versions, each fixing bugs affecting previous releases. [[Chronic Dev (team)|Chronic Dev Team]] officialy anounces that, in order to keep SHAtter undisclosed and possibly preserve it for 5th generation devices, [[greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
*October 9 -- In order to push [[Chronic Dev (team)|Chronic Dev Team]] to change the exploit used on [[greenpois0n]], [[User:geohot|geohot]] rushed out a beta version of [[limera1n]].&lt;br /&gt;
*October 8 -- [[User:Geohot|Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of SHAtter, but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[User:Geohot|Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: SHAtter itself and the one used by [[limera1n]], which is patchable and may be a universal one.&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new SHAtter exploit for devices with the [[S5L8930]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via SHAtter.&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via SHAtter.&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of SHAtter is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia Application|Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- iPhone-Elite Team releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases iJailBreak, the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases touchFree, the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- niacin, [[cmw]], and dre release the LibTiff exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Boxingcow</name></author>
		
	</entry>
</feed>