<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kiddepants</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kiddepants"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Kiddepants"/>
	<updated>2026-05-17T23:48:50Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Unc0ver&amp;diff=103121</id>
		<title>Unc0ver</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Unc0ver&amp;diff=103121"/>
		<updated>2020-06-03T20:56:11Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Removed by request&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}{{Infobox software&lt;br /&gt;
 | name                   = unc0ver&lt;br /&gt;
 | title                  = unc0ver&lt;br /&gt;
 | developer              = [https://twitter.com/pwn20wnd pwn20wnd]&amp;lt;br /&amp;gt;[https://twitter.com/sbingner sbingner]&lt;br /&gt;
 | released               = {{Start date|2018|10|13|df=yes}}&lt;br /&gt;
 | latest release version = v5.0.1&lt;br /&gt;
 | latest release date    = {{Start date and age|2020|05|24|df=yes}}&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [https://unc0ver.dev The Official Website]&amp;lt;br /&amp;gt;[https://www.reddit.com/9nwxei/ The Reddit thread]&amp;lt;br /&amp;gt;[https://github.com/pwn20wndstuff/Undecimus The GitHub repo]&lt;br /&gt;
}}&lt;br /&gt;
'''unc0ver''' is a [[semi-untethered jailbreak]] for all devices running iOS 11.0 through 13.5.&lt;br /&gt;
&lt;br /&gt;
In order to download the latest IPA, download links from the README section has been moved to the releases section of the repository (you can find this by looking under the colored bars where you can find the releases page which is in the middle, alongside branches and contributors).&lt;br /&gt;
==Release History==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| RC1&lt;br /&gt;
| {{date|2018|10|13}}&lt;br /&gt;
|&lt;br /&gt;
* Initial release&lt;br /&gt;
|-&lt;br /&gt;
| RC2&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | {{date|2018|10|14}}&lt;br /&gt;
|&lt;br /&gt;
* Add the Dynastic repo by default&lt;br /&gt;
* Fix a bug in firmware checker&lt;br /&gt;
|-&lt;br /&gt;
| RC3&lt;br /&gt;
|&lt;br /&gt;
* Add a switch to manually enable restoring RootFS&lt;br /&gt;
* Stop erasing user preferences when restoring RootFS&lt;br /&gt;
* Fix bugs&lt;br /&gt;
|-&lt;br /&gt;
| RC4&lt;br /&gt;
|&lt;br /&gt;
* Add a label to display the uptime&lt;br /&gt;
* Add a label to display the app's version number&lt;br /&gt;
* Spawn to the PATH&lt;br /&gt;
* Stop bundling system fonts&lt;br /&gt;
|-&lt;br /&gt;
| RC5&lt;br /&gt;
|&lt;br /&gt;
* Run videosubscriptionsd in the jailed state&lt;br /&gt;
* Fix a bug in firmware and update checker&lt;br /&gt;
|-&lt;br /&gt;
| RC6&lt;br /&gt;
|&lt;br /&gt;
* Start logging again&lt;br /&gt;
* Improve update checker&lt;br /&gt;
* Fix multi_path&lt;br /&gt;
|-&lt;br /&gt;
| RC7&lt;br /&gt;
| {{date|2018|10|17}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Restore and multi_path&lt;br /&gt;
|-&lt;br /&gt;
| RC8&lt;br /&gt;
| {{date|2018|10|18}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Remount&lt;br /&gt;
* Add a work in progress warning for some firmwares &lt;br /&gt;
|-&lt;br /&gt;
| RC9&lt;br /&gt;
| {{date|2018|10|19}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Remount&lt;br /&gt;
* Add even more detailed error messages&lt;br /&gt;
* Add a switch to increase the memory limit to improve the stability&lt;br /&gt;
* Improve the compatibility layer to work correctly with some tweaks that were specifically made for the other jailbreaks&lt;br /&gt;
|-&lt;br /&gt;
| v1&lt;br /&gt;
| {{date|2018|10|20}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Restore and Remount&lt;br /&gt;
* Make the settings tab match with the rest of the UI&lt;br /&gt;
* Fix bugs&lt;br /&gt;
|-&lt;br /&gt;
| v1.0.1&lt;br /&gt;
| {{date|2018|10|21}}&lt;br /&gt;
|&lt;br /&gt;
* Disable the RootFS Restore for the unstable versions&lt;br /&gt;
|-&lt;br /&gt;
| v1.0.2&lt;br /&gt;
| {{date|2018|10|22}}&lt;br /&gt;
|&lt;br /&gt;
* Enable and fix the RootFS Restore for all versions&lt;br /&gt;
|-&lt;br /&gt;
| v1.0.3&lt;br /&gt;
| {{date|2018|10|23}}&lt;br /&gt;
|&lt;br /&gt;
* Fix the beta firmwares&lt;br /&gt;
|-&lt;br /&gt;
| v1.1&lt;br /&gt;
| {{date|2018|10|27}}&lt;br /&gt;
|&lt;br /&gt;
* Automatically select the best exploit&lt;br /&gt;
* Rewrite the versions checker&lt;br /&gt;
* Improve assertion&lt;br /&gt;
* Show the code which has failed in the error messages&lt;br /&gt;
* Improve memory management&lt;br /&gt;
* Optimize and clean up the code&lt;br /&gt;
* Fix the Storage settings&lt;br /&gt;
* Switch to a new technique to disable auto updates&lt;br /&gt;
* Remove so much useless logging&lt;br /&gt;
* Only set the boot-nonce if the switch is on without checking if it exists or not&lt;br /&gt;
* Log offsets&lt;br /&gt;
* Remove static sleeps to improve the speed&lt;br /&gt;
* Fix series of bugs and leave no known bug&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2018|11|03}}&lt;br /&gt;
|&lt;br /&gt;
* Add a label to show the ECID&lt;br /&gt;
* Add a button to open the source code&lt;br /&gt;
* Improve auto layout&lt;br /&gt;
* Fix various bugs within RootFS interaction, Icon cache refresher, Version checker, Exploit selector, jailbreak state detector and others&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.2&lt;br /&gt;
|&lt;br /&gt;
* Improve auto layout and code&lt;br /&gt;
* Significantly improve Empty_List (VFS) exploit&lt;br /&gt;
* Slightly improve Multi_Path (MPTCP)&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2018|11|06}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in starting jailbreakd&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.4&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in finding offsets&lt;br /&gt;
|-&lt;br /&gt;
| v2.0&lt;br /&gt;
| {{date|2018|11|30}}&lt;br /&gt;
|&lt;br /&gt;
* Initial Cydia Substrate support&lt;br /&gt;
* OTA upgrades for the jailbreak patches from Cydia without rebooting&lt;br /&gt;
* A new button to restart SpringBoard from the jailed state&lt;br /&gt;
* A switch to (re)install OpenSSH&lt;br /&gt;
* A switch to reinstall Cydia&lt;br /&gt;
* A switch to restart backboardd only so that you can jailbreak with broken tweaks&lt;br /&gt;
* Fix and update bootstrap&lt;br /&gt;
* Fix for the jailbreakd error&lt;br /&gt;
* Battery life fixes&lt;br /&gt;
* ELOD (Electra Loop Of Death) mitigations&lt;br /&gt;
* Improve the speed of system reload&lt;br /&gt;
* Fixes for countless bugs&lt;br /&gt;
* Enable Restart and Restart SpringBoard buttons on iOS 11.4 - 11.4.1 (Jailbreak itself doesn't work on iOS 11.4 - 11.4.1)&lt;br /&gt;
* Improve the reliability of the Restart button&lt;br /&gt;
* Fix the broken multi_path entitlement check&lt;br /&gt;
* Add the compatibility layer for the other jailbreaks back to fix the apps like iCleaner&lt;br /&gt;
* Fix the famous snapshot creation bug&lt;br /&gt;
* Add a button to manually reset the logs instead of automatically resetting them when the diagnostics button is tapped&lt;br /&gt;
* Fix the trust cache injection bug&lt;br /&gt;
|-&lt;br /&gt;
| v2.0.1&lt;br /&gt;
| {{date|2018|12|02}}&lt;br /&gt;
|&lt;br /&gt;
* The official release of v2.0 with a version number bump to make tracking versions easier&lt;br /&gt;
|-&lt;br /&gt;
| v2.0.2&lt;br /&gt;
| {{date|2018|12|06}}&lt;br /&gt;
|&lt;br /&gt;
* Fix bugs in the app&lt;br /&gt;
* Improve the the speed of the jailbreak&lt;br /&gt;
* Update bundled resources&lt;br /&gt;
* Switch to a new technique for blocking revokes&lt;br /&gt;
|-&lt;br /&gt;
| v2.1&lt;br /&gt;
| {{date|2018|12|14}}&lt;br /&gt;
|&lt;br /&gt;
* Make internal changes to make fixing issues easier&lt;br /&gt;
* Add T-Mobile support for the revoke disabler&lt;br /&gt;
* Make re-jailbreaking without restarting possible &lt;br /&gt;
* Make switching from Electra possible without restoring RootFS &lt;br /&gt;
* Update bundled resources&lt;br /&gt;
* Fix a bug in extracting bootstrap&lt;br /&gt;
* Only quit the app if the error is fatal&lt;br /&gt;
* Fix a bug in loading daemons&lt;br /&gt;
* Make the jailbreaking process faster and more stable&lt;br /&gt;
* Add more feedback to the user interface&lt;br /&gt;
* Other fixes and improvements&lt;br /&gt;
* Fix a bug in extracting bootstrap that was introduced with the previous build&lt;br /&gt;
* Fix a bug in installing Cydia that was introduced with the previous build&lt;br /&gt;
* Fix a bug in switching from Electra without restoring RootFS&lt;br /&gt;
* Update &amp;quot;No Tweaks&amp;quot; mode to support new &amp;quot;Disable Loader&amp;quot; option in Cydia Substrate&lt;br /&gt;
* Added the ability to completely disable jailbreakd when Substrate is installed via a future Cydia update.&lt;br /&gt;
* Add internal support for completely disabling jailbreakd with a Resources update&lt;br /&gt;
* Make a special alert for the exploit error to make it more clear&lt;br /&gt;
* Automatically reboot when the user taps &amp;quot;OK&amp;quot; on the exploit error&lt;br /&gt;
* Improve the version checker&lt;br /&gt;
* Fix a really weird bug in the system that would stop Cydia Substrate from loading tweaks although this bug isn't caused by the tool&lt;br /&gt;
* Make the UI support different font sizes or styles (E.g. Bold Text)&lt;br /&gt;
* Add the initial localization support (No localizations included yet)&lt;br /&gt;
* Reduce the number of stages&lt;br /&gt;
* Fix a bug in installing OpenSSH&lt;br /&gt;
* Switch to Sam Bingner's new superb trust cache injector thereby enable support for dual-hash signatures&lt;br /&gt;
* Don't update the hosts file unless it is needed&lt;br /&gt;
* Unblock Saurik's repo if it is blocked&lt;br /&gt;
* Reduce the number of stages&lt;br /&gt;
* Remove unnecessary checks&lt;br /&gt;
* Avoid applying unnecessary kernel patches unless they are needed&lt;br /&gt;
* Make sure that the system snapshot was correctly mounted before using it&lt;br /&gt;
* Unmount the system snapshot after root filesystem snapshot bypass or restore&lt;br /&gt;
* Simplify the credits view&lt;br /&gt;
* Don't do unnecessary logging&lt;br /&gt;
* Improve empty_list (vfs) exploit's success rate&lt;br /&gt;
* Fix runCommand to correctly log&lt;br /&gt;
* Don't run jailbreakd if Cydia Substrate is installed&lt;br /&gt;
* Don't set the boot nonce if it already is&lt;br /&gt;
* Make obvious internal changes&lt;br /&gt;
* Make jailbreaking obviously faster&lt;br /&gt;
* Fix a brutal kernel memory leak&lt;br /&gt;
* Fix shutdown or halt leading to a reboot&lt;br /&gt;
* Fix a logic error that would disable jailbreak patches when Substrate was installed but Load Daemons was disabled that was introduced with the previous build&lt;br /&gt;
* Fix a bug in RootFS Restore for iOS 11.0 - 11.2.6 that was introduced with the previous build&lt;br /&gt;
* Fix a bug in trust cache injection&lt;br /&gt;
* Improve update checker&lt;br /&gt;
* Make jailbreaking obviously faster&lt;br /&gt;
* Fix a bug in RootFS Restore for iOS 11.0 - 11.2.6 that would cause it to not work on some devices&lt;br /&gt;
* Fix a bug in update checker&lt;br /&gt;
* Fix a bug in the posix_spawn wrapper that would cause weird issues on some devices (Known for causing the &amp;quot;(24/40)&amp;quot; issue)&lt;br /&gt;
|-&lt;br /&gt;
| v2.1.1&lt;br /&gt;
| {{date|2019|01|05}}&lt;br /&gt;
|&lt;br /&gt;
* Make jailbreaking faster&lt;br /&gt;
* Don't error out if the hosts file doesn't exist&lt;br /&gt;
* Ignore dependencies in Cydia reinstallation&lt;br /&gt;
* Fix false positives&lt;br /&gt;
* Clean Cydia's user data in RootFS Restore&lt;br /&gt;
* Fix a snapshot name confusion bug in RootFS Restore&lt;br /&gt;
* Fix another bug in RootFS Restore&lt;br /&gt;
* Improve memory management&lt;br /&gt;
* Use less external binaries&lt;br /&gt;
* Completely clean Cydia's user data in RootFS Restore&lt;br /&gt;
|-&lt;br /&gt;
| v2.1.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|01|26}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in patch finder that affected the shenanigans finder on specific iOS versions&lt;br /&gt;
* Switch to a better versioning system&lt;br /&gt;
* Make downgrading from v2.2.0 possible (Unreleased as of now)&lt;br /&gt;
|-&lt;br /&gt;
| v2.1.4&lt;br /&gt;
|&lt;br /&gt;
*Decrease the app's size from 63MBs to 22MBs by optimizing assets&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | {{date|2019|01|30}}&lt;br /&gt;
|&lt;br /&gt;
* Install Cydia Substrate if it's not already installed&lt;br /&gt;
* Validate Cydia Substrate files and reinstall it if the validation fails&lt;br /&gt;
* Fix a bug in switching from Electra without RootFS Restore&lt;br /&gt;
* Clean up the kernel data structure patches to improve the performance and the security&lt;br /&gt;
* Remove Substitute support files in the filesystem&lt;br /&gt;
* Remove Substitute support links in the filesystem&lt;br /&gt;
* Uninstall Electra's Cydia Upgrade Helper if it is present&lt;br /&gt;
* Improve preference management&lt;br /&gt;
* Switch to a more efficient versioning system&lt;br /&gt;
* Use a new implementation of the system's libarchive to extract the bootstrap to increase the perfomance&lt;br /&gt;
* Update rsync to increase the performance and the stability of RootFS Restore&lt;br /&gt;
* Improve memory management&lt;br /&gt;
* Re-Extract bootstrap if it was extracted on a different iOS version&lt;br /&gt;
* Credit Saurik in the credits view for Cydia and Substrate&lt;br /&gt;
* Avoid writing to the disk when not necessary&lt;br /&gt;
* Add a verbose log window for the jailbreak&lt;br /&gt;
* Make the exploits slightly faster&lt;br /&gt;
* Make the jailbreak significantly faster and more performant&lt;br /&gt;
* Jailbreak itself now takes almost less than a second run (Exploit not included)&lt;br /&gt;
* Fix a bug in patch finder that would cause the sandbox escape to fail on certain devices&lt;br /&gt;
* Fix theoretical bugs&lt;br /&gt;
* Improve assertion&lt;br /&gt;
* Performance improvements&lt;br /&gt;
* Fix a bug in logging&lt;br /&gt;
* Update bootstrap&lt;br /&gt;
* Enable overwriting files in the bootstrap extractor&lt;br /&gt;
* Fix switching from Electra without restoring root filesystem&lt;br /&gt;
* Fix certain error descriptions&lt;br /&gt;
* Fix RootFS Restore on certain devices&lt;br /&gt;
* Add a switch to hide the log window&lt;br /&gt;
* Decrease the app's size from 81MBs to 25MBs by optimizing assets&lt;br /&gt;
* Add a switch to reset Cydia cache on request&lt;br /&gt;
* Rewrite Cydia installation&lt;br /&gt;
* Install a local repo&lt;br /&gt;
* Remove bootstrap&lt;br /&gt;
* Hide the local APT repo from Cydia&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.1&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in installing Cydia / extracting bootstrap&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.2&lt;br /&gt;
|&lt;br /&gt;
* Fully fix a bug in installing Cydia / extracting bootstrap&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.3&lt;br /&gt;
| {{date|2019|01|31}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug with extracting rsync&lt;br /&gt;
|-&lt;br /&gt;
| v3.0.0&lt;br /&gt;
| {{date|2019|04|19}}&lt;br /&gt;
| &lt;br /&gt;
* Add support for iOS 12.0-12.1.2.&lt;br /&gt;
|-&lt;br /&gt;
| v3.0.1&lt;br /&gt;
| {{date|2019|04|23}}&lt;br /&gt;
| &lt;br /&gt;
* Iterate the proc list with proper data locks in Unrestrict to fix a possible race condition in the kernel (Important stability fix)&lt;br /&gt;
* Fix a typo in the app&lt;br /&gt;
* Fix a bug in logging&lt;br /&gt;
* Add iOS 12.1.3 - 12.2 support for the restart button&lt;br /&gt;
|-&lt;br /&gt;
| v3.1&lt;br /&gt;
| {{date|2019|05|23}}&lt;br /&gt;
| &lt;br /&gt;
* Rewrite the kernel patches from scratch to improve the stability and the reliability of the jailbreak&lt;br /&gt;
* Rewrite the preference management system from scratch to optimize the jailbreak&lt;br /&gt;
* Rewrite the diagnostics system from scratch to provide more useful information&lt;br /&gt;
* Rewrite unrestrict libary from scratch to improve the stability of the system after jailbreak&lt;br /&gt;
* Add support for switching from the other iOS 12 jailbreaks without restoring the root filesystem and losing data&lt;br /&gt;
* Make Unrestrict add sandbox exceptions for mach_lookup and mach_register&lt;br /&gt;
* Fix issues with processes looking up Substrate port on iOS 12 to fix stability and performance issues&lt;br /&gt;
* Fix support for the broken versions of RocketBootstrap and hid-support tweaks&lt;br /&gt;
* Fix the iMessage audio crash&lt;br /&gt;
* Fix FaceTime calls disappearing on some devices&lt;br /&gt;
* Fix Camera crash on some devices&lt;br /&gt;
* Update the local APT repo to include the latest updates from the Elucubratus repository, including the updated uikittools with rewritten uicache and sbreload commands to make refreshing the icon cache and reloading the SpringBoard significantly faster when installing packages from Cydia&lt;br /&gt;
* Refresh the icon cache during the root filesystem restore to fix jailbreak apps staying on the home screen after restoring the root filesystem&lt;br /&gt;
* Update mobilesubstrate to version 0.9.7033 to disable loader in the securityd daemon to fix a freeze issue on iOS 12&lt;br /&gt;
* Significantly improve the reliability of the jailbreak when using the machswap or the machswap2 exploit&lt;br /&gt;
* Wait for the user to tap OK on the jailbreak completed alert before respringing the device&lt;br /&gt;
* Improve the jailbreak's self-repairability feature&lt;br /&gt;
* Add a progress HUD to display the status of the jailbreak process&lt;br /&gt;
* Optimize the code&lt;br /&gt;
* Improve assertion&lt;br /&gt;
* Add error-specific error messages&lt;br /&gt;
* Display info about the device on launch&lt;br /&gt;
* Clean up logging&lt;br /&gt;
* Reconfigure the &amp;quot;Reload System Daemons&amp;quot; and &amp;quot;Enable get-task-allow&amp;quot; preferences&lt;br /&gt;
* Make &amp;quot;Enable get-task-allow&amp;quot; a default option&lt;br /&gt;
|-&lt;br /&gt;
| v3.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|05|24}}&lt;br /&gt;
| &lt;br /&gt;
* Fix running root filesystem restore when not in the jailbroken state on iOS 11&lt;br /&gt;
* Add an option to automatically restart the SpringBoard once the jailbreak is done instead of waiting for the user to tap the OK button (Requested by a Redditor)&lt;br /&gt;
|-&lt;br /&gt;
| v3.1.2&lt;br /&gt;
| &lt;br /&gt;
* Fix a bug in the settings user interface on smaller devices&lt;br /&gt;
* Add an option to hide the progress HUD (Requested by a Redditor)&lt;br /&gt;
|-&lt;br /&gt;
| v3.1.3&lt;br /&gt;
| {{date|2019|05|28}}&lt;br /&gt;
| &lt;br /&gt;
* Fix a bug in updating the status&lt;br /&gt;
* Fix a logic bug in remounting the root filesystem (Addresses https://www.reddit.com/r/jailbreak/comments/btxqng/help_still_cant_jb_on_ios_1211_using_the_newest/)&lt;br /&gt;
* Make machswap and machswap2 not depend on stealing kernel's credentials to fix a possible reliability issue&lt;br /&gt;
* Update kernel patches to use a safer allocation method&lt;br /&gt;
* Fix missing information in the jailbreak completed notice&lt;br /&gt;
* Fix false information in the jailbreak completed notice&lt;br /&gt;
|-&lt;br /&gt;
| v3.2&lt;br /&gt;
| {{date|2019|06|01}}&lt;br /&gt;
| &lt;br /&gt;
* Redesign the user interface (https://twitter.com/HiMyNameIsUbik/status/1134938278489182208)&lt;br /&gt;
* Add dark mode for the user interface&lt;br /&gt;
* Add info buttons for the options&lt;br /&gt;
* Increase the reliability of the jailbreak with the machswap and machswap2 exploits&lt;br /&gt;
* Update jailbreak-resources to fix an issue with the CS_DEBUGGED option&lt;br /&gt;
|-&lt;br /&gt;
| v3.2.1&lt;br /&gt;
| {{date|2019|06|02}}&lt;br /&gt;
| &lt;br /&gt;
* Fix several typos in the app&lt;br /&gt;
* Update the bundled uikittools&lt;br /&gt;
* Ignore refresh icon cache failures unless they are actually fatal&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.0&lt;br /&gt;
| {{date|2019|07|14}}&lt;br /&gt;
| &lt;br /&gt;
* Add the Sock Puppet exploit for iOS 12.0-12.2 support on A8X-A11 devices&lt;br /&gt;
* Remove the empty_list and multi_path exploits&lt;br /&gt;
* Replace the kernel exploit segmented switch with picker view&lt;br /&gt;
* Add code substitution platform picker view&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|07|16}}&lt;br /&gt;
| &lt;br /&gt;
* Improve the speed of the jailbreak process by a few seconds&lt;br /&gt;
* Fix a bug in dark mode on the iPads&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.2&lt;br /&gt;
| &lt;br /&gt;
* Fix a bug in finding kernel offsets on iOS 11&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.3&lt;br /&gt;
| {{date|2019|07|18}}&lt;br /&gt;
| &lt;br /&gt;
* Fix the Sock Puppet kernel exploit on iOS 11&lt;br /&gt;
* Fix the Voucher Swap exploit's compatibility status with iPad Air 2 and iPad Mini 4 on iOS 11&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.4&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | {{date|2019|07|19}}&lt;br /&gt;
| &lt;br /&gt;
* Add the Sock Port exploit by [https://twitter.com/jakeashacks @jakeashacks] for iOS 11.0-12.1.4 on A7-A9X devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.5&lt;br /&gt;
| &lt;br /&gt;
* Fix a reliability bug in Sock Port&lt;br /&gt;
* Fix Sock Puppet on A8X&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.6&lt;br /&gt;
| &lt;br /&gt;
* Fix Sock Port failing on 4K devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.7&lt;br /&gt;
| &lt;br /&gt;
* Improve the reliability of the Sock Port kernel exploit on 4K devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.8&lt;br /&gt;
| {{date|2019|07|22}}&lt;br /&gt;
| &lt;br /&gt;
* Use the rewritten SockPort 2.0 exploit with ~100% reliability, ~100 milliseconds run time and support for all devices on iOS 11.0-12.2 (12.1.3-12.2 on A12-A12X excluded)&lt;br /&gt;
* Fix the jailbreak on iOS 12.2 iPhones and iPods&lt;br /&gt;
|-&lt;br /&gt;
| v3.4.0&lt;br /&gt;
| {{date|2019|07|23}}&lt;br /&gt;
| &lt;br /&gt;
* Replace the SockPort 2.0 exploit with the SockPuppet 2.0 exploit with better reliability and stability on older devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.4.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|07|25}}&lt;br /&gt;
| &lt;br /&gt;
* Fix the sandbox swap error when using the exploits that are not SockPuppet&lt;br /&gt;
* Add the SockPort 1.5 exploit by [https://github.com/jakeajames @jakeajames] for A7-A9X devices (Reliability: ~95% from extensive testing)&lt;br /&gt;
* Disable the SockPuppet exploit on A7-A7X due to reliability issues&lt;br /&gt;
* Add iOS 12.3~b1 support to the jailbreak (Verified working on iPhone 5s)&lt;br /&gt;
* Fix a theoretical reliability bug with SockPuppet&lt;br /&gt;
|-&lt;br /&gt;
| v3.4.2&lt;br /&gt;
| &lt;br /&gt;
* Fix the SockPuppet kernel exploit not displaying on A8-A8X devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.0&lt;br /&gt;
| {{date|2019|08|18}}&lt;br /&gt;
|&lt;br /&gt;
* Add iOS 12.4 support to the Sock Puppet (A8-A11) and Sock Port (A7-A7X) exploits&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | {{date|2019|08|19}}&lt;br /&gt;
|&lt;br /&gt;
* Add the updated SockPuppet 3.0 exploit by @umanghere&lt;br /&gt;
* Remove the SockPort and SockPort2 exploits&lt;br /&gt;
* Update system-memory-reset fix to fix random reboots&lt;br /&gt;
* Add Apple to the credits section for development&lt;br /&gt;
* Fix error at stage 2 when jailbreaking after updating from a lower firmware while preserving the app data&lt;br /&gt;
* Fix the app crashing up on stared up on iOS 11&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.2&lt;br /&gt;
|&lt;br /&gt;
* Fix the SockPuppet 3.0 exploit on iPad Mini 4 and iPad Air 2&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.3&lt;br /&gt;
|&lt;br /&gt;
* Add WIP partial support for A12-A12X devices on iOS 12.1.3, 12.1.4, 12.2 and 12.4 with support for setting HSP#4 as TFP0, setting kernel_task info, exporting kernel_task port, dumping APTicket, logging KASLR shift and ECID and disabling auto updates&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|08|22}}&lt;br /&gt;
|&lt;br /&gt;
* Add full-fledged SSH support with root-shell for A12-A12X devices on iOS 12.1.3-12.4&lt;br /&gt;
* Add support for arbitrary unsigned code execution on A12-A12 devices on iOS 12.1.3-12.4&lt;br /&gt;
(Note: Object files will have to be signed with a CMS blob using the codesign utility)&lt;br /&gt;
* Add support for running expired or revoked apps on A12-A12X devices on iOS 12.1.3-12.4&lt;br /&gt;
* Fix instant or random reboots after jailbreaking with the SockPuppet3.0 exploit on A7-A12X devices on iOS 11.0-12.4&lt;br /&gt;
Note: Code injection is not supported on A12-A12X devices as of yet&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.5&lt;br /&gt;
|&lt;br /&gt;
* Fixes issues with the jailbreak introduced with the last update&lt;br /&gt;
* Fixes iOS 11 support&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.6&lt;br /&gt;
| {{date|2019|08|24}}&lt;br /&gt;
|&lt;br /&gt;
* Add support for remounting the RootFS as read-write on A12-A12X devices running iOS 12.1.3-12.4&lt;br /&gt;
* Adds support for restoring the RootFS on A12-A12X devices running iOS 12.1.3-12.4&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|09|08}}&lt;br /&gt;
|&lt;br /&gt;
* Completely redesign and rewrite all jailbreak patches from scratch.&lt;br /&gt;
* Make the jailbreak patches static and not dynamic, Meaning that the system stability will be completely stock after the jailbreak.&lt;br /&gt;
* Fix the app crashing on launch when signed with provisioning profiles with non-ASCII characters.&lt;br /&gt;
* Internally prepare jailbreak patches for full-fledged A12-A12X support.&lt;br /&gt;
* Make the jailbreak significantly and noticeably more reliable and faster to run.&lt;br /&gt;
* Add the SockPort 3.0 exploit for improved reliability on iOS 12.4 and devices with low RAM.&lt;br /&gt;
* Fix SSH support for arm64e devices running iOS 12.0-12.1.2.&lt;br /&gt;
* Make it possible to jailbreak with corrupted SystemVersion.plist on iOS 12.4.&lt;br /&gt;
* Make the jailbreak perform proper clean up to preserve system stability in case of a failure.&lt;br /&gt;
* Fix the jbctl command-line utility.&lt;br /&gt;
* Switch to a new technique for setting the system boot nonce generator that works on all arm64e devices running iOS12.0-12.4, (Thanks to [https://github.com/0x7ff @0x7ff] for the idea).&lt;br /&gt;
* Fix a bug with the initial Cydia installation getting stuck sometimes.&lt;br /&gt;
* Significantly speed up the initial Cydia installation process.&lt;br /&gt;
* Internally prepare upcoming stable substitute support.&lt;br /&gt;
* Internally prepare Cydia and its resources for full-fledged arm64e support.&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.1&lt;br /&gt;
|&lt;br /&gt;
* Improves auto-exploit selection.&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|09|09}}&lt;br /&gt;
|&lt;br /&gt;
* Fix an issue with the kernel virtual memory access APIs on A7-A8 devices that rendered the jailbreak useless by causing it to fail to copy big kernel data (Error known as: &amp;quot;Unable to copy container profile in kernel memory.&amp;quot;)&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.3&lt;br /&gt;
|&lt;br /&gt;
* Fix an issue with finding kernel offsets on A8&lt;br /&gt;
|-&lt;br /&gt;
| v3.7.0~b2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|10|14}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged A12-A12X support with Cydia and system-wide tweak injection&lt;br /&gt;
* Fix Camera on A12-A12X devices&lt;br /&gt;
* Fix GPS on A12-A12X devices&lt;br /&gt;
* Fix App Store purchases on A12-A12X devices&lt;br /&gt;
* Fix Face ID on A12-A12X devices&lt;br /&gt;
* Fix performance issues on A12-A12X devices&lt;br /&gt;
* Fix stability issues on A12-A12X devices&lt;br /&gt;
* Fix reload system daemons issues on A12-A12X devices&lt;br /&gt;
* Fix general stability issues with system services on A12-A12X devices&lt;br /&gt;
* Fix system shutdown on A12-A12X devices&lt;br /&gt;
* Fix system restart on A12-A12X devices&lt;br /&gt;
* Fix USB on A12-A12X devices&lt;br /&gt;
* Fix Xcode debugging on A12-A12X devices&lt;br /&gt;
* Fix a bug in libsubstitute that broke the TetherMe tweak A12-A12X devices&lt;br /&gt;
* Enable full-fledged AMFI/CoreTrust bypass on A12-A12X devices&lt;br /&gt;
* Fix memory management issues on A12-A12X devices&lt;br /&gt;
* Fix tweak injection to MobileSafari on A12-A12X devices&lt;br /&gt;
* Make reload system daemons reload services with launchctl instead of ldrestart&lt;br /&gt;
* Reload system daemons before restarting SpringBoard&lt;br /&gt;
|-&lt;br /&gt;
| v3.7.0~b3&lt;br /&gt;
|&lt;br /&gt;
* Correct a problem with reload system daemons when using Substrate (non-A12 devices)&lt;br /&gt;
|-&lt;br /&gt;
| v3.7.0~b4&lt;br /&gt;
| {{date|2019|12|02}}&lt;br /&gt;
|&lt;br /&gt;
* Update bundled Cydia to prompt for network access on China devices&lt;br /&gt;
* Rename the bundled mobilesubstrate to match other jailbreaks&lt;br /&gt;
* Update the bundled substitute to 0.1.0&lt;br /&gt;
|-&lt;br /&gt;
| v3.8.0~b1&lt;br /&gt;
| {{date|2019|12|09}}&lt;br /&gt;
|&lt;br /&gt;
* Add iOS 12.4.1 support for A12 iPhones (iPads not supported at this time)&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.0&lt;br /&gt;
| {{date|2020|02|15}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged support for A12-A13 devices on iOS 13.0-13.3 with Cydia and system-wide tweak injection&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.1&lt;br /&gt;
| {{date|2020|02|16}}&lt;br /&gt;
|&lt;br /&gt;
* Fix App Store for A12-A13&lt;br /&gt;
* Fix push notifications for A12-A13&lt;br /&gt;
* Improve reliability for A12-A13 devices on iOS 13.0-13.3&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.2&lt;br /&gt;
| {{date|2020|02|17}}&lt;br /&gt;
|&lt;br /&gt;
* Fix iOS 13.0-13.2.3 support&lt;br /&gt;
* Fix injection into WebContent&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.3&lt;br /&gt;
| {{date|2020|02|19}}&lt;br /&gt;
|&lt;br /&gt;
* Fully fix App Store on A12-A13&lt;br /&gt;
* Fix a newly introduced bug that affected system services on A12-A13&lt;br /&gt;
* Improve the exploit reliability by guiding the user on proper use on A12-A13&lt;br /&gt;
|-&lt;br /&gt;
| v4.1.0&lt;br /&gt;
| {{date|2020|02|23}}&lt;br /&gt;
|&lt;br /&gt;
* Replace the oob_timestamp exploit by [https://twitter.com/bazad @bazad] with the time_waste exploit by [https://twitter.com/jakeashacks @jakeashacks] for 99% stage 1 (exploit) reliability on iOS 13.0-13.3&lt;br /&gt;
* Fix compatibility issues with iOS 11.0-12.4 and 13.0-13.2.3&lt;br /&gt;
|-&lt;br /&gt;
| v4.2.0&lt;br /&gt;
| {{date|2020|02|25}}&lt;br /&gt;
|&lt;br /&gt;
* Fix issues with system services on A12-A13 (i.e. iMessage notifications)&lt;br /&gt;
* Add iOS 13.0-13.3 support for A8-A11 devices&lt;br /&gt;
* Fix temporary freeze after the jailbreak completed alert&lt;br /&gt;
|-&lt;br /&gt;
| v4.2.1&lt;br /&gt;
| {{date|2020|02|26}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug that caused unreliability in starting up substitute&lt;br /&gt;
* Fix an issue that broke battery settings and caused extra battery drain&lt;br /&gt;
|-&lt;br /&gt;
| v4.3.1&lt;br /&gt;
| {{date|2020|03|08}}&lt;br /&gt;
|&lt;br /&gt;
* Bumped version to 4.3.1 due to a github bug causing an older file to be temporarily available&lt;br /&gt;
* Add support for rebooting the userspace for the first time in a jailbreak&lt;br /&gt;
* Add support for injecting to the entire userspace&lt;br /&gt;
* Add support for looking up or registering services from the sandbox with the cy: prefix for developers&lt;br /&gt;
* Reboot the userspace after jailbreaking&lt;br /&gt;
* Make major design changes to preserve stock system performance&lt;br /&gt;
* Fix random reboots, freezes, memory issues and any known problem that affected system services or apps&lt;br /&gt;
* Fix persistent software update blocker on iOS 13 (Works in the jailed state too)&lt;br /&gt;
* Fix a design problem that affected the Succession restore tool&lt;br /&gt;
* Automatically re-enable software updates when restoring RootFS&lt;br /&gt;
|-&lt;br /&gt;
| v5.0.0&lt;br /&gt;
| {{date|2020|05|23}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged support for all devices on iOS 11.0-13.5 with Cydia and tweak injection&lt;br /&gt;
|-&lt;br /&gt;
| v5.0.1&lt;br /&gt;
| {{date|2020|05|24}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged support for all devices on iOS 11.0-13.5 with Cydia and tweak injection&lt;br /&gt;
* Enable unrestricted storage access to jailbreak applications for sandbox backwards compatibility&amp;lt;br&amp;gt;while keeping security intact by leaving the security restrictions enabled for system and user applications&lt;br /&gt;
* Update Phone Rebel case models and bundled packages&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102930</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102930"/>
		<updated>2020-05-26T17:04:29Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Asked Pwn about this, he said to remove.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102789</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102789"/>
		<updated>2020-05-26T03:30:16Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: oops my bad lol&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* ZecOps Kernel Exploit ({{cve|2019-8794}}) &lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102776</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102776"/>
		<updated>2020-05-25T05:45:00Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Update with currently signed 13.5 and unc0ver release :D&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* ZecOps Kernel Exploit ({{cve|2019-8794}}) &lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102775</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=102775"/>
		<updated>2020-05-25T05:39:37Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Please use only the original exploit name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* ZecOps Kernel Exploit ({{cve|2019-8794}}) &lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.3)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 13.3.1)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IBoot32Patcher&amp;diff=102723</id>
		<title>IBoot32Patcher</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IBoot32Patcher&amp;diff=102723"/>
		<updated>2020-05-23T06:05:08Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Add note about necessary boot arg patch for some iOS versions.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''iBoot32Patcher''' is a 32-bit [[iBoot]] patching program made by [[User:Ih8sn0w|iH8sn0w]]. This program patches things such as signature checking, allows custom boot-args to be set, changing a command handler's pointer, and more.&lt;br /&gt;
&lt;br /&gt;
== Uses ==&lt;br /&gt;
* Creating Odysseus and PwnageTool bundles &lt;br /&gt;
* Dual-Booting&lt;br /&gt;
* Downgrades&lt;br /&gt;
* Jailbreaking&lt;br /&gt;
&lt;br /&gt;
== Source Code ==&lt;br /&gt;
* [https://github.com/iH8sn0w/iBoot32Patcher iBoot32Patcher] (Some iOS versions are unable to patch correctly when trying to add boot-args to iBEC, for example, 3GS iBEC on 6.x. Also, setting boot-args for &amp;lt;=4.2.1. This requires a simple one byte patch. The patch will fix both of these errors.)&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Kiddepants&amp;diff=102618</id>
		<title>User:Kiddepants</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Kiddepants&amp;diff=102618"/>
		<updated>2020-05-18T03:53:12Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Update my iOS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm just a young guy who's interested in jailbreaks and dual-booting. I'm not the type of guy to tell you everything about me, just the important stuff you wanna hear. I'm also a friendly guy and I love to laugh. &lt;br /&gt;
&lt;br /&gt;
Twitter:  [https://twitter.com/Vyce_Merculous @Vyce_Merculous] &lt;br /&gt;
&lt;br /&gt;
GitHub: [https://github.com/Merculous @Merculous]&lt;br /&gt;
&lt;br /&gt;
My Discord Server (Dualbooting, iOS, etc.) https://discord.gg/7U565V5&lt;br /&gt;
&lt;br /&gt;
=== iDevices ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Device&lt;br /&gt;
! Variant&lt;br /&gt;
! Storage&lt;br /&gt;
! iOS&lt;br /&gt;
! Currently Jailbroken?&lt;br /&gt;
! Status&lt;br /&gt;
! Extras&lt;br /&gt;
|-&lt;br /&gt;
| [[iPhone 3G]]&lt;br /&gt;
| [[N82AP]]&lt;br /&gt;
| 8GB&lt;br /&gt;
| 4.2.1&lt;br /&gt;
| {{Yes}}&lt;br /&gt;
| Shattered Screen&lt;br /&gt;
| I got pissed at a game lol&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[iPhone 3GS]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[N88AP]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 16GB&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 6.1.6&lt;br /&gt;
| {{No}}&lt;br /&gt;
| Replaced Battery and broken charging port&lt;br /&gt;
| [[Bootrom 359.3|Old Bootrom]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{Yes}}&lt;br /&gt;
| Replaced Screen (from the old bootrom one :P)&lt;br /&gt;
| [[Bootrom 359.3.2|New Bootrom]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[iPhone 4]]&lt;br /&gt;
| [[N90AP]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 32GB&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 7.1.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Main Dual-Booting Device&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Testing Device&lt;br /&gt;
|-&lt;br /&gt;
| [[N92AP]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[iPhone 4S]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[N94AP]]&lt;br /&gt;
| 16GB&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 8.4.1&lt;br /&gt;
| Came on iOS 7.1.2 :P I saved the blob for it too ( I lost the blob :/ )&lt;br /&gt;
|-&lt;br /&gt;
| 32GB&lt;br /&gt;
| Activated thanks to [https://twitter.com/SoNick_14 SoNick_14]&lt;br /&gt;
| Turns out I saved the blobs with the DieID and not the UniqueChipID (ECID) :/&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[iPhone 5]]&lt;br /&gt;
| [[N41AP]]&lt;br /&gt;
| 64GB&lt;br /&gt;
| 10.3.3&lt;br /&gt;
| {{No}}&lt;br /&gt;
| iCloud Locked :/&lt;br /&gt;
| Only device I still have that I grabbed blobs from the signing window mishap on Apple's end :P&lt;br /&gt;
|- &lt;br /&gt;
| [[N42AP]]&lt;br /&gt;
| 32GB&lt;br /&gt;
| 8.1.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{Yes}}&lt;br /&gt;
| Has multiple broken parts (which I'll fix :P)&lt;br /&gt;
| Came with iOS 8.1.2 (let's not lose another blob)&lt;br /&gt;
|-&lt;br /&gt;
| [[N48AP]]&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 16GB&lt;br /&gt;
| 8.1&lt;br /&gt;
| Was still on iOS 8.1 FTW!&lt;br /&gt;
| Is my sisters old iPhone too lol&lt;br /&gt;
|-&lt;br /&gt;
| [[iPhone 5s]]&lt;br /&gt;
| [[N51AP]]&lt;br /&gt;
| 10.3.3&lt;br /&gt;
| Downgraded to iOS 10.3.3 with OTA blobs, checkm8, and iBoot64Patcher :D&lt;br /&gt;
| Jailbroken with [[TotallyNotSpyware]] &lt;br /&gt;
|-&lt;br /&gt;
| [[iPhone 6]]&lt;br /&gt;
| [[N61AP]]&lt;br /&gt;
| 12.1.2&lt;br /&gt;
| {{No}}&lt;br /&gt;
| iCloud locked&lt;br /&gt;
| Just a spare device to upload A8 AES keys using checkm8 (for now)&lt;br /&gt;
|-&lt;br /&gt;
| [[iPhone XS Max]]&lt;br /&gt;
| [[D331pAP]]&lt;br /&gt;
| 64GB&lt;br /&gt;
| 13.3&lt;br /&gt;
| {{Yes}}&lt;br /&gt;
| Daily Driver&lt;br /&gt;
| Jailbroken with [[Unc0ver]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D100_(iPod7,1)&amp;diff=102535</id>
		<title>Dalaman 15D100 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D100_(iPod7,1)&amp;diff=102535"/>
		<updated>2020-05-10T23:22:30Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.6  | Build                 = 15D100  | Device                = iPod7,1  | Codename              = Dalaman  | DownloadURL           = htt...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.6&lt;br /&gt;
 | Build                 = 15D100&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Dalaman&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.6/091-69581-20180220-0638A8F4-1331-11E8-A0C5-18A2E0A71A1F/iPodtouch_11.2.6_15D100_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-95101-065&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-95281-066&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-94922-067&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 3cc6412a0acf0b59a6e9bca007c2666d&lt;br /&gt;
 | iBECKey               = 0c736933df7abfe8513b59090fc0eb6dcf5e7d325b4a2560d7162742f1b4d8f7&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = bf61517e6bd882b73ab6f4f57bc6b7a6&lt;br /&gt;
 | iBootKey              = a2f0f4957a111896a7d1e597c72ea6e3bff3c1303574a6254379be7973e9551a&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 7b126ff57cb0fc7d6083e704b22568b4&lt;br /&gt;
 | iBSSKey               = 0f747e91209cb0fb35a07bdde950bb616b8f24c3909668ac1e06968150b4313e&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 392546f6762655ed815a4e09474683b2&lt;br /&gt;
 | LLBKey                = e1f81be59f51de28de9ade05c56171c727d2260ccea5fca5f4df685da55dfd04&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = d8734623b214b36b9a1f535596812cd4d98fa77ad82fab03b39ce9dea073040a7b14aa7fe8e979b438845f7162d75272&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D60_(iPod7,1)&amp;diff=102534</id>
		<title>Dalaman 15D60 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D60_(iPod7,1)&amp;diff=102534"/>
		<updated>2020-05-10T23:19:52Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.5  | Build                 = 15D60  | Device                = iPod7,1  | Codename              = Dalaman  | DownloadURL           = http...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.5&lt;br /&gt;
 | Build                 = 15D60&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Dalaman&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.5/091-61946-20180122-2A119562-FC96-11E7-9CB7-EC82E70393C2/iPodtouch_11.2.5_15D60_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-95101-064&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-95281-064&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-94922-065&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 3cc6412a0acf0b59a6e9bca007c2666d&lt;br /&gt;
 | iBECKey               = 0c736933df7abfe8513b59090fc0eb6dcf5e7d325b4a2560d7162742f1b4d8f7&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = bf61517e6bd882b73ab6f4f57bc6b7a6&lt;br /&gt;
 | iBootKey              = a2f0f4957a111896a7d1e597c72ea6e3bff3c1303574a6254379be7973e9551a&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 7b126ff57cb0fc7d6083e704b22568b4&lt;br /&gt;
 | iBSSKey               = 0f747e91209cb0fb35a07bdde950bb616b8f24c3909668ac1e06968150b4313e&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 392546f6762655ed815a4e09474683b2&lt;br /&gt;
 | LLBKey                = e1f81be59f51de28de9ade05c56171c727d2260ccea5fca5f4df685da55dfd04&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = d8734623b214b36b9a1f535596812cd4d98fa77ad82fab03b39ce9dea073040a7b14aa7fe8e979b438845f7162d75272&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cinar_15C202_(iPod7,1)&amp;diff=102533</id>
		<title>Cinar 15C202 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cinar_15C202_(iPod7,1)&amp;diff=102533"/>
		<updated>2020-05-10T23:17:19Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.2  | Build                 = 15C202  | Device                = iPod7,1  | Codename              = Cinar  | DownloadURL           = http:...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.2&lt;br /&gt;
 | Build                 = 15C202&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Cinar&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.2/091-58233-20170108-B8467F48-F0C8-11E7-9552-6A2D869EB6BD/iPodtouch_11.2.2_15C202_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-85967-130&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85997-132&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-85846-133&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = f3b426474ea6543495fd5b11d50c9d76&lt;br /&gt;
 | iBECKey               = caccdcc6ee6ba6651ab16144ddef3ca43243e36b271b1d206d52b7b6a556ad9a&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 53851e49e3bf19b4e7e302eca6c98d4a&lt;br /&gt;
 | iBootKey              = 6e023e0e4830ff3a199b53c2654ef007086ed26014cb6855caebe1087d78aef0&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = d922b578345d465fc357875303b87f03&lt;br /&gt;
 | iBSSKey               = b513ddabab068cc2a45dfdd92150379bef59dc41b623fc0abed24a9e18afd4cd&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 29d10c98ad16b53e801a80707d764c7b&lt;br /&gt;
 | LLBKey                = 532eae724d3e7af57c7fd6217dea1d76066fd448911fd06275bac77f0fa3ac99&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 67f7744efc4db3f36066f641dc6a6d8ba8172177be65b8b15664b2b713e3f12e4c89c035a77f28814bc98d0c2684b314&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cinar_15C153_(iPod7,1)&amp;diff=102532</id>
		<title>Cinar 15C153 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cinar_15C153_(iPod7,1)&amp;diff=102532"/>
		<updated>2020-05-10T23:14:51Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.1  | Build                 = 15C153  | Device                = iPod7,1  | Codename              = Cinar  | DownloadURL           = http:...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.1&lt;br /&gt;
 | Build                 = 15C153&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Cinar&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.1/091-55027-20171213-5FCAFF86-DDFB-11E7-A506-0EE4FB2783B2/iPodtouch_11.2.1_15C153_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-85967-127&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85997-129&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-85846-130&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = f3b426474ea6543495fd5b11d50c9d76&lt;br /&gt;
 | iBECKey               = caccdcc6ee6ba6651ab16144ddef3ca43243e36b271b1d206d52b7b6a556ad9a&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 53851e49e3bf19b4e7e302eca6c98d4a&lt;br /&gt;
 | iBootKey              = 6e023e0e4830ff3a199b53c2654ef007086ed26014cb6855caebe1087d78aef0&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = d922b578345d465fc357875303b87f03&lt;br /&gt;
 | iBSSKey               = b513ddabab068cc2a45dfdd92150379bef59dc41b623fc0abed24a9e18afd4cd&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 29d10c98ad16b53e801a80707d764c7b&lt;br /&gt;
 | LLBKey                = 532eae724d3e7af57c7fd6217dea1d76066fd448911fd06275bac77f0fa3ac99&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 67f7744efc4db3f36066f641dc6a6d8ba8172177be65b8b15664b2b713e3f12e4c89c035a77f28814bc98d0c2684b314&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cinar_15C114_(iPod7,1)&amp;diff=102531</id>
		<title>Cinar 15C114 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cinar_15C114_(iPod7,1)&amp;diff=102531"/>
		<updated>2020-05-10T23:11:40Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2  | Build                 = 15C114  | Device                = iPod7,1  | Codename              = Cinar  | DownloadURL           = http://...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2&lt;br /&gt;
 | Build                 = 15C114&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Cinar&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2/091-51607-20171206-BA0D6AD0-D5F7-11E7-B7C0-32B9DC24E03F/iPodtouch_11.2_15C114_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-85967-124&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85997-124&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-85846-125&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = c62ab8328735bd21080dc6a80a64817f&lt;br /&gt;
 | iBECKey               = 8618b22c17d1b0c3c3fae6fd3e6bfbcfd991d3a773d0587f29e0d403073104ff&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 44bb329caa3dd49bb5bb6ed8d6838b17&lt;br /&gt;
 | iBootKey              = 968567f3d8f3384ef540441a1992dfceadaf95628e587271c038df1bd0291635&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 97dad8efa263724f87d6a77626495e75&lt;br /&gt;
 | iBSSKey               = 0328129ae63318ae2c49e91199a8be75f6a333af42d25a8806effa1483b041ab&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = dda3c6c8e88dbac099069250b07a3a1f&lt;br /&gt;
 | LLBKey                = a24874854925cb23c236ed8876a57cfa9c5d09b9be1f7daabd5868d6720666f3&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 67ab10cefdf99b5eda118f65240d76d59399d4d55afbc4f3b56fcbb47f694edeb9e0a74e51ac2ad19daca36484d6749c&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bursa_15B202_(iPod7,1)&amp;diff=102530</id>
		<title>Bursa 15B202 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bursa_15B202_(iPod7,1)&amp;diff=102530"/>
		<updated>2020-05-10T23:08:53Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.1.2  | Build                 = 15B202  | Device                = iPod7,1  | Codename              = Bursa  | DownloadURL           = http:...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.1.2&lt;br /&gt;
 | Build                 = 15B202&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Bursa&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.1.2/091-46346-20171116-4F8EFD4A-C9C7-11E7-AF9C-77E0F451CBCD/iPodtouch_11.1.2_15B202_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-84501-100&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85048-102&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-84556-102&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 47ba94a1c5eea01dc16dd4d6adb768e4&lt;br /&gt;
 | iBECKey               = 10b85cbf7b2a98be28b10a486346dfe207867a585c267b7044900a4ae575b14e&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 2264cd1b6f659a26f9dd887279ecd273&lt;br /&gt;
 | iBootKey              = dea69e570c740f6a0869826bb54fc2b618b639102c026f18c62304625483e987&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = ac925ad7a69ab5a5c5561cdec7ead9b2&lt;br /&gt;
 | iBSSKey               = 14dfc416e84252871dced84aab790b130bb413da53b449af4cb1b457e5b7804f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 5d1855391659866f5fb927ff4c255a32&lt;br /&gt;
 | LLBKey                = bd0ea24e0d3c7b5cd6dbbb056af0ea402acf7161b794f9dee8508ff6d59b770e&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = d48c668b6b0cb6a6a05a0e5c4bea30ca946f6c291ee6d7af32c7b507b1ca09741ff61f2ad66389a10265447fedf31300&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bursa_15B150_(iPod7,1)&amp;diff=102499</id>
		<title>Bursa 15B150 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bursa_15B150_(iPod7,1)&amp;diff=102499"/>
		<updated>2020-05-10T21:08:04Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.1.1  | Build                 = 15B150  | Device                = iPod7,1  | Codename              = Bursa  | DownloadURL           = http:...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.1.1&lt;br /&gt;
 | Build                 = 15B150&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Bursa&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.1.1/091-42247-20171106-452305F0-C39A-11E7-BE39-3DBCF8FD2868/iPodtouch_11.1.1_15B150_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-84501-099&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85048-099&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-84556-099&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 47ba94a1c5eea01dc16dd4d6adb768e4&lt;br /&gt;
 | iBECKey               = 10b85cbf7b2a98be28b10a486346dfe207867a585c267b7044900a4ae575b14e&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 2264cd1b6f659a26f9dd887279ecd273&lt;br /&gt;
 | iBootKey              = dea69e570c740f6a0869826bb54fc2b618b639102c026f18c62304625483e987&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = ac925ad7a69ab5a5c5561cdec7ead9b2&lt;br /&gt;
 | iBSSKey               = 14dfc416e84252871dced84aab790b130bb413da53b449af4cb1b457e5b7804f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 5d1855391659866f5fb927ff4c255a32&lt;br /&gt;
 | LLBKey                = bd0ea24e0d3c7b5cd6dbbb056af0ea402acf7161b794f9dee8508ff6d59b770e&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = d48c668b6b0cb6a6a05a0e5c4bea30ca946f6c291ee6d7af32c7b507b1ca09741ff61f2ad66389a10265447fedf31300&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bursa_15B93_(iPod7,1)&amp;diff=102498</id>
		<title>Bursa 15B93 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bursa_15B93_(iPod7,1)&amp;diff=102498"/>
		<updated>2020-05-10T21:04:57Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.1  | Build                 = 15B93  | Device                = iPod7,1  | Codename              = Bursa  | DownloadURL           = http://a...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.1&lt;br /&gt;
 | Build                 = 15B93&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Bursa&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.1seed/091-41139-20171023-3D9A2180-B5DD-11E7-9D14-97555BD5B8E1/iPodtouch_11.1_15B93_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-84501-097&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85048-096&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-84556-096&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 47ba94a1c5eea01dc16dd4d6adb768e4&lt;br /&gt;
 | iBECKey               = 10b85cbf7b2a98be28b10a486346dfe207867a585c267b7044900a4ae575b14e&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 2264cd1b6f659a26f9dd887279ecd273&lt;br /&gt;
 | iBootKey              = dea69e570c740f6a0869826bb54fc2b618b639102c026f18c62304625483e987&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = ac925ad7a69ab5a5c5561cdec7ead9b2&lt;br /&gt;
 | iBSSKey               = 14dfc416e84252871dced84aab790b130bb413da53b449af4cb1b457e5b7804f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 5d1855391659866f5fb927ff4c255a32&lt;br /&gt;
 | LLBKey                = bd0ea24e0d3c7b5cd6dbbb056af0ea402acf7161b794f9dee8508ff6d59b770e&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = d48c668b6b0cb6a6a05a0e5c4bea30ca946f6c291ee6d7af32c7b507b1ca09741ff61f2ad66389a10265447fedf31300&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A432_(iPod7,1)&amp;diff=102497</id>
		<title>Tigris 15A432 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A432_(iPod7,1)&amp;diff=102497"/>
		<updated>2020-05-10T21:01:32Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0.3  | Build                 = 15A432  | Device                = iPod7,1  | Codename              = Tigris  | DownloadURL           = http...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0.3&lt;br /&gt;
 | Build                 = 15A432&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0.3/091-38409-20171011-DF390008-AB95-11E7-AF98-41A9187BE358/iPodtouch_11.0.3_15A432_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45574-484&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-357&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-359&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = f38a9c55aeb7146015d90f409d0d1a3f&lt;br /&gt;
 | iBECKey               = fe6ba26e302bbc7e0d01109e53ab6c3f909b7d393f49272c87646bb55dcee98f&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 9b59d4410a6b4f04a55a2e993bba31fa&lt;br /&gt;
 | iBootKey              = b7b8a5078ef2aa89e87c37eb530139430c57556350010366d037bde789f7736f&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 6df06304a170982b5f9190fcafbf23d2&lt;br /&gt;
 | iBSSKey               = c9cdad3a0e75b4b805b230f8e4881ea1a9d198fb897a05b8d7fb34c05ee714e2&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = e00485fd0a35f8a77cab02c907c4aa50&lt;br /&gt;
 | LLBKey                = e3a7d00b268e38ef04cea6bda4d522fb15a7fd450da1bb46bd4f68d8669730b0&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 469e43b8d0d24e1746602d1f569a6d6192e5b976f93b1a7cbe8a2ae01fab58368e7000f0a0a3b31e1c6b3f1c4b00294b&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A421_(iPod7,1)&amp;diff=102496</id>
		<title>Tigris 15A421 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A421_(iPod7,1)&amp;diff=102496"/>
		<updated>2020-05-10T20:59:07Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0.2  | Build                 = 15A421  | Device                = iPod7,1  | Codename              = Tigris  | DownloadURL           = http...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0.2&lt;br /&gt;
 | Build                 = 15A421&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0.2/091-34638-20171003-39D0F78A-A486-11E7-AA81-1DDA63D90D56/iPodtouch_11.0.2_15A421_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45574-483&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-353&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-355&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = f38a9c55aeb7146015d90f409d0d1a3f&lt;br /&gt;
 | iBECKey               = fe6ba26e302bbc7e0d01109e53ab6c3f909b7d393f49272c87646bb55dcee98f&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 9b59d4410a6b4f04a55a2e993bba31fa&lt;br /&gt;
 | iBootKey              = b7b8a5078ef2aa89e87c37eb530139430c57556350010366d037bde789f7736f&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 6df06304a170982b5f9190fcafbf23d2&lt;br /&gt;
 | iBSSKey               = c9cdad3a0e75b4b805b230f8e4881ea1a9d198fb897a05b8d7fb34c05ee714e2&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = e00485fd0a35f8a77cab02c907c4aa50&lt;br /&gt;
 | LLBKey                = e3a7d00b268e38ef04cea6bda4d522fb15a7fd450da1bb46bd4f68d8669730b0&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 469e43b8d0d24e1746602d1f569a6d6192e5b976f93b1a7cbe8a2ae01fab58368e7000f0a0a3b31e1c6b3f1c4b00294b&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A402_(iPod7,1)&amp;diff=102495</id>
		<title>Tigris 15A402 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A402_(iPod7,1)&amp;diff=102495"/>
		<updated>2020-05-10T20:56:17Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0.1  | Build                 = 15A402  | Device                = iPod7,1  | Codename              = Tigris  | DownloadURL           = http...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0.1&lt;br /&gt;
 | Build                 = 15A402&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0.1/091-33987-20170925-2FCAEC6E-9ED2-11E7-A19E-68AAC568F843/iPodtouch_11.0.1_15A402_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45574-481&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-350&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-352&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = ac5a59de5f3e8457f0030d83dc643c68&lt;br /&gt;
 | iBECKey               = 23f96dbfec8c04b75b29907a4f921050fa965ead9dc18d9f013644c87fd770e6&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = e46050800cb669941bc9bd8b5608cad8&lt;br /&gt;
 | iBootKey              = 8bcbaefa0c551127b27eb746aa06f2c575d88675ea4d595bedf8c5ca63a28d3a&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 5e20f9a25b924a01651b62b4b51b7f9c&lt;br /&gt;
 | iBSSKey               = d49625bb95ac9bf7ca4ab15488246aba5ea8faeaf1258cc496f7d17535851bcc&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 72087917fc7bf9fb9e38753d55909d45&lt;br /&gt;
 | LLBKey                = 95181f79b57ee8be12f3af7bc49bc401fcca9cac8813a93687dc24a2d8b811e1&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 5af3d65073878d293d90232bd2830b301dffe9554df129cb3ba02b3d55b2ab23b7c02a84a859e94d2fdb4eea1fbef777&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A372_(iPod7,1)&amp;diff=102494</id>
		<title>Tigris 15A372 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A372_(iPod7,1)&amp;diff=102494"/>
		<updated>2020-05-10T20:53:22Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0  | Build                 = 15A372  | Device                = iPod7,1  | Codename              = Tigris  | DownloadURL           = http:/...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0&lt;br /&gt;
 | Build                 = 15A372&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0/091-31552-201700919-35A38376-9027-11E7-A2A2-2135B64D2808/iPodtouch_11.0_15A372_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45574-478&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-347&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-349&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 6a0c61bfc2393ce5c38190f1ce4d469b&lt;br /&gt;
 | iBECKey               = 8e772ce661dff1e64e3251373df3216dc709b419640920fc6168f6d30dcf6043&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 726e2378b0d4908c43e4440eee57c379&lt;br /&gt;
 | iBootKey              = 3e0bce1615fddad8193bb6c660923d8a242cbf68101b67242374a2522862c5be&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = dfe34c4a412124cab4efc6ea6b48ceb7&lt;br /&gt;
 | iBSSKey               = f37a73e66604fcc2eacc542da1c20a4a556feb71250e280f05b50eff32223fd2&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 7608d7dfb080acc646c7c859b1eeb5a1&lt;br /&gt;
 | LLBKey                = 774a59b0753d9657999b05e10a4657073938640e9fae8757984a092debcb888a&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 1d68cdbe4a336c5a5d9c131b8f00b0880a53b801505c5d9eafda69aec0af9a759341b90058a0b5a8cd33d30f5bcb6688&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Fatsa_15F79_(iPod7,1)&amp;diff=102493</id>
		<title>Fatsa 15F79 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Fatsa_15F79_(iPod7,1)&amp;diff=102493"/>
		<updated>2020-05-10T20:49:30Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.4  | Build                 = 15F79  | Device                = iPod7,1  | Codename              = Fatsa  | DownloadURL           = http://u...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.4&lt;br /&gt;
 | Build                 = 15F79&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Fatsa&lt;br /&gt;
 | DownloadURL           = http://updates-http.cdn-apple.com/2018/ios/091-64445-20180529-3B09B562-5ABE-11E8-AD48-DE57A3E35D9E/iPodtouch_11.4_15F79_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-10329-091&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-09632-091&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-10014-091&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 0b3d69e7361a08bd1d4798c9fec6faa5&lt;br /&gt;
 | iBECKey               = dbaf8a1fc8631a416af029fe9284daefa6fdc1a6561b6b1460021bb4b4dcaac5&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = a4910475d4e3a63562900f1f577abb3e&lt;br /&gt;
 | iBootKey              = 2fe251b0b44e3320d834c728de57e16057f3e7585acde7d2b7d5f1abb9f5a01e&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 5a07145f7dbf64b3b06b4d8c287202bd&lt;br /&gt;
 | iBSSKey               = 5d55e3d5bc9b37f6efea61ae48450985a242ca51b71971005ca4764ce16b31c1&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 7c5b6129e608b73744e67ad9f6d302f8&lt;br /&gt;
 | LLBKey                = fbbc3bbf1d7bf977ccaafc46fbf3bd1fb4994bb5f48745858611f5b9e3f38b8e&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 7da396bd7ea4bd3344cf9c03150144117c69bfca9da65c3bf83f23630244dc51b90741cef458d64631510427f28673f0&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Emet_15E302_(iPod7,1)&amp;diff=102492</id>
		<title>Emet 15E302 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Emet_15E302_(iPod7,1)&amp;diff=102492"/>
		<updated>2020-05-10T20:46:34Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.3.1  | Build                 = 15E302  | Device                = iPod7,1  | Codename              = Emet  | DownloadURL           = http:/...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.3.1&lt;br /&gt;
 | Build                 = 15E302&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Emet&lt;br /&gt;
 | DownloadURL           = http://updates-http.cdn-apple.com/2018/ios/091-78169-20180419-8890E1BC-4023-11E8-98A6-47A7FBE594B0/iPodtouch_11.3.1_15E302_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-97413-130&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-97112-138&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-97541-138&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 01228b6a0ac75f2e34a60b375de01b05&lt;br /&gt;
 | iBECKey               = 5422f2352e3abb257e3fd4f567d2fff629734c0035ebcad35b74e95399758072&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = a6e59509392000c7ba6ef5a7be6ddea4&lt;br /&gt;
 | iBootKey              = e04c03bdcd6c40fd9e457a115a8b5409fc545e15ca43f28af5878a6bdd6099e0&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = ff3d74a966f5c272570897b36cfbff49&lt;br /&gt;
 | iBSSKey               = 0250c520eea6cfac35696351286ab785028710aaa7852292c59b36331e803a37&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = c6992f16dacd0f09cd98ba086a7f1ce2&lt;br /&gt;
 | LLBKey                = 6a67dc9ac8e0e48b2794727b19b11a1dee8eb3608692926757c173723a2702c9&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 36ce16142f41836ee98a0c140982c33a1487caccc1e96db17914770ca1c01c9a5a032e489f904067f3ffd4fc812940dd&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Emet_15E216_(iPod7,1)&amp;diff=102491</id>
		<title>Emet 15E216 (iPod7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Emet_15E216_(iPod7,1)&amp;diff=102491"/>
		<updated>2020-05-10T20:43:16Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.3  | Build                 = 15E216  | Device                = iPod7,1  | Codename              = Emet  | DownloadURL           = http://a...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.3&lt;br /&gt;
 | Build                 = 15E216&lt;br /&gt;
 | Device                = iPod7,1&lt;br /&gt;
 | Codename              = Emet&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0/091-31552-201700919-35A38376-9027-11E7-A2A2-2135B64D2808/iPodtouch_11.0_15A372_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-97413-127&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-97112-133&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-97541-133&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n102ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1136~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n102.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 01228b6a0ac75f2e34a60b375de01b05&lt;br /&gt;
 | iBECKey               = 5422f2352e3abb257e3fd4f567d2fff629734c0035ebcad35b74e95399758072&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n102.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = a6e59509392000c7ba6ef5a7be6ddea4&lt;br /&gt;
 | iBootKey              = e04c03bdcd6c40fd9e457a115a8b5409fc545e15ca43f28af5878a6bdd6099e0&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n102.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = ff3d74a966f5c272570897b36cfbff49&lt;br /&gt;
 | iBSSKey               = 0250c520eea6cfac35696351286ab785028710aaa7852292c59b36331e803a37&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.n102&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n102.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = c6992f16dacd0f09cd98ba086a7f1ce2&lt;br /&gt;
 | LLBKey                = 6a67dc9ac8e0e48b2794727b19b11a1dee8eb3608692926757c173723a2702c9&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1136~ipod-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n102.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 36ce16142f41836ee98a0c140982c33a1487caccc1e96db17914770ca1c01c9a5a032e489f904067f3ffd4fc812940dd&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Fatsa_15F79_(iPhone7,1)&amp;diff=102309</id>
		<title>Fatsa 15F79 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Fatsa_15F79_(iPhone7,1)&amp;diff=102309"/>
		<updated>2020-04-28T04:55:47Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.4  | Build                 = 15F79  | Device                = iPhone7,1  | Codename              = Fatsa  | Baseband              = 6.60.0...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.4&lt;br /&gt;
 | Build                 = 15F79&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Fatsa&lt;br /&gt;
 | Baseband              = 6.60.00&lt;br /&gt;
 | DownloadURL           = http://updates-http.cdn-apple.com/2018/ios/091-64768-20180529-3AFEF848-5ABE-11E8-B2A3-EB57A3E35D9E/iPhone_5.5_11.4_15F79_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-10054-090&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-09632-091&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-10014-091&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 1fc080d7f886a463ab8a0aa66cc4826f&lt;br /&gt;
 | iBECKey               = 14f62e7af18c724f08b6beed813f320929e3b7cd901ca9984a6cfa09bb970b29&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 44c7fba74a2766bc3d5136456aae77bc&lt;br /&gt;
 | iBootKey              = d5eacf33b2b10e02262148f1b679749359ac0b8a6977b4f1fe145f000ffede88&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 7b4746a415ce7b644b9a2488ba57835b&lt;br /&gt;
 | iBSSKey               = 727fb85d255f72a1a925de4414fdb2bebc1f55180b1ae22430c7747d74fded64&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = edd4a2aa7b370e021a7e55f43c433e09&lt;br /&gt;
 | LLBKey                = 843467ac4235ee878c412f590e30be14e09104d1184e81e8ae4ad7cdc158007f&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = a7e8fed47ac4dec7b673a5fd45d77abeb5180509d28a5aa0bd9c304a92ec76a90e91528fd48df2557ad0484590043d31&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Emet_15E302_(iPhone7,1)&amp;diff=102308</id>
		<title>Emet 15E302 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Emet_15E302_(iPhone7,1)&amp;diff=102308"/>
		<updated>2020-04-28T04:51:32Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.3.1  | Build                 = 15E302  | Device                = iPhone7,1  | Codename              = Emet  | Baseband              = 6.55...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.3.1&lt;br /&gt;
 | Build                 = 15E302&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Emet&lt;br /&gt;
 | Baseband              = 6.55.0&lt;br /&gt;
 | DownloadURL           = http://updates-http.cdn-apple.com/2018/ios/091-78191-20180419-88A0660A-4023-11E8-916D-4CA7FBE594B0/iPhone_5.5_11.3.1_15E302_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-96998-129&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-97112-138&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-97541-138&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 25560fc21ea534e854a7aaa1da789e11&lt;br /&gt;
 | iBECKey               = 47cfc5f550d8fdecf7a466221901d7451ffc61bc4a487ba292b7fccf049fc9aa&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = c53c116f45cc01008ed4a0f1f79725ce&lt;br /&gt;
 | iBootKey              = d2ed28845ff3a65804556611291d3294d0152446abced0492b74776353e376d1&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = d8a28f5b92904d5e782e178dac17f44f&lt;br /&gt;
 | iBSSKey               = a808d9a7104b7d030d2aecdd8519fd5b8a76b0bbde1c44291356759cf1132846&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = d56bd5614a3cbd1b33c954095912bc73&lt;br /&gt;
 | LLBKey                = da190198637d237d4c57253f024d0c95eb638eac44bb74ffcbc868d3605422a7&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 32d8fdbac93b808fe0544f1ca757112493ac6616d97cc529024adf06ef1b81c9c5c4422fcd0381169f1e0c6164cae73d&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Emet_15E216_(iPhone7,1)&amp;diff=102307</id>
		<title>Emet 15E216 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Emet_15E216_(iPhone7,1)&amp;diff=102307"/>
		<updated>2020-04-28T04:47:28Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.3  | Build                 = 15E216  | Device                = iPhone7,1  | Codename              = Emet  | Baseband              = 6.55.0...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.3&lt;br /&gt;
 | Build                 = 15E216&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Emet&lt;br /&gt;
 | Baseband              = 6.55.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.3/091-40131-20180329-378E547E-2968-11E8-83E9-E8BDE6893228/iPhone_5.5_11.3_15E216_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-96998-126&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-97112-133&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-97541-133&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 25560fc21ea534e854a7aaa1da789e11&lt;br /&gt;
 | iBECKey               = 47cfc5f550d8fdecf7a466221901d7451ffc61bc4a487ba292b7fccf049fc9aa&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = c53c116f45cc01008ed4a0f1f79725ce&lt;br /&gt;
 | iBootKey              = d2ed28845ff3a65804556611291d3294d0152446abced0492b74776353e376d1&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = d8a28f5b92904d5e782e178dac17f44f&lt;br /&gt;
 | iBSSKey               = a808d9a7104b7d030d2aecdd8519fd5b8a76b0bbde1c44291356759cf1132846&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = d56bd5614a3cbd1b33c954095912bc73&lt;br /&gt;
 | LLBKey                = da190198637d237d4c57253f024d0c95eb638eac44bb74ffcbc868d3605422a7&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 32d8fdbac93b808fe0544f1ca757112493ac6616d97cc529024adf06ef1b81c9c5c4422fcd0381169f1e0c6164cae73d&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D100_(iPhone7,1)&amp;diff=102306</id>
		<title>Dalaman 15D100 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D100_(iPhone7,1)&amp;diff=102306"/>
		<updated>2020-04-28T04:41:25Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.6  | Build                 = 15D100  | Device                = iPhone7,1  | Codename              = Dalaman  | Baseband              = 6...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.6&lt;br /&gt;
 | Build                 = 15D100&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Dalaman&lt;br /&gt;
 | Baseband              = 6.30.04&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.6/091-70002-20180220-063D5516-1331-11E8-819A-2AA2E0A71A1F/iPhone_5.5_11.2.6_15D100_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-95345-065&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-95281-066&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-94922-067&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = b5f5077b31745e15d6815b30296bfb56&lt;br /&gt;
 | iBECKey               = 5a39d540b0ddb0515996335d1bbe280b2c05b8f2dc752bca4fbad91baf2a1fd9&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 41976d4df0a8ff5150efa6a3b2959737&lt;br /&gt;
 | iBootKey              = f0186a993f08b660b48e0df36ab8a7e7cfd71fb54491d1d594d440c51a6b19c7&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = d185fae6448fd31c81f67a301a82ec4f&lt;br /&gt;
 | iBSSKey               = 42857bf785f560daf551443a5ba2d814f2ee3ac6ca1fd1bd3191753a459843df&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 5adc139a560cbe9b9c910a13a7f0ca49&lt;br /&gt;
 | LLBKey                = d288466d6a1234f6ebfd3b6b4a6802c52f64937e1ebc9a19b597ee1f480e0a59&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 6446dc3b160b6e7776443ed43e5f467d3d1ca4590250ce1a79177cd8377be9cb65bf396316658e69aa2177ad2985f056&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D60_(iPhone7,1)&amp;diff=102305</id>
		<title>Dalaman 15D60 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dalaman_15D60_(iPhone7,1)&amp;diff=102305"/>
		<updated>2020-04-28T04:37:39Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.5  | Build                 = 15D60  | Device                = iPhone7,1  | Codename              = Dalaman  | Baseband              = 6....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.5&lt;br /&gt;
 | Build                 = 15D60&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Dalaman&lt;br /&gt;
 | Baseband              = 6.30.04&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.5/091-62029-20180122-2A17BA5A-FC96-11E7-9358-AFE2EE2F24C7/iPhone_5.5_11.2.5_15D60_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-95345-064&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-95281-064&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-94922-065&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = b5f5077b31745e15d6815b30296bfb56&lt;br /&gt;
 | iBECKey               = 5a39d540b0ddb0515996335d1bbe280b2c05b8f2dc752bca4fbad91baf2a1fd9&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 41976d4df0a8ff5150efa6a3b2959737&lt;br /&gt;
 | iBootKey              = f0186a993f08b660b48e0df36ab8a7e7cfd71fb54491d1d594d440c51a6b19c7&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = d185fae6448fd31c81f67a301a82ec4f&lt;br /&gt;
 | iBSSKey               = 42857bf785f560daf551443a5ba2d814f2ee3ac6ca1fd1bd3191753a459843df&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 5adc139a560cbe9b9c910a13a7f0ca49&lt;br /&gt;
 | LLBKey                = d288466d6a1234f6ebfd3b6b4a6802c52f64937e1ebc9a19b597ee1f480e0a59&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 6446dc3b160b6e7776443ed43e5f467d3d1ca4590250ce1a79177cd8377be9cb65bf396316658e69aa2177ad2985f056&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cinar_15C202_(iPhone7,1)&amp;diff=102304</id>
		<title>Cinar 15C202 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cinar_15C202_(iPhone7,1)&amp;diff=102304"/>
		<updated>2020-04-28T04:32:46Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.2  | Build                 = 15C202  | Device                = iPhone7,1  | Codename              = Cinar  | Baseband              = 6.3...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.2&lt;br /&gt;
 | Build                 = 15C202&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Cinar&lt;br /&gt;
 | Baseband              = 6.30.04&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.2/091-58756-20170108-B849BB7C-F0C8-11E7-97FB-7D2D869EB6BD/iPhone_5.5_11.2.2_15C202_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-86124-133&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85997-132&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-85846-133&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 97e451e6fd21e7064b2d10fccc4dcaa0&lt;br /&gt;
 | iBECKey               = b91efc18b21c73dbecfd9792b771d24dc0ad7d638bdd4f81ced078bbf37bf0fe&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 76162642aadd43fc41a22f203662dfcf&lt;br /&gt;
 | iBootKey              = 9f35b25643ad52fbcba6858fa9fc8e48ce0605a70d6333aae4f0e2c199e55a93&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = edd43e9aaa825773361f3d13557b18c9&lt;br /&gt;
 | iBSSKey               = 02a9155d2f9e91143e029f548e3ecf26c4de952b673763372b106ed5add535f2&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = dd7c480d60f0ce56933bc8aff0415748&lt;br /&gt;
 | LLBKey                = a6872d0a313d7f12b3e966093fbc71efc31c58766b98a70223693a8b9ef8cdc8&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 304abca6b31b43dd5c9774fc8578914613ffdb893bbbb0aa8b17ffabf354b704e40f6b607d9ea5ddb698d35d12f6eab8&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cinar_15C153_(iPhone7,1)&amp;diff=102303</id>
		<title>Cinar 15C153 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cinar_15C153_(iPhone7,1)&amp;diff=102303"/>
		<updated>2020-04-28T04:26:47Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2.1  | Build                 = 15C153  | Device                = iPhone7,1  | Codename              = Cinar  | Baseband              = 6.3...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2.1&lt;br /&gt;
 | Build                 = 15C153&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Cinar&lt;br /&gt;
 | Baseband              = 6.30.04&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2.1/091-55083-20171213-5FBF8D72-DDFB-11E7-BC1A-13E4FB2783B2/iPhone_5.5_11.2.1_15C153_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-86124-130&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85997-129&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-85846-130&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 97e451e6fd21e7064b2d10fccc4dcaa0&lt;br /&gt;
 | iBECKey               = b91efc18b21c73dbecfd9792b771d24dc0ad7d638bdd4f81ced078bbf37bf0fe&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 76162642aadd43fc41a22f203662dfcf&lt;br /&gt;
 | iBootKey              = 9f35b25643ad52fbcba6858fa9fc8e48ce0605a70d6333aae4f0e2c199e55a93&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = edd43e9aaa825773361f3d13557b18c9&lt;br /&gt;
 | iBSSKey               = 02a9155d2f9e91143e029f548e3ecf26c4de952b673763372b106ed5add535f2&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = dd7c480d60f0ce56933bc8aff0415748&lt;br /&gt;
 | LLBKey                = a6872d0a313d7f12b3e966093fbc71efc31c58766b98a70223693a8b9ef8cdc8&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 304abca6b31b43dd5c9774fc8578914613ffdb893bbbb0aa8b17ffabf354b704e40f6b607d9ea5ddb698d35d12f6eab8&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cinar_15C114_(iPhone7,1)&amp;diff=102302</id>
		<title>Cinar 15C114 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cinar_15C114_(iPhone7,1)&amp;diff=102302"/>
		<updated>2020-04-28T04:19:38Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.2  | Build                 = 15C114  | Device                = iPhone7,1  | Codename              = Cinar  | Baseband              = 6.30....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.2&lt;br /&gt;
 | Build                 = 15C114&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Cinar&lt;br /&gt;
 | Baseband              = 6.30.04&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.2/091-51337-20171206-BA0B91A6-D5F7-11E7-99AE-23B9DC24E03F/iPhone_5.5_11.2_15C114_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-86124-125&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85997-124&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-85846-125&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 724999e2b99205a2db4186c3fcfbdff8&lt;br /&gt;
 | iBECKey               = 8a0993ba6cfc353c28b9d976f93f7767c41e869e65e95fe1672810bbe32fc04f&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 8ec7d0543ab42405e55361b711a5ae64&lt;br /&gt;
 | iBootKey              = 1e5d0a244d557073fba3f87785b10952915a0d34c417a08ce6b5ca22e50cbf26&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = f533d0e1a493227ac2c51e0a06991045&lt;br /&gt;
 | iBSSKey               = c5178b0e8746b4845e3bf3205e8776f12ccd28725bb3d93b5c878f3f4106cde7&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 60f2790e7af070c32ae914a5fb1273a2&lt;br /&gt;
 | LLBKey                = 468ae6f9bfeb7013506c3c799dd0e9ae932262060fe037092c5ddcd1d6dd053f&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = aff84943e587a21d923ccbf2b1416f0cca166ddb84a1c4c0744e7d9f8737dae12d3f33053fb83beb0fe708b7429fee89&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bursa_15B202_(iPhone7,1)&amp;diff=102301</id>
		<title>Bursa 15B202 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bursa_15B202_(iPhone7,1)&amp;diff=102301"/>
		<updated>2020-04-28T04:14:58Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.1.2  | Build                 = 15B202  | Device                = iPhone7,1  | Codename              = Bursa  | Baseband              = 6.1...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.1.2&lt;br /&gt;
 | Build                 = 15B202&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Bursa&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.1.2/091-46846-20171116-4F98A0B6-C9C7-11E7-9B97-8BE0F451CBCD/iPhone_5.5_11.1.2_15B202_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-84846-099&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85048-102&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-84556-102&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = b9e3c50f20eaedc9eef29fd026f4f89a&lt;br /&gt;
 | iBECKey               = 55f90750a0ff3865676a97bf2117f08a5b6ba2770d2c6e18c938353c1e46dd25&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = b278bd8d003f6b0a8cd55c3efa801801&lt;br /&gt;
 | iBootKey              = afe20969724e1175c659cc61738d431532fd6cc2ecd4bbdce8b4bfe92da54acf&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 70c13c102ac1543585a748e59cbe4294&lt;br /&gt;
 | iBSSKey               = 7d84c789a2fdd0d185e0edbcf631c7bd8e60cc5eac453c83e6ea2ead3f4d175e&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = ea0f078d4c00c73e78c6d6f0fa488834&lt;br /&gt;
 | LLBKey                = f4a47af6eb798017fea063edbfc258d3bdd854ea123c935c7a4d8001998439cc&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 2ccc3408fe8488e8b9ffa39b45dd2ec8a6a0348dd4cc3606ec2ad46b3021e70d40eb6530dbddc6a52da66c39149867e6&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bursa_15B150_(iPhone7,1)&amp;diff=102300</id>
		<title>Bursa 15B150 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bursa_15B150_(iPhone7,1)&amp;diff=102300"/>
		<updated>2020-04-28T04:10:36Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.1.1  | Build                 = 15B150  | Device                = iPhone7,1  | Codename              = Bursa  | Baseband              = 6.1...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.1.1&lt;br /&gt;
 | Build                 = 15B150&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Bursa&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.1.1/091-42060-20171106-4525F990-C39A-11E7-B0E4-37BCF8FD2868/iPhone_5.5_11.1.1_15B150_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-84846-098&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85048-099&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-84556-099&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = b9e3c50f20eaedc9eef29fd026f4f89a&lt;br /&gt;
 | iBECKey               = 55f90750a0ff3865676a97bf2117f08a5b6ba2770d2c6e18c938353c1e46dd25&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = b278bd8d003f6b0a8cd55c3efa801801&lt;br /&gt;
 | iBootKey              = afe20969724e1175c659cc61738d431532fd6cc2ecd4bbdce8b4bfe92da54acf&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 70c13c102ac1543585a748e59cbe4294&lt;br /&gt;
 | iBSSKey               = 7d84c789a2fdd0d185e0edbcf631c7bd8e60cc5eac453c83e6ea2ead3f4d175e&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = ea0f078d4c00c73e78c6d6f0fa488834&lt;br /&gt;
 | LLBKey                = f4a47af6eb798017fea063edbfc258d3bdd854ea123c935c7a4d8001998439cc&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 2ccc3408fe8488e8b9ffa39b45dd2ec8a6a0348dd4cc3606ec2ad46b3021e70d40eb6530dbddc6a52da66c39149867e6&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bursa_15B93_(iPhone7,1)&amp;diff=102299</id>
		<title>Bursa 15B93 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bursa_15B93_(iPhone7,1)&amp;diff=102299"/>
		<updated>2020-04-28T04:05:27Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.1  | Build                 = 15B93  | Device                = iPhone7,1  | Codename              = Bursa  | Baseband              = 6.17.0...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.1&lt;br /&gt;
 | Build                 = 15B93&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Bursa&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.1seed/091-41085-20171023-3D951A64-B5DD-11E7-9BBE-84555BD5B8E1/iPhone_5.5_11.1_15B93_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-84846-096&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-85048-096&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-84556-096&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = b9e3c50f20eaedc9eef29fd026f4f89a&lt;br /&gt;
 | iBECKey               = 55f90750a0ff3865676a97bf2117f08a5b6ba2770d2c6e18c938353c1e46dd25&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = b278bd8d003f6b0a8cd55c3efa801801&lt;br /&gt;
 | iBootKey              = afe20969724e1175c659cc61738d431532fd6cc2ecd4bbdce8b4bfe92da54acf&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 70c13c102ac1543585a748e59cbe4294&lt;br /&gt;
 | iBSSKey               = 7d84c789a2fdd0d185e0edbcf631c7bd8e60cc5eac453c83e6ea2ead3f4d175e&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = ea0f078d4c00c73e78c6d6f0fa488834&lt;br /&gt;
 | LLBKey                = f4a47af6eb798017fea063edbfc258d3bdd854ea123c935c7a4d8001998439cc&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 2ccc3408fe8488e8b9ffa39b45dd2ec8a6a0348dd4cc3606ec2ad46b3021e70d40eb6530dbddc6a52da66c39149867e6&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A432_(iPhone7,1)&amp;diff=102298</id>
		<title>Tigris 15A432 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A432_(iPhone7,1)&amp;diff=102298"/>
		<updated>2020-04-28T04:01:29Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0.3  | Build                 = 15A432  | Device                = iPhone7,1  | Codename              = Tigris  | Baseband              = 6....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0.3&lt;br /&gt;
 | Build                 = 15A432&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0.3/091-38098-20171011-DF342A88-AB95-11E7-93D2-34A9187BE358/iPhone_5.5_11.0.3_15A432_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45584-484&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-357&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-359&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 7852e23b4147b937193fbe9a49a34e3e&lt;br /&gt;
 | iBECKey               = b7411e105cb0c13a5e3bfa9400d64a55caf4d9efd2ec04f5136b7a0c13c40fb6&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 48c6d3662f05bb3b51fa9730e4c734f6&lt;br /&gt;
 | iBootKey              = 9da0a4198afb4b3355c9993e8aedf0d48a5965a9ec222dee738895140394007a&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = b937320073334501e23512bf07d222e5&lt;br /&gt;
 | iBSSKey               = 2f56738f75a25c823ebd2083401a7d82cc4585b0c6c8edb9f28fef4d56e820cb&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = e74abe4496f38bd9446f5f09e2fedee7&lt;br /&gt;
 | LLBKey                = fd26ff25320b826388bfb1dd5be6c766a8a6bc2f8cb4a003fb25cfebdab0e305&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = ae53a16c7d23f9f149ebf8a2a107d7adde1adbd56c38c126c5b359bdfe650660114e10f6859258f149de380e1c40f047&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A421_(iPhone7,1)&amp;diff=102272</id>
		<title>Tigris 15A421 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A421_(iPhone7,1)&amp;diff=102272"/>
		<updated>2020-04-24T06:26:01Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0.2  | Build                 = 15A421  | Device                = iPhone7,1  | Codename              = Tigris  | Baseband              = 6....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0.2&lt;br /&gt;
 | Build                 = 15A421&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0.2/091-34491-20171003-39B73660-A486-11E7-98B1-1EDA63D90D56/iPhone_5.5_11.0.2_15A421_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45584-483&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-353&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-355&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 7852e23b4147b937193fbe9a49a34e3e&lt;br /&gt;
 | iBECKey               = b7411e105cb0c13a5e3bfa9400d64a55caf4d9efd2ec04f5136b7a0c13c40fb6&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 48c6d3662f05bb3b51fa9730e4c734f6&lt;br /&gt;
 | iBootKey              = 9da0a4198afb4b3355c9993e8aedf0d48a5965a9ec222dee738895140394007a&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = b937320073334501e23512bf07d222e5&lt;br /&gt;
 | iBSSKey               = 2f56738f75a25c823ebd2083401a7d82cc4585b0c6c8edb9f28fef4d56e820cb&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = e74abe4496f38bd9446f5f09e2fedee7&lt;br /&gt;
 | LLBKey                = fd26ff25320b826388bfb1dd5be6c766a8a6bc2f8cb4a003fb25cfebdab0e305&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = ae53a16c7d23f9f149ebf8a2a107d7adde1adbd56c38c126c5b359bdfe650660114e10f6859258f149de380e1c40f047&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A402_(iPhone7,1)&amp;diff=102271</id>
		<title>Tigris 15A402 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A402_(iPhone7,1)&amp;diff=102271"/>
		<updated>2020-04-24T06:08:43Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0.1  | Build                 = 15A402  | Device                = iPhone7,1  | Codename              = Tigris  | Baseband              = 6....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0.1&lt;br /&gt;
 | Build                 = 15A402&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0.1/091-34214-20170925-2FD91DC0-9ED2-11E7-ADFA-79AAC568F843/iPhone_5.5_11.0.1_15A402_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45584-481&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-350&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-352&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = ce039b183a07bad277703368386df145&lt;br /&gt;
 | iBECKey               = 46ca023eabc30cdcf4e3988cc7ad33ca915aa3f1da0561289c3d6ffb6e21348f&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 49463bda255f0d24c3ac750f5f30395a&lt;br /&gt;
 | iBootKey              = f4cef795626b8d47fec6f88cc63dcc13ceea8e299ea5e8b4d2ad639a88ac91b7&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 202598da7b8f156fe706a8f929f9c3f7&lt;br /&gt;
 | iBSSKey               = ad4c615bce7753f3a55d21a3f709fcc7da94a425e122b797ad69b01d1c82b185&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 1c19987337967145f36bdd7782de6ab0&lt;br /&gt;
 | LLBKey                = e1e931104a05c5f01374b2d399b0327cf3f1314c7ba4d1747a56b758b1223cbd&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = e3a1480fe1f2019026b46220f03ba4c6fd924defa425c1a2b240ab63599350cf5fcec8b19788f56f6a5e04529588be6c&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tigris_15A372_(iPhone7,1)&amp;diff=102270</id>
		<title>Tigris 15A372 (iPhone7,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tigris_15A372_(iPhone7,1)&amp;diff=102270"/>
		<updated>2020-04-24T06:03:48Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 11.0  | Build                 = 15A372  | Device                = iPhone7,1  | Codename              = Tigris  | Baseband              = 6.17...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 11.0&lt;br /&gt;
 | Build                 = 15A372&lt;br /&gt;
 | Device                = iPhone7,1&lt;br /&gt;
 | Codename              = Tigris&lt;br /&gt;
 | Baseband              = 6.17.00&lt;br /&gt;
 | DownloadURL           = http://appldnld.apple.com/ios11.0/091-31643-201700919-35B3D3FC-9027-11E7-941D-2735B64D2808/iPhone_5.5_11.0_15A372_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 058-45584-478&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 058-59988-347&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 058-59982-349&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@3x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@3x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@3x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@3x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n56ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1920~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n56.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = b233e776604fe56b7cd237110440758e&lt;br /&gt;
 | iBECKey               = 821219f0d1c7459abec4c3cc4255240cc3ca213f90c690f8729b9aa3235ddf78&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n56.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 7a9db83012836930695f2b6aaf67f9b6&lt;br /&gt;
 | iBootKey              = 88b29fe5b99dbdabf7f220d9bfca94e00b3d96f6d4d17587f1a37165703878e8&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n56.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = c0e9a3fc56a9e2b19c6a61e264cd131e&lt;br /&gt;
 | iBSSKey               = 525f2bdaa29ad185325cc2968108d79511516a30e7a75a24a6ac1d95d3f22dfe&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n56.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 0cb3778f90a22a9250445e539678f6ba&lt;br /&gt;
 | LLBKey                = 7a84ece039ab558122da1f906afb64a39bc0253d3109b1029980f379d8afe759&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1920~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n56.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 7e1288fad1742c407e2126738b0160331d0e177bf613cfd8efe17ddaea29c99d116e603898d60e45708da9fac6d2cfd8&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G102_(iPhone7,2)&amp;diff=102269</id>
		<title>PeaceG 16G102 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G102_(iPhone7,2)&amp;diff=102269"/>
		<updated>2020-04-24T05:42:19Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Created page with &amp;quot;{{keys  | Version               = 12.4.1  | Build                 = 16G102  | Device                = iPhone7,2  | Codename              = PeaceG  | Baseband              = 7....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4.1&lt;br /&gt;
 | Build                 = 16G102&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceG&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = http://updates-http.cdn-apple.com/2019SummerFCS/fullrestores/061-05179/A45E35B2-C4E7-11E9-9918-19610AD8B7A1/iPhone_4.7_12.4.1_16G102_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-76490-095&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-76167-096&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-78047-096&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = cd4ce0e1edc721258f37556f4767d6c7&lt;br /&gt;
 | iBECKey               = 62d2f3d8a9a7161320d43d88476905fb5132b34cd97ccf9d14d9860d0ec2cf41&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = fc844a8fd16692bcfbcc09a8d61a8baa&lt;br /&gt;
 | iBootKey              = b4947988635695173efed8cdfa5c282266da7baa06aff733248d2453fda31a6d&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 2237e1a3f637055a1ad11eef485f036e&lt;br /&gt;
 | iBSSKey               = 97f4cda4d59e4aeae12bcd8afa9beff39173e9d568b0470c9c7a5076353f6e9f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 9f2093d67f5482f415007a4c85797fe6&lt;br /&gt;
 | LLBKey                = c51ae27c4e0e34b02450505451a347dda13c35f2f68b9f304160adc34bfd88ee&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = f9a26de33ff3b6a9787d716e0773c0cba0c63198129af72c6aa8f5a8339e694d937354a03a2bda37e2a063fb72705ad0&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceSecYukonE_16G183_(iPhone7,2)&amp;diff=101741</id>
		<title>PeaceSecYukonE 16G183 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceSecYukonE_16G183_(iPhone7,2)&amp;diff=101741"/>
		<updated>2020-03-25T06:56:19Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: yeet&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4.6&lt;br /&gt;
 | Build                 = 16G183&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceSecYukonE&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = http://updates-http.cdn-apple.com/2020WinterFCS/fullrestores/061-73640/E67A9967-06A9-4846-A34F-6EAECA4A132E/iPhone_4.7_12.4.6_16G183_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 038-36700-005&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 038-36713-005&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 038-36771-005&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 7fbf2866399f9ec7f52e75971d0da14c&lt;br /&gt;
 | iBECKey               = 09053efb14fe93844984a087333c71a0b59fb23a14ae1469bb14627c37550aab&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 750ea1b236c3c3342ff0a556326f34ed&lt;br /&gt;
 | iBootKey              = 6ddcd41fe465c88187c8b50ed5dcf4e270456c729c87091fecb136ea0b99c784&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = cfc04f5d0cc1e7937376942f6f87245c&lt;br /&gt;
 | iBSSKey               = 184aa2f7d0312097af357d0180976e1251760ec0a2bc9babc320dde1c7ffdc38&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 9d22174c6a68e3fd119a95da1b4911fc&lt;br /&gt;
 | LLBKey                = abe08f35b753b46e8dd9b4a690154b4a81305e513c379d574f23d5c8f5105984&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 88eda5a3a325c9235dfe78c49bc176f672a2a3955097a7d3452de76374d9237e6dddb8a52678ddffe22257fea08c0085&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=101676</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=101676"/>
		<updated>2020-03-24T16:00:21Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Oof haven't updated page this in a fat minute&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* ZecOps Kernel Exploit ({{cve|2019-8794}}) &lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.3)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 13.3.1)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]]&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceC_16C101_(iPhone7,2)&amp;diff=100506</id>
		<title>PeaceC 16C101 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceC_16C101_(iPhone7,2)&amp;diff=100506"/>
		<updated>2020-03-03T01:26:09Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.1.2&lt;br /&gt;
 | Build                 = 16C101&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceC&lt;br /&gt;
 | Baseband              = 7.32.00&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2018FallFCS/fullrestores/041-27254/5EB0EB28-FF0C-11E8-8653-E1D4C465C0D3/iPhone_4.7_12.1.2_16C101_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-40109-059&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-40327-059&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-40310-059&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 5c25d829f655c84855b6af7ed19cc1cd&lt;br /&gt;
 | iBECKey               = 69d5a66ec345d8af73b371be12c24c3b26e63175e429e0b8c540412d70a0e7d6&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 39dc92f448a59f373424708828c8a647&lt;br /&gt;
 | iBootKey              = d40d63135cbe1f9e06b4c5329701a3240152954845d767890484ee664091a938&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 1cc13c9a933243144d6d3a7734516e96&lt;br /&gt;
 | iBSSKey               = fca58946c870992687de93cec6d72612d878a05b0fb8e35e2f12277a6184a1e5&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 44c866c60125745c073be051c858f7d8&lt;br /&gt;
 | LLBKey                = fa31cee285a58e6aab66af992d3d7b502b1270194d6d1795b3c3a3a97d0f4f69&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 06a1b077c36f4e244acd927c5ff534cf034573cdf2d4925d05a947af34eceb22791d68013ddbd942daf29bc6a8d89da4&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceSecYukonD_16G161_(iPhone7,2)&amp;diff=99303</id>
		<title>PeaceSecYukonD 16G161 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceSecYukonD_16G161_(iPhone7,2)&amp;diff=99303"/>
		<updated>2020-02-24T08:27:22Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4.5&lt;br /&gt;
 | Build                 = 16G161&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceSecYukonD&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2020WinterFCS/fullrestores/061-62313/32754B5C-6393-4835-9578-47490E2748BF/iPhone_4.7_12.4.5_16G161_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 038-27324-003&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 038-27252-003&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 038-27407-003&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = cd4ce0e1edc721258f37556f4767d6c7&lt;br /&gt;
 | iBECKey               = 62d2f3d8a9a7161320d43d88476905fb5132b34cd97ccf9d14d9860d0ec2cf41&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = fc844a8fd16692bcfbcc09a8d61a8baa&lt;br /&gt;
 | iBootKey              = b4947988635695173efed8cdfa5c282266da7baa06aff733248d2453fda31a6d&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 2237e1a3f637055a1ad11eef485f036e&lt;br /&gt;
 | iBSSKey               = 97f4cda4d59e4aeae12bcd8afa9beff39173e9d568b0470c9c7a5076353f6e9f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 9f2093d67f5482f415007a4c85797fe6&lt;br /&gt;
 | LLBKey                = c51ae27c4e0e34b02450505451a347dda13c35f2f68b9f304160adc34bfd88ee&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = f9a26de33ff3b6a9787d716e0773c0cba0c63198129af72c6aa8f5a8339e694d937354a03a2bda37e2a063fb72705ad0&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceSecYukonC_16G140_(iPhone7,2)&amp;diff=99302</id>
		<title>PeaceSecYukonC 16G140 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceSecYukonC_16G140_(iPhone7,2)&amp;diff=99302"/>
		<updated>2020-02-24T08:26:21Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4.4&lt;br /&gt;
 | Build                 = 16G140&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceSecYukonC&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019FallFCS/fullrestores/061-37750/DEB56BCA-0BFC-11EA-AA76-70FE7531BBAA/iPhone_4.7_12.4.4_16G140_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 038-11934-004&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 038-12536-004&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 038-13022-004&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = cd4ce0e1edc721258f37556f4767d6c7&lt;br /&gt;
 | iBECKey               = 62d2f3d8a9a7161320d43d88476905fb5132b34cd97ccf9d14d9860d0ec2cf41&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = fc844a8fd16692bcfbcc09a8d61a8baa&lt;br /&gt;
 | iBootKey              = b4947988635695173efed8cdfa5c282266da7baa06aff733248d2453fda31a6d&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 2237e1a3f637055a1ad11eef485f036e&lt;br /&gt;
 | iBSSKey               = 97f4cda4d59e4aeae12bcd8afa9beff39173e9d568b0470c9c7a5076353f6e9f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 9f2093d67f5482f415007a4c85797fe6&lt;br /&gt;
 | LLBKey                = c51ae27c4e0e34b02450505451a347dda13c35f2f68b9f304160adc34bfd88ee&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = f9a26de33ff3b6a9787d716e0773c0cba0c63198129af72c6aa8f5a8339e694d937354a03a2bda37e2a063fb72705ad0&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G130_(iPhone7,2)&amp;diff=99301</id>
		<title>PeaceG 16G130 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G130_(iPhone7,2)&amp;diff=99301"/>
		<updated>2020-02-24T08:25:03Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4.3&lt;br /&gt;
 | Build                 = 16G130&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceG&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019FallFCS/fullrestores/061-32402/20A23F00-F0CC-11E9-A9B1-77BD38B10759/iPhone_4.7_12.4.3_16G130_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-76490-103&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-76167-104&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-78047-104&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = cd4ce0e1edc721258f37556f4767d6c7&lt;br /&gt;
 | iBECKey               = 62d2f3d8a9a7161320d43d88476905fb5132b34cd97ccf9d14d9860d0ec2cf41&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = fc844a8fd16692bcfbcc09a8d61a8baa&lt;br /&gt;
 | iBootKey              = b4947988635695173efed8cdfa5c282266da7baa06aff733248d2453fda31a6d&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 2237e1a3f637055a1ad11eef485f036e&lt;br /&gt;
 | iBSSKey               = 97f4cda4d59e4aeae12bcd8afa9beff39173e9d568b0470c9c7a5076353f6e9f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 9f2093d67f5482f415007a4c85797fe6&lt;br /&gt;
 | LLBKey                = c51ae27c4e0e34b02450505451a347dda13c35f2f68b9f304160adc34bfd88ee&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = f9a26de33ff3b6a9787d716e0773c0cba0c63198129af72c6aa8f5a8339e694d937354a03a2bda37e2a063fb72705ad0&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G114_(iPhone7,2)&amp;diff=99300</id>
		<title>PeaceG 16G114 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G114_(iPhone7,2)&amp;diff=99300"/>
		<updated>2020-02-24T08:23:45Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4.2&lt;br /&gt;
 | Build                 = 16G114&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceG&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019SummerFCS/fullrestores/061-20436/FD3DCFA0-DC8C-11E9-ABB0-288C66A83945/iPhone_4.7_12.4.2_16G114_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-76490-100&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-76167-101&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-78047-101&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = cd4ce0e1edc721258f37556f4767d6c7&lt;br /&gt;
 | iBECKey               = 62d2f3d8a9a7161320d43d88476905fb5132b34cd97ccf9d14d9860d0ec2cf41&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = fc844a8fd16692bcfbcc09a8d61a8baa&lt;br /&gt;
 | iBootKey              = b4947988635695173efed8cdfa5c282266da7baa06aff733248d2453fda31a6d&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 2237e1a3f637055a1ad11eef485f036e&lt;br /&gt;
 | iBSSKey               = 97f4cda4d59e4aeae12bcd8afa9beff39173e9d568b0470c9c7a5076353f6e9f&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 9f2093d67f5482f415007a4c85797fe6&lt;br /&gt;
 | LLBKey                = c51ae27c4e0e34b02450505451a347dda13c35f2f68b9f304160adc34bfd88ee&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = f9a26de33ff3b6a9787d716e0773c0cba0c63198129af72c6aa8f5a8339e694d937354a03a2bda37e2a063fb72705ad0&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G77_(iPhone7,2)&amp;diff=99299</id>
		<title>PeaceG 16G77 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceG_16G77_(iPhone7,2)&amp;diff=99299"/>
		<updated>2020-02-24T08:22:18Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4&lt;br /&gt;
 | Build                 = 16G77&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceG&lt;br /&gt;
 | Baseband              = 7.80.04&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019SummerFCS/fullrestores/041-86577/9E2ACCF8-A743-11E9-A35C-D2077EC3910A/iPhone_4.7_12.4_16G77_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-76490-092&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-76167-092&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-78047-092&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 5206c41313da7476a9660a01e6b04090&lt;br /&gt;
 | iBECKey               = d29a487501ae6eb0056ef20f6d43b99dd67914ce324150c186e8792d527be459&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = 0820d9bee7da6c1b012607050cfbab73&lt;br /&gt;
 | iBootKey              = b875c2c20f5f925ae6238ae451e8ff5707e6e78ab21c6623ba1b8fdc8bd19575&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = c108cb291b1b9edb4efbf37ca2b14652&lt;br /&gt;
 | iBSSKey               = 824f8e679b5ca27a8e7d1dae67258270e35a44e733ec99096a222c9f65d6e1c2&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 111494e69c7667bdb957fe6bc5737b41&lt;br /&gt;
 | LLBKey                = 9d281a3a5b9757d0b635c70d6a69f6eccb7893a1efc339b667f3f8890c657671&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 4af1f47e99281427ac950aaae87faf5eca7d41dcde276e6abd88f08f1eb20eaf4a10e47dceef1bb867619a475fa45849&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceF_16F203_(iPhone7,2)&amp;diff=99298</id>
		<title>PeaceF 16F203 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceF_16F203_(iPhone7,2)&amp;diff=99298"/>
		<updated>2020-02-24T08:19:53Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.3.1&lt;br /&gt;
 | Build                 = 16F203&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceF&lt;br /&gt;
 | Baseband              = 7.70.01&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019SpringFCS/fullrestores/041-68903/CC343F30-7C96-11E9-B886-4FF06256CCDB/iPhone_4.7_12.3.1_16F203_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-42931-182&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-42908-184&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-43177-185&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 8e55ecfa2544c3a6f120476e8eb47505&lt;br /&gt;
 | iBECKey               = d7d3b285fcd33f230e2e9fceb6b4e21730db2ebd026a0844a52a63da9433a82b&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = db1b5419e3525960820e39b2ea784636&lt;br /&gt;
 | iBootKey              = 0acd488f166ca20d306af254bba8a167c5f81dbc634db8b8759e94a4aecd77d1&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 5fbd44bde97fcb9aacb4f7aa1acd888b&lt;br /&gt;
 | iBSSKey               = 94e4c3a3e6f81c49c928f8b631e692cc906bdad8b559c26868966454774d18f4&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 986f30a91647a75ff9ecc46383207fe3&lt;br /&gt;
 | LLBKey                = 5d6b0e89f0e1431107d289030498f188db073c9c5f14a5148bfb05655c58c78e&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 22773d20a9fd545c3f92a8a76f296029c26e7d57b9a60d396f2f50a1ea406ad5a8ce820887e53233e844d4941984dee7&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceF_16F156_(iPhone7,2)&amp;diff=99297</id>
		<title>PeaceF 16F156 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceF_16F156_(iPhone7,2)&amp;diff=99297"/>
		<updated>2020-02-24T08:18:39Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.3&lt;br /&gt;
 | Build                 = 16F156&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceF&lt;br /&gt;
 | Baseband              = 7.70.01&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019SpringFCS/fullrestores/041-61795/B8E4BB08-71E2-11E9-AF43-0B84412A1E9F/iPhone_4.7_12.3_16F156_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-42931-178&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-42908-180&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-43177-181&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = fa83dd075a2a75d092f94c9e560e9ca0&lt;br /&gt;
 | iBECKey               = ba8bfa7201af457d21793351030bc80b3f170c780fb24d38487bc1887b5bcc0d&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = be8dd8a7516271037b068d21bba06fbe&lt;br /&gt;
 | iBootKey              = 01838363198711640573170a186e1ae712b15140455603d74ac691dea0dd0c02&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = 41dca3e3458f03875f845cc99e2cbe38&lt;br /&gt;
 | iBSSKey               = 48eee34433e666b96894470091fb9d348efe1e2e2be13207a9086ecfc40090f0&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = f13eed84f2a091c5abba272042bd8739&lt;br /&gt;
 | LLBKey                = 8f4f1cce15a11832776aa3f83b5f7bb45481c85fc95438ecfec031a776a6b3b2&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = e3306314f39ff4ae5dff35b1f97e0ab63078f0ff640e23829c4d4e8d9f2d0383365f7519539229fe01716e50c6009246&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceE_16E227_(iPhone7,2)&amp;diff=99296</id>
		<title>PeaceE 16E227 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceE_16E227_(iPhone7,2)&amp;diff=99296"/>
		<updated>2020-02-24T08:16:01Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.2&lt;br /&gt;
 | Build                 = 16E227&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceE&lt;br /&gt;
 | Baseband              = 7.55.01&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019SpringFCS/fullrestores/041-06917/ECD402F4-499F-11E9-85D3-E64576CE070F/iPhone_4.7_12.2_16E227_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-41588-148&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-23611-271&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-23877-271&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = fe80c2e8c05308131171bc2f362a48e6&lt;br /&gt;
 | iBECKey               = 7568dbad963f3c813ca14941152620cfc12a842f7b4cf0a1ed6edc6ce1ba0eb4&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = d47d7e138f5cd533b55c4a135d73108c&lt;br /&gt;
 | iBootKey              = ba0f86db8b9dcdbd8f62ed102ab7bcf54e293ab22bb670dc60b8347889491f2b&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = a8260d49fb704612a89807ed55184be1&lt;br /&gt;
 | iBSSKey               = b0c6c606faa50c50b36f16e5406acf362fab508df2ce8f82fd1845796d9d32a6&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 93b824a4cc70f170d6c133d3e450ff80&lt;br /&gt;
 | LLBKey                = 702268e6453705ca013ceab226299a8ca45993061536044acab357ee2266f962&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = e6d79c6047e8b6bc1966a689642b782d5c67f64a8acc5bb9d9386774369d5b8912fdf9ff2b718d8fe022867471262d45&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceD_16D57_(iPhone7,2)&amp;diff=99295</id>
		<title>PeaceD 16D57 (iPhone7,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceD_16D57_(iPhone7,2)&amp;diff=99295"/>
		<updated>2020-02-24T08:14:13Z</updated>

		<summary type="html">&lt;p&gt;Kiddepants: Thanks @a1exdandy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.1.4&lt;br /&gt;
 | Build                 = 16D57&lt;br /&gt;
 | Device                = iPhone7,2&lt;br /&gt;
 | Codename              = PeaceD&lt;br /&gt;
 | Baseband              = 7.32.00&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019WinterFCS/fullrestores/041-39257/32129B6C-292C-11E9-9E72-4511412B0A59/iPhone_4.7_12.1.4_16D57_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-48527-047&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-47614-048&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-48002-048&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~iphone.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~iphone.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~iphone.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~iphone.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.n61ap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@1334~iphone-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.n61.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = ee091c44f1d30dfc2f4244f4709cb266&lt;br /&gt;
 | iBECKey               = ce2badff96592d721d73cfd80f2426dccd8dcc445533a587b3fe8961f85279ee&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.n61.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = e4e855b2405c39bd1477f366df8cf3fb&lt;br /&gt;
 | iBootKey              = 4c2b4a056cc2f3047aba6e2de49e22b72fc130725537dcde1d17eaec5a8c4287&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.n61.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = bbd367692212ae3512d98d7c326a0065&lt;br /&gt;
 | iBSSKey               = 958c34f549e176d411f6e420b449d4acfe85c3f996ea6cba45d196154297a96b&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.iphone7&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.n61.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = 4ce2a732d752cf59f7a5ec06593ac48f&lt;br /&gt;
 | LLBKey                = b74d21a4b4e3ca476d219c7bcd4696d72f2fca5dcb0ad8fe2f2fb3c21dbd083b&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@1334~iphone-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.n61.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = 7b7488009742aa3006fe0508742bae60716319493119d56fa9c400e0025dd1c4c43f4b5999a61b6ea84ac6cda45f6f11&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Kiddepants</name></author>
		
	</entry>
</feed>