<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luxiel</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luxiel"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Luxiel"/>
	<updated>2026-05-14T03:34:42Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=25986</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=25986"/>
		<updated>2012-06-18T13:41:52Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* June */  Adding the news about the baseband downgrade function added to redsn0w&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{float toc}}&lt;br /&gt;
== 2012 ==&lt;br /&gt;
=== June ===&lt;br /&gt;
* June 18th-- [[iPhone Dev Team]] releases a new version of [[redsn0w]] (0.9.14b1), adding the capability to downgrade iPhone [[N82ap|3G]]/[[N88ap|3GS]] [[Baseband]] from the [[06.15.00]] iPad baseband to the latest unlockable iPhone baseband ([[05.13.04]]). This allow 3G/3GS users that had upgraded to the iPad baseband, thus losing the GPS function and the ability to restore to stock firmware, to get back to an iPhone baseband, making their devices behave as intended again, as well as being unlockable by [[ultrasn0w]].&lt;br /&gt;
* June 14th-- [[iPhone Dev Team]] releases a developer version of [[redsn0w]] (0.9.13dev1), which jailbreaks [[limera1n]] susceptible devices running iOS 6 beta 1. This version doesn't hacktivate nor installs [[Cydia]], as it hasn't been ported to iOS 6 just yet. This jailbreak, however, installs afc2 and SSH, enabling developers to fix and prepare their apps to the next iOS version.&lt;br /&gt;
* June 11th-- [[WWDC]] 2012 starts. Apple opens the conference with a keynote revealing upgrades to its notebook line-up, a new MacBook Pro line with Retina Display and Flash Storage, the 9th OS X major revision: Mountain Lion and iOS 6. iOS 6 beta 1 is seeded to iOS registered developers.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* May 25-- The [[Chronic Dev (team)|Chronic Dev Team]] releases [[Absinthe]] 2.0, providing an [[untethered jailbreak]] for all devices except the Apple TVs and [[k93aap|iPad 2 (Wi-Fi R2 model)]]. ([[Seas0nPass]] was also updated to include Absinthe's untether for the [[k66ap|Apple TV 2G]].)&lt;br /&gt;
* May 7-- Apple releases iOS 5.1.1.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* March 7 -- Apple releases iOS 5.1 and announces new devices: [[iPad 3]], [[J33ap|Apple TV 3G]], and the [[K93aap|iPad 2 (Wi-Fi R2 model)]].&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* January 20 -- [[Absinthe]] was released to jailbreak and untether the A5 devices running iOS 5.0 and 5.0.1.&lt;br /&gt;
* January 18 -- Apple announces [[iBooks.app|iBooks version 2.0]].&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* December 30 -- [[User:pod2g|pod2g]]'s untether for iOS 4.4.4 makes its way into a new version of [[Seas0nPass]] for [[k66ap|Apple TV 2G]] owners.&lt;br /&gt;
* December 27 -- [[User:pod2g|pod2g]]'s untether for iOS 5.0.1 is released in new versions of [[PwnageTool]] and [[redsn0w]], and as a Cydia package called [[Corona]] (by the [[Chronic Dev (team)|Chronic Dev Team]]) for devices already jailbroken on 5.0.1.&lt;br /&gt;
* December 15 -- Apple releases iOS 4.4.4 for the [[k66ap|Apple TV 2G]], as well as a minor update (5.0.1 build 9A406) for the [[n94ap|iPhone 4S]] to address SIM card issues.&lt;br /&gt;
* December 4 -- [[iFaith]] 1.4 is released, which can circumvent the APTicket [[nonce]] on devices vulnerable to [[limera1n]]'s exploit.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* November 9 -- iOS 5.0.1 is released in an attempt to fix battery-related issues.&lt;br /&gt;
=== October ===&lt;br /&gt;
* October 14 -- The [[n94ap|iPhone 4S]] is officially released, although some preorders were delivered early.&lt;br /&gt;
* October 12 -- [[iOS]] 5.0 is released.&lt;br /&gt;
* October 5 -- Steve Jobs passes away.&lt;br /&gt;
* October 4 -- Apple announces the new [[N94ap|iPhone 4S]].&lt;br /&gt;
=== September ===&lt;br /&gt;
* September 19 -- [[redsn0w]] 0.9.9 beta 1 is released, introducing a new UI and many features (like submitting SHSHs to the [[Cydia Server]].&lt;br /&gt;
* September 17 -- [[MyGreatFest]], first iCommunity and jailbreak centered convention was held.&lt;br /&gt;
=== July ===&lt;br /&gt;
*July 15 -- Apple releases iOS 4.2.9 and 4.3.4, patching all jailbreaking-related vulnerabilities (aside from those in the [[bootrom]]).&lt;br /&gt;
*July 6 -- [[User:Comex|comex]] releases [[Saffron]], the first public jailbreak for the [[iPad 2]].&lt;br /&gt;
*July 2 -- A beta version of the upcoming jailbreak from [[User:comex|comex]] for the [[iPad 2]], making use of a PDF exploit, was leaked. A hotfix by Apple is expected very soon.&lt;br /&gt;
=== June ===&lt;br /&gt;
*June 1 -- [[User:ih8sn0w|iH8sn0w]] releases [[iFaith]] to dump SHSH blobs from a device.&lt;br /&gt;
=== May ===&lt;br /&gt;
*May 6 -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for iOS 4.3.3 support (and in the case of sn0wbreeze, iOS 4.2.8 support as well).&lt;br /&gt;
*May 3 -- Apple releases iOS 4.2.8 and 4.3.3 to address the location-tracking controversy. Once more, current untethering vulnerabilities remained unpatched.&lt;br /&gt;
=== April ===&lt;br /&gt;
*April 24 -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for iOS 4.3.2 support (and in the case of sn0wbreeze, iOS 4.2.7 support as well).&lt;br /&gt;
*April 14 -- Apple releases iOS 4.2.7 and 4.3.2 to fix security issues and connection issues for [[K95ap|iPad 2 CDMA model]], but leaves untethering vulnerabilities unpatched.&lt;br /&gt;
*April 3 -- All major jailbreak tools ([[redsn0w]], [[PwnageTool]], [[sn0wbreeze]]) get updated to includes [[i0n1c]]'s untether code to jailbreak devices compatible with iOS 4.3.1 except the [[iPad 2]].&lt;br /&gt;
=== March ===&lt;br /&gt;
*March 25 -- Apple releases iOS 4.3.1, properly blocking [[User:comex|comex]]'s [[IOSurface Kernel Exploit|exploit]].&lt;br /&gt;
*March 13 -- [[User:Comex|comex]] shows a remotely jailbroken [[K95ap|iPad 2 CDMA]].&lt;br /&gt;
*March 11 -- Release of the [[iPad 2]] in the USA. The exploits for [[limera1n]] ([[User:Geohot|geohot]]), [[SHA-1 Image Segment Overflow|SHAtter]] ([[User:posixninja|p0sixninja]]), and [[comex]]'s [[kernel]] exploit were closed by Apple.&lt;br /&gt;
*March 9 -- Apple releases iOS 4.3, fixing the [[HFS Legacy Volume Name Stack Buffer Overflow]] vulnerability.&lt;br /&gt;
=== February ===&lt;br /&gt;
*February 15 -- New version of both [[PwnageTool]] and [[sn0wbreeze]] were released to support 4.2.1 and untethered using the [[feedface]] exploit.&lt;br /&gt;
*February 7 -- The [[Chronic Dev (team)|Chronic Dev Team]] release a version of [[greenpois0n (jailbreak)|greenpois0n]] to jailbreak the [[N92ap|iPhone 4 CDMA model]] using the [[HFS Legacy Volume Name Stack Buffer Overflow]].&lt;br /&gt;
*February 3 -- [[User:Jaywalker|Jaywalker]] of the [[Chronic Dev (team)|Chronic Dev Team]] posts [https://www.youtube.com/watch?v=T3NYPVT13xw a video] of custom boot using a soon to be released version of [[Greenpois0n (jailbreak)|greenpois0n]].&lt;br /&gt;
=== January ===&lt;br /&gt;
*January 12 -- Apple discontinues iOS support for [[N82ap|iPhone 3G]] and [[N72ap|iPod touch 2G]] since today's beta release of iOS 4.3. Also first time a beta iOS for [[K66ap|Apple TV 2G]] is released.&lt;br /&gt;
*January 11 -- Verizon announces [[N92ap|CDMA version of iPhone 4]].&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
*November 28 -- [[ultrasn0w]] 1.2 is released by the [[iPhone Dev Team]] to unlock [[N82ap|iPhone 3G]] and [[N88ap|iPhone 3GS]] on baseband 6.15.00&lt;br /&gt;
*November 22 -- Apple releases iOS 4.2.1 (respectively 4.2 for [[K66ap|Apple TV 2G]])&lt;br /&gt;
===October===&lt;br /&gt;
*October 31 -- The [[iPhone Dev Team|Dev Team]] releases [[redsn0w]] 0.9.6b2 which jailbreaks iOS 4.1, 4.2 and 3.2.2 on every device available at the time of release (except for iPT 2G MC). It also includes &amp;quot;DFU&amp;quot; button allowing to flash custom [[IPSW]] from Windows [http://blog.iphone-dev.org/post/1452044444/redsn0w-limera1n-fun (see blog post)].&lt;br /&gt;
*October 20 -- The [[iPhone Dev Team|Dev Team]] releases [[PwnageTool]] 4.1 which jailbreaks iOS 4.1 and 3.2.2 on every device  available at the time of release. [http://blog.iphone-dev.org/post/1359246784/20102010-event (see blog post)]&lt;br /&gt;
*October 18 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] RC4 which added support for iPod touch 2G (MC and MB) for an untethered jailbreak using [[User:comex|comex]]'s kernel exploit and the [[usb_control_msg(0xA1, 1) Exploit]].&lt;br /&gt;
*October 12 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] after switching its exploit from [[SHA-1 Image Segment Overflow|SHAtter]] to [[limera1n]], in the hope that [[SHA-1 Image Segment Overflow|SHAtter]] remains for 5th generation devices. (The exploit [[limera1n]] uses was fixed in the [[iBoot (Bootloader)|iBoot]] revision found in iOS 4.2 beta 2, which means Apple knows about the vulnerability and the next [[bootrom]] revision may have it patched.)&lt;br /&gt;
*October 10 -- Following the first [[limera1n]] beta release, [[User:geohot|geohot]] released multiple versions, each fixing bugs affecting previous releases. [[Chronic Dev (team)|Chronic Dev Team]] officialy anounces that, in order to keep [[SHA-1 Image Segment Overflow|SHAtter]] undisclosed and possibly preserve it for 5th generation devices, [[Greenpois0n (jailbreak)|greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
*October 9 -- In order to push [[Chronic Dev (team)|Chronic Dev Team]] to change the exploit used on [[Greenpois0n (jailbreak)|greenpois0n]], [[User:geohot|geohot]] rushed out a beta version of [[limera1n]].&lt;br /&gt;
*October 8 -- [[User:Geohot|Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHA-1 Image Segment Overflow|SHAtter]], but, since [[Greenpois0n (jailbreak)|greenpois0n]] is already scheduled to October 10, it may be not possible. [[User:Geohot|Geohot]] ETA'd his [[limera1n]] release to October 11, if [[Greenpois0n (jailbreak)|greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHA-1 Image Segment Overflow|SHAtter]] itself and the one used by [[limera1n]], which is unpatchable by firmware updates.&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[Greenpois0n (jailbreak)|greenpois0n]] as October 10, featuring the new [[SHA-1 Image Segment Overflow|SHAtter]] exploit for devices with the [[S5L8930]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHA-1 Image Segment Overflow|SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[Bootrom 240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[Bootrom 240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[Bootrom 359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot (Bootloader)|iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[User:Posixninja|posixninja]], [[User:Pod2g|pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot (Bootloader)|iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[User:Pod2g|pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia Application|Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- iPhone-Elite Team releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases iJailBreak, the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[cmw]] (aka Niacin) and Dre release the LibTiff exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=25967</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=25967"/>
		<updated>2012-06-14T16:47:47Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: Added a few events in June&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Headline text ==&lt;br /&gt;
{{float toc}}&lt;br /&gt;
== 2012 ==&lt;br /&gt;
=== June ===&lt;br /&gt;
* June 14th-- [[iPhone Dev Team]] releases a developer version of [[redsn0w]] (0.9.13dev1), which jailbreaks [[limera1n]] susceptible devices running iOS 6 beta 1. This version doesn't hacktivate nor installs [[Cydia]], as it hasn't been ported to iOS 6 just yet. This jailbreak, however, installs afc2 and SSH, enabling developers to fix and prepare their apps to the next iOS version.&lt;br /&gt;
* June 11th-- [[WWDC]] 2012 starts. Apple opens the conference with a keynote revealing upgrades to Apple's notebook line-up, a new MacBook Pro line with Retina Display and Flash Storage, the 9th OS X major revision: Mountain Lion and iOS 6. iOS 6 beta 1 is seeded to iOS registered developers.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* May 25-- The [[Chronic Dev (team)|Chronic Dev Team]] releases [[Absinthe]] 2.0, providing an [[untethered jailbreak]] for all devices except the Apple TVs and [[k93aap|iPad 2 (Wi-Fi R2 model)]]. ([[Seas0nPass]] was also updated to include Absinthe's untether for the [[k66ap|Apple TV 2G]].)&lt;br /&gt;
* May 7-- Apple releases iOS 5.1.1.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* March 7 -- Apple releases iOS 5.1 and announces new devices: [[iPad 3]], [[J33ap|Apple TV 3G]], and the [[K93aap|iPad 2 (Wi-Fi R2 model)]].&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* January 20 -- [[Absinthe]] was released to jailbreak and untether the A5 devices running iOS 5.0 and 5.0.1.&lt;br /&gt;
* January 18 -- Apple announces [[iBooks.app|iBooks version 2.0]].&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* December 30 -- [[User:pod2g|pod2g]]'s untether for iOS 4.4.4 makes its way into a new version of [[Seas0nPass]] for [[k66ap|Apple TV 2G]] owners.&lt;br /&gt;
* December 27 -- [[User:pod2g|pod2g]]'s untether for iOS 5.0.1 is released in new versions of [[PwnageTool]] and [[redsn0w]], and as a Cydia package called [[Corona]] (by the [[Chronic Dev (team)|Chronic Dev Team]]) for devices already jailbroken on 5.0.1.&lt;br /&gt;
* December 15 -- Apple releases iOS 4.4.4 for the [[k66ap|Apple TV 2G]], as well as a minor update (5.0.1 build 9A406) for the [[n94ap|iPhone 4S]] to address SIM card issues.&lt;br /&gt;
* December 4 -- [[iFaith]] 1.4 is released, which can circumvent the APTicket [[nonce]] on devices vulnerable to [[limera1n]]'s exploit.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* November 9 -- iOS 5.0.1 is released in an attempt to fix battery-related issues.&lt;br /&gt;
=== October ===&lt;br /&gt;
* October 14 -- The [[n94ap|iPhone 4S]] is officially released, although some preorders were delivered early.&lt;br /&gt;
* October 12 -- [[iOS]] 5.0 is released.&lt;br /&gt;
* October 5 -- Steve Jobs passes away.&lt;br /&gt;
* October 4 -- Apple announces the new [[N94ap|iPhone 4S]].&lt;br /&gt;
=== September ===&lt;br /&gt;
* September 19 -- [[redsn0w]] 0.9.9 beta 1 is released, introducing a new UI and many features (like submitting SHSHs to the [[Cydia Server]].&lt;br /&gt;
* September 17 -- [[MyGreatFest]], first iCommunity and jailbreak centered convention was held.&lt;br /&gt;
=== July ===&lt;br /&gt;
*July 15 -- Apple releases iOS 4.2.9 and 4.3.4, patching all jailbreaking-related vulnerabilities (aside from those in the [[bootrom]]).&lt;br /&gt;
*July 6 -- [[User:Comex|comex]] releases [[Saffron]], the first public jailbreak for the [[iPad 2]].&lt;br /&gt;
*July 2 -- A beta version of the upcoming jailbreak from [[User:comex|comex]] for the [[iPad 2]], making use of a PDF exploit, was leaked. A hotfix by Apple is expected very soon.&lt;br /&gt;
=== June ===&lt;br /&gt;
*June 1 -- [[User:ih8sn0w|iH8sn0w]] releases [[iFaith]] to dump SHSH blobs from a device.&lt;br /&gt;
=== May ===&lt;br /&gt;
*May 6 -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for iOS 4.3.3 support (and in the case of sn0wbreeze, iOS 4.2.8 support as well).&lt;br /&gt;
*May 3 -- Apple releases iOS 4.2.8 and 4.3.3 to address the location-tracking controversy. Once more, current untethering vulnerabilities remained unpatched.&lt;br /&gt;
=== April ===&lt;br /&gt;
*April 24 -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for iOS 4.3.2 support (and in the case of sn0wbreeze, iOS 4.2.7 support as well).&lt;br /&gt;
*April 14 -- Apple releases iOS 4.2.7 and 4.3.2 to fix security issues and connection issues for [[K95ap|iPad 2 CDMA model]], but leaves untethering vulnerabilities unpatched.&lt;br /&gt;
*April 3 -- All major jailbreak tools ([[redsn0w]], [[PwnageTool]], [[sn0wbreeze]]) get updated to includes [[i0n1c]]'s untether code to jailbreak devices compatible with iOS 4.3.1 except the [[iPad 2]].&lt;br /&gt;
=== March ===&lt;br /&gt;
*March 25 -- Apple releases iOS 4.3.1, properly blocking [[User:comex|comex]]'s [[IOSurface Kernel Exploit|exploit]].&lt;br /&gt;
*March 13 -- [[User:Comex|comex]] shows a remotely jailbroken [[K95ap|iPad 2 CDMA]].&lt;br /&gt;
*March 11 -- Release of the [[iPad 2]] in the USA. The exploits for [[limera1n]] ([[User:Geohot|geohot]]), [[SHA-1 Image Segment Overflow|SHAtter]] ([[User:posixninja|p0sixninja]]), and [[comex]]'s [[kernel]] exploit were closed by Apple.&lt;br /&gt;
*March 9 -- Apple releases iOS 4.3, fixing the [[HFS Legacy Volume Name Stack Buffer Overflow]] vulnerability.&lt;br /&gt;
=== February ===&lt;br /&gt;
*February 15 -- New version of both [[PwnageTool]] and [[sn0wbreeze]] were released to support 4.2.1 and untethered using the [[feedface]] exploit.&lt;br /&gt;
*February 7 -- The [[Chronic Dev (team)|Chronic Dev Team]] release a version of [[greenpois0n (jailbreak)|greenpois0n]] to jailbreak the [[N92ap|iPhone 4 CDMA model]] using the [[HFS Legacy Volume Name Stack Buffer Overflow]].&lt;br /&gt;
*February 3 -- [[User:Jaywalker|Jaywalker]] of the [[Chronic Dev (team)|Chronic Dev Team]] posts [https://www.youtube.com/watch?v=T3NYPVT13xw a video] of custom boot using a soon to be released version of [[Greenpois0n (jailbreak)|greenpois0n]].&lt;br /&gt;
=== January ===&lt;br /&gt;
*January 12 -- Apple discontinues iOS support for [[N82ap|iPhone 3G]] and [[N72ap|iPod touch 2G]] since today's beta release of iOS 4.3. Also first time a beta iOS for [[K66ap|Apple TV 2G]] is released.&lt;br /&gt;
*January 11 -- Verizon announces [[N92ap|CDMA version of iPhone 4]].&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
*November 28 -- [[ultrasn0w]] 1.2 is released by the [[iPhone Dev Team]] to unlock [[N82ap|iPhone 3G]] and [[N88ap|iPhone 3GS]] on baseband 6.15.00&lt;br /&gt;
*November 22 -- Apple releases iOS 4.2.1 (respectively 4.2 for [[K66ap|Apple TV 2G]])&lt;br /&gt;
===October===&lt;br /&gt;
*October 31 -- The [[iPhone Dev Team|Dev Team]] releases [[redsn0w]] 0.9.6b2 which jailbreaks iOS 4.1, 4.2 and 3.2.2 on every device available at the time of release (except for iPT 2G MC). It also includes &amp;quot;DFU&amp;quot; button allowing to flash custom [[IPSW]] from Windows [http://blog.iphone-dev.org/post/1452044444/redsn0w-limera1n-fun (see blog post)].&lt;br /&gt;
*October 20 -- The [[iPhone Dev Team|Dev Team]] releases [[PwnageTool]] 4.1 which jailbreaks iOS 4.1 and 3.2.2 on every device  available at the time of release. [http://blog.iphone-dev.org/post/1359246784/20102010-event (see blog post)]&lt;br /&gt;
*October 18 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] RC4 which added support for iPod touch 2G (MC and MB) for an untethered jailbreak using [[User:comex|comex]]'s kernel exploit and the [[usb_control_msg(0xA1, 1) Exploit]].&lt;br /&gt;
*October 12 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] after switching its exploit from [[SHA-1 Image Segment Overflow|SHAtter]] to [[limera1n]], in the hope that [[SHA-1 Image Segment Overflow|SHAtter]] remains for 5th generation devices. (The exploit [[limera1n]] uses was fixed in the [[iBoot (Bootloader)|iBoot]] revision found in iOS 4.2 beta 2, which means Apple knows about the vulnerability and the next [[bootrom]] revision may have it patched.)&lt;br /&gt;
*October 10 -- Following the first [[limera1n]] beta release, [[User:geohot|geohot]] released multiple versions, each fixing bugs affecting previous releases. [[Chronic Dev (team)|Chronic Dev Team]] officialy anounces that, in order to keep [[SHA-1 Image Segment Overflow|SHAtter]] undisclosed and possibly preserve it for 5th generation devices, [[Greenpois0n (jailbreak)|greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
*October 9 -- In order to push [[Chronic Dev (team)|Chronic Dev Team]] to change the exploit used on [[Greenpois0n (jailbreak)|greenpois0n]], [[User:geohot|geohot]] rushed out a beta version of [[limera1n]].&lt;br /&gt;
*October 8 -- [[User:Geohot|Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHA-1 Image Segment Overflow|SHAtter]], but, since [[Greenpois0n (jailbreak)|greenpois0n]] is already scheduled to October 10, it may be not possible. [[User:Geohot|Geohot]] ETA'd his [[limera1n]] release to October 11, if [[Greenpois0n (jailbreak)|greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHA-1 Image Segment Overflow|SHAtter]] itself and the one used by [[limera1n]], which is unpatchable by firmware updates.&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[Greenpois0n (jailbreak)|greenpois0n]] as October 10, featuring the new [[SHA-1 Image Segment Overflow|SHAtter]] exploit for devices with the [[S5L8930]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHA-1 Image Segment Overflow|SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[Bootrom 240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[Bootrom 240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[Bootrom 359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot (Bootloader)|iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[User:Posixninja|posixninja]], [[User:Pod2g|pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot (Bootloader)|iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[User:Pod2g|pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia Application|Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- iPhone-Elite Team releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases iJailBreak, the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[cmw]] (aka Niacin) and Dre release the LibTiff exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Jailbreak&amp;diff=25783</id>
		<title>Talk:Jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Jailbreak&amp;diff=25783"/>
		<updated>2012-05-31T19:30:09Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Error ==&lt;br /&gt;
Actually, I believe redsn0w (normal version) still loads a 2.1.1 iBoot &amp;amp; uses the arm7_go exploit to bootstrap the ramdisk that flashes the NOR, including an LLB with the 24kpwn exploit. Can someone confirm this? --[[User:Cool name|Cool name]] 01:33, 27 July 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== [[limera1n]]/[[greenpois0n]] ==&lt;br /&gt;
We should really try to get a name for the exploit or find a way to add it to exploits used post 2.0 --[[User:JacobVengeance|JakeAnthraX]] 05:13, 30 October 2010 (UTC)&lt;br /&gt;
:Apparenttly, limera1n uses SHAtter as it is unmatchable.  Also google it --[[User:Balloonhead66|Balloonhead66]] 05:15, 30 October 2010 (UTC)&lt;br /&gt;
:: SHAtter was not used and was saved. This is the iPhone wiki, usually people come here before googling and after all it should be here. --[[User:JacobVengeance|JakeAnthraX]] 05:20, 30 October 2010 (UTC)&lt;br /&gt;
:::the exploit is used differently on both jailbreaks on [[limera1n]] it creates a command called geohot then reboots to recovery mode and boots a [[ramdisk]] however on [[Greenpois0n (jailbreak)|greenpois0n]] it injects [[IBSS]] and then uses the exploit to inject a pwnd [[IBEC]] in the description of shatter it did say it rebooted --[[User:Liamchat|liamchat]] 11:31, 30 October 2010 (UTC)&lt;br /&gt;
::[SHAtter] was saved, [greenpois0n] uses the same exploit as [limera1n]. Also can someone stem the flow of crap coming from liamchat? It's getting annoying now. --[[User:GreySyntax|GreySyntax]] 11:45, 30 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Exploits which are used in order to jailbreak 2.x?&amp;quot; ==&lt;br /&gt;
The exploits used for jailbreaking iOS 1.x are broken down by firmware version. I'd like to accomplish the same thing for the 2.0 and onward section, since it's formatted much differently. But then I thought to myself, &amp;quot;This is going to be a huge revision that may receive sharp criticism. Let me make a talk page entry for this.&amp;quot; So that's what I did…&lt;br /&gt;
:So, in other words, would it be fine if the &amp;quot;Exploits which are used in order to jailbreak 2.0+&amp;quot; section was changed to something similar to the &amp;quot;Exploits which are used in order to jailbreak 1.x&amp;quot; section? --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 02:16, 11 July 2011 (UTC)&lt;br /&gt;
::Sounds like a good idea to me. Wouldn't it be easier to also separate them by major revisions? Like have a 2.X section, a 3.X section, a 4.X section, and soon to be 5.X? --[[User:JacobVengeance|JakeAnthraX]] 02:27, 11 July 2011 (UTC)&lt;br /&gt;
:::Of course! I was planning to do that, too. :P --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 02:31, 11 July 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 4.3.5 / 4.2.10 ==&lt;br /&gt;
I've changed references to 0.9.8b3 to 0.9.8b7 for 4.3.5 tethered jailbreaks (see latest iPhone Dev rs iOS5beta posting). Should the Main Page be changed to reflect that an official jailbreak is available? Or will this only be changed on release of an untethered exploit being made available? Also fixed an error in which a reference to 0.9.6rc18 was existent with a question mark. Now changed to the accurate version of rs beta that needs to be used for 4.3.4 on that device. I've left 0.9.8b3 for 4.3.4 simply because that was the first release supporting it. Hope this is okay. [[User:Windows Helpdesk|blackthund3r]] 04:57, 31 August 2011 (MDT)&lt;br /&gt;
:Actually it should list the lowest and highest version number that supports the listed firmware version, not just the latest. That's why all other pre 4.3.3 versions for redsn0w have ranges. -- [[User:Http|http]] 00:57, 1 September 2011 (MDT)&lt;br /&gt;
&lt;br /&gt;
== 3GS separation ==&lt;br /&gt;
From a jailbreak point of view, the 3GS with old and new bootrom are totally different devices. Can we separate that into two tables? -- [[User:Http|http]] 12:48, 14 December 2011 (MST)&lt;br /&gt;
&lt;br /&gt;
== 5.x PwnageTool bundles ==&lt;br /&gt;
The list says there are PwnageTool custom bundles for 5.0 for iPad and iPhone 4 (GSM) available. Is that correct? -- [[User:Http|http]] 05:06, 19 December 2011 (MST)&lt;br /&gt;
:see pwnbundles.com --[[User:Zmaster|Zmaster]] 06:45, 19 December 2011 (MST)&lt;br /&gt;
::That site doesn't list any bundle for iOS 5.0, while this page says iOS 5.0 can be jailbroken with PwnageTool and a custom bundle. Is this just meant theoretical or what? -- [[User:Http|http]] 10:32, 19 December 2011 (MST)&lt;br /&gt;
&lt;br /&gt;
== Clutter ==&lt;br /&gt;
Some of the tables (notably the iPhone 3GS section) are beginning to appear crammed. I think we could break up the tables a little more, based on firmware versions, to alleviate this issue. Thoughts? --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 18:51, 28 December 2011 (MST)&lt;br /&gt;
:What about dropping the table all together:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;== [[m68ap|iPhone]] ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 * [[Heavenly 1A543a (iPhone)|1.0.0]]&lt;br /&gt;
 ** [[iBrickr]]&lt;br /&gt;
 *** Untethered: 0.5-0.91&lt;br /&gt;
:or&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;== [[m68ap|iPhone]] ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 * [[Heavenly 1A543a (iPhone)|1.0.0]]&lt;br /&gt;
 ** [[iBrickr]] (Untethered): 0.5-0.91&lt;br /&gt;
:--[[User:balloonhead66|Cole Johnson]] 19:00, 28 December 2011 (MST)&lt;br /&gt;
::Sounds good to me. Unless somebody wants tables, I'll switch over to this proposed format sometime around the weekend. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 21:08, 28 December 2011 (MST)&lt;br /&gt;
:::There is one more that I would like better: the first option but list all versions:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;== [[m68ap|iPhone]] ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 * [[Heavenly 1A543a (iPhone)|1.0.0]]&lt;br /&gt;
 ** [[iBrickr]]&lt;br /&gt;
 *** 0.5 (Untethered)&lt;br /&gt;
 *** 0.6 (Untethered)&lt;br /&gt;
 ...&lt;br /&gt;
:::Its a bigger job, but it is better IMO --[[User:balloonhead66|Cole Johnson]] 22:42, 28 December 2011 (MST)&lt;br /&gt;
:::One more (the tools area is listed like list option three, but w/o the link. The link is on the second column. The &amp;quot;5.0.1&amp;quot; can be like &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;==== 5.0.1 ====&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;): [[:File:JB Option.png]] --[[User:balloonhead66|Cole Johnson]] 22:47, 28 December 2011 (MST)&lt;br /&gt;
::::I do like the tables and I don't see a big need to change anything (except updating). A list won't bring much advantage and just increase page size. But the last proposed version of Balloonhead, a table that lists all tools in their versions for each firmware (still per device) wouldn't be bad if you want to change something. Please see also my request above about separating devices for old/new bootrom. --[[User:Http|http]] 02:59, 29 December 2011 (MST)&lt;br /&gt;
:::::It will make it vertical instead of horizontal (which is better) and it would allow someone to link to the firmware version with the ToC if we make the version number a header (see above comment). I can do it later today. --[[User:balloonhead66|Cole Johnson]] 12:01, 29 December 2011 (MST)&lt;br /&gt;
:::::I would actually like to see the new table format on [[Firmware]] and [[Beta Firmware]] --[[User:balloonhead66|Cole Johnson]] 16:08, 29 December 2011 (MST)&lt;br /&gt;
&lt;br /&gt;
== Absinthe ==&lt;br /&gt;
For all entries of Absinthe it is stated that Absinthe 2.0/2.0.1 jailbreaks iOS 5.0.1, however Absinthe 2.0.* jailbreaks only 5.1.1.&lt;br /&gt;
In order to jailbreak 5.0.1, one must use Absinthe 0.4. The official website states this cleary and keeps both 0.4 and 2.0.* available. I'll refrain from making this edit myself because I am not that friendly of wiki-like tables and might break something else :D&lt;br /&gt;
--[[User:Luxiel|Luxiel]] 06:16, 30 May 2012 (MDT)&lt;br /&gt;
:You're absolutely right. To edit the tables, feel free to try. There's a preview button; that way you can't break anything. If nobody updates this soon, I'll edit it. Thanks for reporting. --[[User:Http|http]] 13:45, 30 May 2012 (MDT)&lt;br /&gt;
:My bad… I kinda went by what I saw inside Absinthe.app. I'll work on changing the tables accordingly. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 15:11, 30 May 2012 (MDT)&lt;br /&gt;
::…OK, I just tried it out twice, and Absinthe 2.0.4 was able to successfully jailbreak my iPod touch 4G on iOS 5.0.1. It may be that Absinthe 0.4 is more recommended for jailbreaking iOS 5.0.1 (albeit only on the iPad 2 and iPhone 4S), but 2.0.4 seems to be perfectly capable of jailbreaking 5.0.1 and 5.1.1. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 16:18, 30 May 2012 (MDT)&lt;br /&gt;
:::I didn't actually try to jailbreak a 5.0.1 with the new versions, as Chronic Team states on the Absinthe.exe that it jailbreakes 5.1.1 and the website points us to use 0.4 for 5.0.1, but if it works, it works :D --[[User:Luxiel|Luxiel]] 13:30, 31 May 2012 (MDT)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Jailbreak&amp;diff=25764</id>
		<title>Talk:Jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Jailbreak&amp;diff=25764"/>
		<updated>2012-05-30T12:16:20Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Error ==&lt;br /&gt;
Actually, I believe redsn0w (normal version) still loads a 2.1.1 iBoot &amp;amp; uses the arm7_go exploit to bootstrap the ramdisk that flashes the NOR, including an LLB with the 24kpwn exploit. Can someone confirm this? --[[User:Cool name|Cool name]] 01:33, 27 July 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== [[limera1n]]/[[greenpois0n]] ==&lt;br /&gt;
We should really try to get a name for the exploit or find a way to add it to exploits used post 2.0 --[[User:JacobVengeance|JakeAnthraX]] 05:13, 30 October 2010 (UTC)&lt;br /&gt;
:Apparenttly, limera1n uses SHAtter as it is unmatchable.  Also google it --[[User:Balloonhead66|Balloonhead66]] 05:15, 30 October 2010 (UTC)&lt;br /&gt;
:: SHAtter was not used and was saved. This is the iPhone wiki, usually people come here before googling and after all it should be here. --[[User:JacobVengeance|JakeAnthraX]] 05:20, 30 October 2010 (UTC)&lt;br /&gt;
:::the exploit is used differently on both jailbreaks on [[limera1n]] it creates a command called geohot then reboots to recovery mode and boots a [[ramdisk]] however on [[Greenpois0n (jailbreak)|greenpois0n]] it injects [[IBSS]] and then uses the exploit to inject a pwnd [[IBEC]] in the description of shatter it did say it rebooted --[[User:Liamchat|liamchat]] 11:31, 30 October 2010 (UTC)&lt;br /&gt;
::[SHAtter] was saved, [greenpois0n] uses the same exploit as [limera1n]. Also can someone stem the flow of crap coming from liamchat? It's getting annoying now. --[[User:GreySyntax|GreySyntax]] 11:45, 30 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Exploits which are used in order to jailbreak 2.x?&amp;quot; ==&lt;br /&gt;
The exploits used for jailbreaking iOS 1.x are broken down by firmware version. I'd like to accomplish the same thing for the 2.0 and onward section, since it's formatted much differently. But then I thought to myself, &amp;quot;This is going to be a huge revision that may receive sharp criticism. Let me make a talk page entry for this.&amp;quot; So that's what I did…&lt;br /&gt;
:So, in other words, would it be fine if the &amp;quot;Exploits which are used in order to jailbreak 2.0+&amp;quot; section was changed to something similar to the &amp;quot;Exploits which are used in order to jailbreak 1.x&amp;quot; section? --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 02:16, 11 July 2011 (UTC)&lt;br /&gt;
::Sounds like a good idea to me. Wouldn't it be easier to also separate them by major revisions? Like have a 2.X section, a 3.X section, a 4.X section, and soon to be 5.X? --[[User:JacobVengeance|JakeAnthraX]] 02:27, 11 July 2011 (UTC)&lt;br /&gt;
:::Of course! I was planning to do that, too. :P --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 02:31, 11 July 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 4.3.5 / 4.2.10 ==&lt;br /&gt;
I've changed references to 0.9.8b3 to 0.9.8b7 for 4.3.5 tethered jailbreaks (see latest iPhone Dev rs iOS5beta posting). Should the Main Page be changed to reflect that an official jailbreak is available? Or will this only be changed on release of an untethered exploit being made available? Also fixed an error in which a reference to 0.9.6rc18 was existent with a question mark. Now changed to the accurate version of rs beta that needs to be used for 4.3.4 on that device. I've left 0.9.8b3 for 4.3.4 simply because that was the first release supporting it. Hope this is okay. [[User:Windows Helpdesk|blackthund3r]] 04:57, 31 August 2011 (MDT)&lt;br /&gt;
:Actually it should list the lowest and highest version number that supports the listed firmware version, not just the latest. That's why all other pre 4.3.3 versions for redsn0w have ranges. -- [[User:Http|http]] 00:57, 1 September 2011 (MDT)&lt;br /&gt;
&lt;br /&gt;
== 3GS separation ==&lt;br /&gt;
From a jailbreak point of view, the 3GS with old and new bootrom are totally different devices. Can we separate that into two tables? -- [[User:Http|http]] 12:48, 14 December 2011 (MST)&lt;br /&gt;
&lt;br /&gt;
== 5.x PwnageTool bundles ==&lt;br /&gt;
The list says there are PwnageTool custom bundles for 5.0 for iPad and iPhone 4 (GSM) available. Is that correct? -- [[User:Http|http]] 05:06, 19 December 2011 (MST)&lt;br /&gt;
:see pwnbundles.com --[[User:Zmaster|Zmaster]] 06:45, 19 December 2011 (MST)&lt;br /&gt;
::That site doesn't list any bundle for iOS 5.0, while this page says iOS 5.0 can be jailbroken with PwnageTool and a custom bundle. Is this just meant theoretical or what? -- [[User:Http|http]] 10:32, 19 December 2011 (MST)&lt;br /&gt;
&lt;br /&gt;
== Clutter ==&lt;br /&gt;
Some of the tables (notably the iPhone 3GS section) are beginning to appear crammed. I think we could break up the tables a little more, based on firmware versions, to alleviate this issue. Thoughts? --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 18:51, 28 December 2011 (MST)&lt;br /&gt;
:What about dropping the table all together:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;== [[m68ap|iPhone]] ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 * [[Heavenly 1A543a (iPhone)|1.0.0]]&lt;br /&gt;
 ** [[iBrickr]]&lt;br /&gt;
 *** Untethered: 0.5-0.91&lt;br /&gt;
:or&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;== [[m68ap|iPhone]] ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 * [[Heavenly 1A543a (iPhone)|1.0.0]]&lt;br /&gt;
 ** [[iBrickr]] (Untethered): 0.5-0.91&lt;br /&gt;
:--[[User:balloonhead66|Cole Johnson]] 19:00, 28 December 2011 (MST)&lt;br /&gt;
::Sounds good to me. Unless somebody wants tables, I'll switch over to this proposed format sometime around the weekend. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 21:08, 28 December 2011 (MST)&lt;br /&gt;
:::There is one more that I would like better: the first option but list all versions:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;== [[m68ap|iPhone]] ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 * [[Heavenly 1A543a (iPhone)|1.0.0]]&lt;br /&gt;
 ** [[iBrickr]]&lt;br /&gt;
 *** 0.5 (Untethered)&lt;br /&gt;
 *** 0.6 (Untethered)&lt;br /&gt;
 ...&lt;br /&gt;
:::Its a bigger job, but it is better IMO --[[User:balloonhead66|Cole Johnson]] 22:42, 28 December 2011 (MST)&lt;br /&gt;
:::One more (the tools area is listed like list option three, but w/o the link. The link is on the second column. The &amp;quot;5.0.1&amp;quot; can be like &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;==== 5.0.1 ====&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;): [[:File:JB Option.png]] --[[User:balloonhead66|Cole Johnson]] 22:47, 28 December 2011 (MST)&lt;br /&gt;
::::I do like the tables and I don't see a big need to change anything (except updating). A list won't bring much advantage and just increase page size. But the last proposed version of Balloonhead, a table that lists all tools in their versions for each firmware (still per device) wouldn't be bad if you want to change something. Please see also my request above about separating devices for old/new bootrom. --[[User:Http|http]] 02:59, 29 December 2011 (MST)&lt;br /&gt;
:::::It will make it vertical instead of horizontal (which is better) and it would allow someone to link to the firmware version with the ToC if we make the version number a header (see above comment). I can do it later today. --[[User:balloonhead66|Cole Johnson]] 12:01, 29 December 2011 (MST)&lt;br /&gt;
:::::I would actually like to see the new table format on [[Firmware]] and [[Beta Firmware]] --[[User:balloonhead66|Cole Johnson]] 16:08, 29 December 2011 (MST)&lt;br /&gt;
&lt;br /&gt;
== Absinthe ==&lt;br /&gt;
For all entries of Absinthe it is stated that Absinthe 2.0/2.0.1 jailbreaks iOS 5.0.1, however Absinthe 2.0.* jailbreaks only 5.1.1.&lt;br /&gt;
In order to jailbreak 5.0.1, one must use Absinthe 0.4. The official website states this cleary and keeps both 0.4 and 2.0.* available. I'll refrain from making this edit myself because I am not that friendly of wiki-like tables and might break something else :D&lt;br /&gt;
--[[User:Luxiel|Luxiel]] 06:16, 30 May 2012 (MDT)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Luxiel&amp;diff=25550</id>
		<title>User:Luxiel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Luxiel&amp;diff=25550"/>
		<updated>2012-05-03T16:59:14Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I know nothing about developing for iOS or MacOSX, but I owned a 3GS and now own a 4S and always keep myself updated with firmwares, jailbreaks and news from the scene. As I gather info I might edit the almost forgotten wiki pages that might need some update.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Main_Page&amp;diff=25538</id>
		<title>Talk:Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Main_Page&amp;diff=25538"/>
		<updated>2012-05-02T14:28:54Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Talk Archive|2010|2011|2012}}&lt;br /&gt;
&lt;br /&gt;
== [[iPhone Tracker]] ==&lt;br /&gt;
[[iPhone Tracker]]? --[[User:5urd|5urd]] 11:34, 9 September 2011 (MDT)&lt;br /&gt;
&lt;br /&gt;
== Apple TV 3 ==&lt;br /&gt;
As I am told, it is Apple TV 3G. Just because the blogs use &amp;quot;iPod Touch 4,&amp;quot; that doesnt mean we use that. --[[User:5urd|5urd]] 17:30, 7 March 2012 (MST)&lt;br /&gt;
&lt;br /&gt;
== Firmware ==&lt;br /&gt;
How is iOS 5.1 for iPhone 3GS Jailbreakable untethered for old bootrom and tethered for new bootrom when the holes were patched(from what I understand) and on the main page it shows there is no jailbreak for everything else. I'm confused here. {{unsigned|Staycool72|8 March 2012, 0:43 GMT}}&lt;br /&gt;
:I am going to try and answer though it is hard to tell what you are asking by your grammar. Those are bootrom exploits, which cannot be patched by any firmware update. There isn't a jailbreak available though, they have to update the programs like redsn0w to work with the new version of iOS. Once it is updated the jailbreak will be untethered for old bootroms and tethered for the new ones (excluding 4S and iPads since there isn't any bootrom exploits for those). Modern jailbreaks require userland exploits to be untethered, but iOS 5.1 patched the vulnerabilities we have been using to get untethered. Hope that helps. --[[User:Jacob|Jacob]] 18:09, 7 March 2012 (MST)&lt;br /&gt;
::Correct the vulnerabilities for iOS 5.1 are patched so therefor on the firmware page iOS 5.1 for iPhone 3GS should say no for (Can it be jailbroken? (old bootrom and new bootrom) and not yes, that it why I am confused because the main page says no --[[User:Staycool72|Staycool72]] 20:30, 7 March 2012 (EST)&lt;br /&gt;
:::iOS 5.1 can be jailbroken on the iPhone 3GS, but at the time of writing this, there are no tools that support jailbreaking iOS 5.1. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 18:34, 7 March 2012 (MST)&lt;br /&gt;
::::ok it answers my question. --Staycool72 20:49, 7 March 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
== Brazilian Carriers and Cellular Devices ==&lt;br /&gt;
Wanted to let you people know that all Cellular devices sold in Brazil must be factory-unlocked according to a federal law. This should be added to the main page, as it already states the same about GSM iPads in everywhere but Japan. Cellular devices sold in Brazil must be factory-unlocked or the supplier must provide an official unlock if the user demands so.&lt;br /&gt;
[[User:Luxiel|Luxiel]] 06:55, 24 April 2012 (MDT)&lt;br /&gt;
:I'm against this. Japan is the other way round, an exception. Many countries now sell unlocked devices. Anybody else? --[[User:Http|http]] 16:15, 24 April 2012 (MDT)&lt;br /&gt;
::I'll have to say no to this also. Cellular iPads are sold unlocked in every country except Japan (and maybe a few others that we don't know of). --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 16:56, 24 April 2012 (MDT)&lt;br /&gt;
:::My bad, I think I mistook the real reason behind that information being stated... Thanks for the answers. --[[User:Luxiel|Luxiel]] 08:28, 2 May 2012 (MDT)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Main_Page&amp;diff=25496</id>
		<title>Talk:Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Main_Page&amp;diff=25496"/>
		<updated>2012-04-24T12:55:46Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Talk Archive|2010|2011|2012}}&lt;br /&gt;
&lt;br /&gt;
== [[iPhone Tracker]] ==&lt;br /&gt;
[[iPhone Tracker]]? --[[User:5urd|5urd]] 11:34, 9 September 2011 (MDT)&lt;br /&gt;
&lt;br /&gt;
== Apple TV 3 ==&lt;br /&gt;
As I am told, it is Apple TV 3G. Just because the blogs use &amp;quot;iPod Touch 4,&amp;quot; that doesnt mean we use that. --[[User:5urd|5urd]] 17:30, 7 March 2012 (MST)&lt;br /&gt;
&lt;br /&gt;
== Firmware ==&lt;br /&gt;
How is iOS 5.1 for iPhone 3GS Jailbreakable untethered for old bootrom and tethered for new bootrom when the holes were patched(from what I understand) and on the main page it shows there is no jailbreak for everything else. I'm confused here. {{unsigned|Staycool72|8 March 2012, 0:43 GMT}}&lt;br /&gt;
:I am going to try and answer though it is hard to tell what you are asking by your grammar. Those are bootrom exploits, which cannot be patched by any firmware update. There isn't a jailbreak available though, they have to update the programs like redsn0w to work with the new version of iOS. Once it is updated the jailbreak will be untethered for old bootroms and tethered for the new ones (excluding 4S and iPads since there isn't any bootrom exploits for those). Modern jailbreaks require userland exploits to be untethered, but iOS 5.1 patched the vulnerabilities we have been using to get untethered. Hope that helps. --[[User:Jacob|Jacob]] 18:09, 7 March 2012 (MST)&lt;br /&gt;
::Correct the vulnerabilities for iOS 5.1 are patched so therefor on the firmware page iOS 5.1 for iPhone 3GS should say no for (Can it be jailbroken? (old bootrom and new bootrom) and not yes, that it why I am confused because the main page says no --[[User:Staycool72|Staycool72]] 20:30, 7 March 2012 (EST)&lt;br /&gt;
:::iOS 5.1 can be jailbroken on the iPhone 3GS, but at the time of writing this, there are no tools that support jailbreaking iOS 5.1. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 18:34, 7 March 2012 (MST)&lt;br /&gt;
::::ok it answers my question. --Staycool72 20:49, 7 March 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
== Brazilian Carriers and Cellular Devices ==&lt;br /&gt;
Wanted to let you people know that all Cellular devices sold in Brazil must be factory-unlocked according to a federal law. This should be added to the main page, as it already states the same about GSM iPads in everywhere but Japan. Cellular devices sold in Brazil must be factory-unlocked or the supplier must provide an official unlock if the user demands so.&lt;br /&gt;
[[User:Luxiel|Luxiel]] 06:55, 24 April 2012 (MDT)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:ChronicDev&amp;diff=13458</id>
		<title>User:ChronicDev</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:ChronicDev&amp;diff=13458"/>
		<updated>2010-11-23T01:22:32Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{DISPLAYTITLE:chronic}}&lt;br /&gt;
See also [[Chronic Dev (team)|The Chronic Dev Team]]. This is about the user chronic, not the team.&lt;br /&gt;
&lt;br /&gt;
Will Strafach (chronic, chronicdev, cdevwill) is a hacker and developer.&lt;br /&gt;
&lt;br /&gt;
[http://www.twitter.com/chronic chronic on Twitter]&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=11572</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=11572"/>
		<updated>2010-10-28T19:13:25Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* October */ Correcting a little misinformation of mine&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 20 -- The [[iPhone Dev Team|Dev Team]] releases [[PwnageTool]] 4.1 which jailbreaks iOS 4.1 and 3.2.2 on every device  available at the time of release. [http://blog.iphone-dev.org/post/1359246784/20102010-event (see blog post)]&lt;br /&gt;
*October 18 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[greenpois0n]] RC4 which added support for iPod touch 2G (MC and MB) for an untethered jailbreak using [[User:comex|comex]]'s kernel exploit and the [[usb_control_msg(0xA1, 1) Exploit]].&lt;br /&gt;
*October 12 -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[greenpois0n]] after switching its exploit from SHAtter to the exploit [[limera1n]] uses. By doing this, SHAtter remains undisclosed, meaning there is a chance that the 5th generation devices are vulnerable. (The exploit [[limera1n]] uses appears to be fixed in the [[iBoot]] revision found in iOS 4.2 beta 2, which means Apple probably knows about the vulnerability and the next [[bootrom]] revision may have it patched.)&lt;br /&gt;
*October 10 -- Following the first [[limera1n]] beta release, [[User:geohot|geohot]] released multiple versions, each fixing bugs affecting previous releases. [[Chronic Dev (team)|Chronic Dev Team]] officialy anounces that, in order to keep SHAtter undisclosed and possibly preserve it for 5th generation devices, [[greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
*October 9 -- In order to push [[Chronic Dev (team)|Chronic Dev Team]] to change the exploit used on [[greenpois0n]], [[User:geohot|geohot]] rushed out a beta version of [[limera1n]].&lt;br /&gt;
*October 8 -- [[User:Geohot|Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of SHAtter, but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[User:Geohot|Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: SHAtter itself and the one used by [[limera1n]], which is unpatchable by firmware updates.&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new SHAtter exploit for devices with the [[S5L8930]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via SHAtter.&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via SHAtter.&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of SHAtter is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia Application|Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- iPhone-Elite Team releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases iJailBreak, the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases touchFree, the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- niacin, [[cmw]], and dre release the LibTiff exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10942</id>
		<title>Talk:Limera1n</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10942"/>
		<updated>2010-10-21T19:56:16Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* hacktivation.dylib */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Drop size on image == &lt;br /&gt;
Has anyone else noticed that on the picture, the lime raindrop us bigger than the rest of them? Could be nothing but could also mean that [[User:Geohot|geohot]] has worked out SHAtter and use it on the three A4 devices that are there and just used the photos app for the [[N88ap|3GS]].&lt;br /&gt;
Also (if it's real) why is [[User:geohot|geohot's]]  exploit not used and keep SHAtter for when there are more A4 devices around? --[[User:Shengis14|Shengis14]] 07:16, 9 October 2010 (UTC)&lt;br /&gt;
:I did see that and assume it's just the same image everywhere, but on retina display it's just smaller due to higher resolution. --[[User:Http|http]] 09:00, 9 October 2010 (UTC)&lt;br /&gt;
::I also saw that and would ask you to look at the image again. iPod Touch 4g and iPhone 4, both retina, have smaller... This could be because [[geohot]] has a problem with the program as he didn't create a @2x.png image... I believe this is a true jailbreK. [[User:Balloonhead66|Balloonhead66]] 13:57, 9 October 2010 (UTC)&lt;br /&gt;
:::In the dump, I found the lime drop and it is a 320x480 image. Therfore, when you jailbreak a retina device with a 320x480 it shrinks the image because there is no lime@2x.png file...&lt;br /&gt;
&lt;br /&gt;
== Misc. ==&lt;br /&gt;
I think some more info may be needed. What is some background on it? I thought Limera1n was a fake from the 3.x days? --[[User:OMEGA RAZER|OMEGA RAZER]] 22:09, 8 October 2010 (UTC&lt;br /&gt;
:It was never fake see [http://theiphonewiki.com/limera1n http://theiphonewiki.com/limera1n] (a cached copy). --[[User:GreySyntax|GreySyntax]] 22:45, 8 October 2010 (UTC)&lt;br /&gt;
::Thanks for the clarification. Not sure where I heard that. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:09, 8 October 2010 (UTC)&lt;br /&gt;
Geohot made the web page when 3.1.3 come out but he said it used a bootrom exploit for untetherdness that he was saving for the iPhone 4 --[[User:Liamchat|liamchat]] 22:53, 8 October 2010 (UTC)&lt;br /&gt;
Anything else we should mention? :P --[[User:Dra1nerdrake|dra1nerdrake]] 23:14, 8 October 2010 (UTC)&lt;br /&gt;
:Why the insane secrecy of it? I'm not deep in the scene but this is the first I'm hearing more than the name lol. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:18, 8 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Release ==&lt;br /&gt;
&lt;br /&gt;
I thought geohot had no plans to release it... [[User:Balloonhead66|Balloonhead66]] 23:22, 8 October 2010 (UTC)&lt;br /&gt;
:Correct. Read the controversy section of this page. It should answer as to why the sudden change in heart. ~Drake&lt;br /&gt;
&lt;br /&gt;
== SIGN YOUR COMMENTS ON THE TALK PAGE ==&lt;br /&gt;
Please press the button on top of the exit box or type &amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt; manually. This will give you the basic signature. It's also acceptable to just identify yourself. Just make sure we know who you are. ;P ~Drake&lt;br /&gt;
&lt;br /&gt;
== Latest edit to [[Limera1n]] ==&lt;br /&gt;
&lt;br /&gt;
How does it look like a tethered? -- Balloonhead66|23:34, October 8, 2010 (UTC)&lt;br /&gt;
:They're all plugged in with USB cables. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:35, 8 October 2010 (UTC)&lt;br /&gt;
::They could just be charging and he is in  the photos app -- Balloonhead66|23:41, October 8, 2010 (UTC)&lt;br /&gt;
:::I think it's because they need to be plugged in for the ramdisk to be uploaded (hence the logo). --[[User:Palz|Palz]] 21:15, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Who is John Galt? ==&lt;br /&gt;
&lt;br /&gt;
Look at the HTML source of the page. Is this comment new? [[User:Angelo|Angelo]] 23:42, 8 October 2010 (UTC)&lt;br /&gt;
:Yep. I've looked at the source of this page before and after this update. The John Galt is probably meant to throw us off. Geohot does that. :P But, yes, it's new. ~Drake&lt;br /&gt;
::Where did you see that? [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::Type in Firefox URL bar: view-source:http://limera1n.com/ [[User:Angelo|Angelo]] 23:47, 8 October 2010 (UTC)&lt;br /&gt;
::::Or google chrome for that matter :D .  Anyway, I thought you meant the source of this page or the [[Limera1n]] page, not the website... *stupid* Thanks for explaining that! [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::::[http://en.wikipedia.org/wiki/John_Galt Who is John Galt] Kind of funny actually when you read it and what's going on right now --[[User:alpineflip|alpineflip]]&lt;br /&gt;
:::::: yes I see why &amp;quot;learns that all of the stories have an element of truth to them.&amp;quot; maybe it will ra1n again but not today --[[User:Liamchat|liamchat]] 00:35, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Explanation ==&lt;br /&gt;
&lt;br /&gt;
So, I'm sure most, if not all, of you are confused. This Limera1n is nothing more than a plot by geohot to get the chronic dev team to incorporate the exploit used in limera1n into greenpois0n. This is not plausible because the exploit in limera1n is a bootrom level exploit, which can be used to make a jailbreak (albeit [[tethered]]) on its own. To make greenpois0n untethered, chronic dev has used a tweak by comex (in userland) to patch the kernel. The exploit in Limera1n can be used at a later date to make another untethered jailbreak, but it's better to leave the lower level exploits until later, after all, either way, it produces the same affect. To implement the limera1n exploit into greenpois0n, they'd have to rewrite the entire jailbreak, which would offset the release. This should clear up confusion. ~Drake&lt;br /&gt;
&lt;br /&gt;
I reckon it was the iphone dev teams fault if they just had to release spirit after the iphone 4 was released there would be no drama because the ipod touch 4 would hav been jailbroken via star. --[[User:Robinhood|robinhood]] &lt;br /&gt;
&lt;br /&gt;
I think Geohot told someone about his exploit and apple attempted to patch it in a4 bootrom [http://mobile.twitter.com/musclenerd/status/26801617164] --[[User:Liamchat|liamchat]] 01:54, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
===UPDATE:===&lt;br /&gt;
A [http://twitter.com/#!/p0sixninja/status/26799962302 recent tweet] from iPhone hacker p0sixninja has just confirmed that the date WILL NOT be changed. If they can implement geohot's exploit before 10/10, they will use that. If they can't they won't. --[[User:Dra1nerdrake|dra1nerdrake]] 00:53, 9 October 2010 (UTC)&lt;br /&gt;
: This has nothing to-do with Limera1n. -- [[User:Shorty|Shorty]] 01:06, 9 October 2010 (UTC)&lt;br /&gt;
::It does. If they can integrate it into GP then there's not going to be a Limera1n. If they can't in time then there will be two jailbreaks released... --[[User:OMEGA RAZER|OMEGA RAZER]] 01:11, 9 October 2010 (UTC)&lt;br /&gt;
::: This is a grand waste of a bootrom exploit though. ~Drake&lt;br /&gt;
:::: Geohot will not waste the exploit's used in limera1n but greenpois0n is using a bootrom exploit to inject a userland exploit that is odd --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
:::::Yes it does limera1n will use an untetherd bootrom and iboot exploit but Why does Geohot not want us to use comex's kernel patch just for 4.1 then when 4.2 is out we can use shatter to reuse the iboot exploit --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
::::::@[[User:Dra1nerdrake|dra1nerdrake]] - Sorry if I didn't make myself more clear, I was basically on about the first part, not the last bit. -- [[User:Shorty|Shorty]] 01:25, 9 October 2010 (UTC)&lt;br /&gt;
the exploit used by [[limera1n]] is a [[24kPwn]] like [[bootrom]] exploit and a [[IBoot]] exploit  ( read the second to last paragraph [http://posixninja.blogspot.com/2010/06/latest-progress-and-new-updates.html] ) --[[User:Liamchat|liamchat]] 12:55, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Image Taken Down ==&lt;br /&gt;
&lt;br /&gt;
I'm just speculating here. With all this controversy, I am on the edge of believing... Also, the image was taken down from the site... It gives you a bitly link that takes you back to the bitty link... --[[User:Balloonhead66|Balloonhead66]] 14:20, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It is now very real [[greenpois0n]] will be cancelled (said by [[MuscleNerd]] [http://twitter.com/MuscleNerd/status/26860163077 Twitter Status]) and [[Limera1n]] will be used to jailbreak on 4.1 but [[wikipedia:Apple Inc.|Apple]] knows about both exploit's but [[Geohot]]'s has already being patched (patched in 4.2 beta 2 iboot [http://twitter.com/MuscleNerd/status/26860634891]) --[[User:Liamchat|liamchat]] 19:21, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::The exploit has not been patched though, but because of the code similarities geohot can tell his exploit will be patched anyway by iPad2,1 so he wants it to be used instead of wasted, greenpois0n and SHAtter should be kept as they will affect a larger crowd of iOS devices (assuming apple continue to use the A4 chip. --[[User:Shengis14|Shengis14]] 19:36, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::[[Geohot]]'s exploit will be used in [[greenpois0n]] if it can be utilised in time. Otherwise both exploits will be burned. In relation to the image being taken down, it was proving to be too popular, so imageshack moved it. --[[User:Mushroom|Mushroom]]  19:47, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I dont think so we said a lot about [[SHAtter]] (if apple patch one of the three BSS+Heap+Stack the exploit wont work) so it may be to late to protect [[SHAtter]] but [[Geohot]]'s exploit was fixed in [[iBoot]] so [[wikipedia:Apple Inc.|Apple]] knows 100% what his exploit is --[[User:Liamchat|liamchat]] 20:06, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== He did it==&lt;br /&gt;
It's in the wild. Thoughts? ~Drake&lt;br /&gt;
:It's just BETA2 though... --[[User:Balloonhead66|Balloonhead66]] 22:28, 9 October 2010 (UTC)&lt;br /&gt;
::Has anyone being able to grab information about the exploit we need to delete shatter and name the new dfu exploit --[[User:Liamchat|liamchat]] 23:22, 9 October 2010 (UTC)&lt;br /&gt;
:::BETA2 naming means nothing. We need to delete SHAtter? Wtf? And also this exploit will either be named by Geohot or by it's technical name (like Environment Variable Overflow). [[User:Iemit737|Iemit737]] 00:03, 10 October 2010 (UTC)&lt;br /&gt;
::::I'd like to disassemble this and see what's in that exe of his. Anyone take a gander into this magical land of software yet? The payload's bound to be in there somewhere. ~Drake&lt;br /&gt;
:::::A dump has been released by ih8sn0w, see links. So much for the protection he put on it. It uses the ramdisk from purplera1n ( lulz). You'll need IDA Pro... [[User:Pwnd-v1|Pwnd-v1]] 13:12, 10 October 2010 (UTC)&lt;br /&gt;
::::::Blackra1n uses purpled1sk too :/ All it is is an exploit like arm7_go in DFU that pwns iBoot (temporarily) and applies a userland jailbreak from a ramdisk. --[[User:Palz|Palz]] 22:16, 15 October 2010 (UTC)&lt;br /&gt;
the exploit ( it is a heap overflow ) is used to create a command called geohot ( in the [[NOR_%28NVRAM%29]] same as in [[Purplera1n]] ) maybe purpled1sk is the best for the job [[iBoot]] cannot be changed it will remove [[SHSH]] preventing the device from booting  --[[User:Liamchat|liamchat]] 22:32, 15 October 2010 (UTC)&lt;br /&gt;
:do u hear urself talk? the bootrom exploit in limera1n is not a heap overflow. -__- the heap overflow is the userland exploit used to achieve an untethered status.[[User:Leobruh|Leobruh]] 20:20, 19 October 2010 (UTC)!&lt;br /&gt;
The kernel patch ocurs after the lime logo is shown ( when a ramdisk is mounted ) after the ramdisk is sent you can disconnect the device --[[User:Liamchat|liamchat]] 21:23, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwnage ==&lt;br /&gt;
&lt;br /&gt;
Does limera1n flash the NOR? I never managed to install a custom firmware after using limera1n.--[[User talk:Ryccardo|Ryccardo]], 11 October 2010 (UTC)&lt;br /&gt;
:Sign your posts, please. And, limera1n leaves your NOR untouched. All it does is patch the kernel (which is on your NAND). Theoretically, one might be able to restore to a custom firmware by jumping to a pwned iBSS or iBEC through the limera1n exploit and using that to trick the device into accepting the firmware, but I'm probably mistaken. --[[User:Dra1nerdrake|dra1nerdrake]] 19:28, 11 October 2010 (UTC)&lt;br /&gt;
:It leaves the NOR un-touched otherwise the signature checks would fail during boot. Hence the kernel exploit from [[User:comex|comex]] is used to patch the kernel at runtime. --[[User:GreySyntax|GreySyntax]] 19:49, 11 October 2010 (UTC)&lt;br /&gt;
::Thanks, [[http://twitter.com/iH8sn0w/statuses/27065535774 iH8Sn0w confirms.]] Sorry for the signature, I always forget to use that button. --[[User:Ryccardo|Ryccardo]] 20:43, 11 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Support ==&lt;br /&gt;
&lt;br /&gt;
I propose that appleTV should be removed from the supported list until further notice as while the exploit interacts with the bootrom, the ramdisk never executes to jailbreak the OS and leaves you in recovery mode (yet to establish if it is in a pwned state or not) --[[User:Lilstevie|Lilstevie]] 07:29, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Why no ipt2g support? ==&lt;br /&gt;
&lt;br /&gt;
I have an ipt2g mc model. I currently have no 4.1 jailbreak, since sn0wbreeze is messed up and redsn0w hangs. Why doesn't this exploit work with the new bootrom touches? Have we been forgotten? --[[User:Palz|Palz]] 21:13, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It works for the ipt2g new bootrom, but geohot didn't take his time to remake anything so that it would work with our device. greenpois0n will support our devices, just takes a little while to write up everything needed. --[[User:JacobVengeance|JakeAnthraX]] 05:24, 13 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:IPT2G support is now in GreenPois0n --[[User:Fclinton|FClinton]] 23:39, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== hacktivation.dylib ==&lt;br /&gt;
&lt;br /&gt;
I added info about it and how to remove it for people who activate with iTunes. Hope no one minds. --[[User:Cmdshft|cmdshft]] 04:31, 13 October 2010 (UTC)&lt;br /&gt;
:I have my 3GS officially activated and had no problems at all with this dylib or anything else related to activation so far... I'm officially unlocked too... Should I still remove the dylib even if I had no problems?? --[[User:Luxiel|Luxiel]] 17:02, 19 October 2010 (UTC)&lt;br /&gt;
::Nevermind, i just followed that tutorial and end up fucking my 3GS, restoring it ATM... So, I will use greenpois0n once it is done... That tutorial just fucked my activation... thx for the one that posted it... --[[User:Luxiel|Luxiel]] 02:26, 21 October 2010 (UTC)&lt;br /&gt;
:::Just completing this history... I followed those commands with my officially activated 3GS and I had to clean restore and rejailbreak with limera1n... So I guess this &amp;quot;hacktivation may be harmfull&amp;quot; thing may be wrong... --[[User:Luxiel|Luxiel]] 19:56, 21 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwn4life ==&lt;br /&gt;
&lt;br /&gt;
Is this a pwned4life?  If it is, can a restore remove it?  --[[User:Balloonhead66|Balloonhead66]] 02:10, 15 October 2010 (UTC)&lt;br /&gt;
:A DFU Mode restore will return you to a fresh and all Apple state --[[User:OMEGA RAZER|OMEGA RAZER]] 04:20, 15 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Pwned4life isn't like permanent jailbreak on the device, just means there is an exploit that will always be there to allow jailbreaks. A restore will get rid of it simple. --[[User:JacobVengeance|JakeAnthraX]] 19:37, 19 October 2010 (UTC)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10941</id>
		<title>Talk:Limera1n</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10941"/>
		<updated>2010-10-21T19:54:39Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* hacktivation.dylib */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Drop size on image == &lt;br /&gt;
Has anyone else noticed that on the picture, the lime raindrop us bigger than the rest of them? Could be nothing but could also mean that [[User:Geohot|geohot]] has worked out SHAtter and use it on the three A4 devices that are there and just used the photos app for the [[N88ap|3GS]].&lt;br /&gt;
Also (if it's real) why is [[User:geohot|geohot's]]  exploit not used and keep SHAtter for when there are more A4 devices around? --[[User:Shengis14|Shengis14]] 07:16, 9 October 2010 (UTC)&lt;br /&gt;
:I did see that and assume it's just the same image everywhere, but on retina display it's just smaller due to higher resolution. --[[User:Http|http]] 09:00, 9 October 2010 (UTC)&lt;br /&gt;
::I also saw that and would ask you to look at the image again. iPod Touch 4g and iPhone 4, both retina, have smaller... This could be because [[geohot]] has a problem with the program as he didn't create a @2x.png image... I believe this is a true jailbreK. [[User:Balloonhead66|Balloonhead66]] 13:57, 9 October 2010 (UTC)&lt;br /&gt;
:::In the dump, I found the lime drop and it is a 320x480 image. Therfore, when you jailbreak a retina device with a 320x480 it shrinks the image because there is no lime@2x.png file...&lt;br /&gt;
&lt;br /&gt;
== Misc. ==&lt;br /&gt;
I think some more info may be needed. What is some background on it? I thought Limera1n was a fake from the 3.x days? --[[User:OMEGA RAZER|OMEGA RAZER]] 22:09, 8 October 2010 (UTC&lt;br /&gt;
:It was never fake see [http://theiphonewiki.com/limera1n http://theiphonewiki.com/limera1n] (a cached copy). --[[User:GreySyntax|GreySyntax]] 22:45, 8 October 2010 (UTC)&lt;br /&gt;
::Thanks for the clarification. Not sure where I heard that. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:09, 8 October 2010 (UTC)&lt;br /&gt;
Geohot made the web page when 3.1.3 come out but he said it used a bootrom exploit for untetherdness that he was saving for the iPhone 4 --[[User:Liamchat|liamchat]] 22:53, 8 October 2010 (UTC)&lt;br /&gt;
Anything else we should mention? :P --[[User:Dra1nerdrake|dra1nerdrake]] 23:14, 8 October 2010 (UTC)&lt;br /&gt;
:Why the insane secrecy of it? I'm not deep in the scene but this is the first I'm hearing more than the name lol. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:18, 8 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Release ==&lt;br /&gt;
&lt;br /&gt;
I thought geohot had no plans to release it... [[User:Balloonhead66|Balloonhead66]] 23:22, 8 October 2010 (UTC)&lt;br /&gt;
:Correct. Read the controversy section of this page. It should answer as to why the sudden change in heart. ~Drake&lt;br /&gt;
&lt;br /&gt;
== SIGN YOUR COMMENTS ON THE TALK PAGE ==&lt;br /&gt;
Please press the button on top of the exit box or type &amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt; manually. This will give you the basic signature. It's also acceptable to just identify yourself. Just make sure we know who you are. ;P ~Drake&lt;br /&gt;
&lt;br /&gt;
== Latest edit to [[Limera1n]] ==&lt;br /&gt;
&lt;br /&gt;
How does it look like a tethered? -- Balloonhead66|23:34, October 8, 2010 (UTC)&lt;br /&gt;
:They're all plugged in with USB cables. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:35, 8 October 2010 (UTC)&lt;br /&gt;
::They could just be charging and he is in  the photos app -- Balloonhead66|23:41, October 8, 2010 (UTC)&lt;br /&gt;
:::I think it's because they need to be plugged in for the ramdisk to be uploaded (hence the logo). --[[User:Palz|Palz]] 21:15, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Who is John Galt? ==&lt;br /&gt;
&lt;br /&gt;
Look at the HTML source of the page. Is this comment new? [[User:Angelo|Angelo]] 23:42, 8 October 2010 (UTC)&lt;br /&gt;
:Yep. I've looked at the source of this page before and after this update. The John Galt is probably meant to throw us off. Geohot does that. :P But, yes, it's new. ~Drake&lt;br /&gt;
::Where did you see that? [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::Type in Firefox URL bar: view-source:http://limera1n.com/ [[User:Angelo|Angelo]] 23:47, 8 October 2010 (UTC)&lt;br /&gt;
::::Or google chrome for that matter :D .  Anyway, I thought you meant the source of this page or the [[Limera1n]] page, not the website... *stupid* Thanks for explaining that! [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::::[http://en.wikipedia.org/wiki/John_Galt Who is John Galt] Kind of funny actually when you read it and what's going on right now --[[User:alpineflip|alpineflip]]&lt;br /&gt;
:::::: yes I see why &amp;quot;learns that all of the stories have an element of truth to them.&amp;quot; maybe it will ra1n again but not today --[[User:Liamchat|liamchat]] 00:35, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Explanation ==&lt;br /&gt;
&lt;br /&gt;
So, I'm sure most, if not all, of you are confused. This Limera1n is nothing more than a plot by geohot to get the chronic dev team to incorporate the exploit used in limera1n into greenpois0n. This is not plausible because the exploit in limera1n is a bootrom level exploit, which can be used to make a jailbreak (albeit [[tethered]]) on its own. To make greenpois0n untethered, chronic dev has used a tweak by comex (in userland) to patch the kernel. The exploit in Limera1n can be used at a later date to make another untethered jailbreak, but it's better to leave the lower level exploits until later, after all, either way, it produces the same affect. To implement the limera1n exploit into greenpois0n, they'd have to rewrite the entire jailbreak, which would offset the release. This should clear up confusion. ~Drake&lt;br /&gt;
&lt;br /&gt;
I reckon it was the iphone dev teams fault if they just had to release spirit after the iphone 4 was released there would be no drama because the ipod touch 4 would hav been jailbroken via star. --[[User:Robinhood|robinhood]] &lt;br /&gt;
&lt;br /&gt;
I think Geohot told someone about his exploit and apple attempted to patch it in a4 bootrom [http://mobile.twitter.com/musclenerd/status/26801617164] --[[User:Liamchat|liamchat]] 01:54, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
===UPDATE:===&lt;br /&gt;
A [http://twitter.com/#!/p0sixninja/status/26799962302 recent tweet] from iPhone hacker p0sixninja has just confirmed that the date WILL NOT be changed. If they can implement geohot's exploit before 10/10, they will use that. If they can't they won't. --[[User:Dra1nerdrake|dra1nerdrake]] 00:53, 9 October 2010 (UTC)&lt;br /&gt;
: This has nothing to-do with Limera1n. -- [[User:Shorty|Shorty]] 01:06, 9 October 2010 (UTC)&lt;br /&gt;
::It does. If they can integrate it into GP then there's not going to be a Limera1n. If they can't in time then there will be two jailbreaks released... --[[User:OMEGA RAZER|OMEGA RAZER]] 01:11, 9 October 2010 (UTC)&lt;br /&gt;
::: This is a grand waste of a bootrom exploit though. ~Drake&lt;br /&gt;
:::: Geohot will not waste the exploit's used in limera1n but greenpois0n is using a bootrom exploit to inject a userland exploit that is odd --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
:::::Yes it does limera1n will use an untetherd bootrom and iboot exploit but Why does Geohot not want us to use comex's kernel patch just for 4.1 then when 4.2 is out we can use shatter to reuse the iboot exploit --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
::::::@[[User:Dra1nerdrake|dra1nerdrake]] - Sorry if I didn't make myself more clear, I was basically on about the first part, not the last bit. -- [[User:Shorty|Shorty]] 01:25, 9 October 2010 (UTC)&lt;br /&gt;
the exploit used by [[limera1n]] is a [[24kPwn]] like [[bootrom]] exploit and a [[IBoot]] exploit  ( read the second to last paragraph [http://posixninja.blogspot.com/2010/06/latest-progress-and-new-updates.html] ) --[[User:Liamchat|liamchat]] 12:55, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Image Taken Down ==&lt;br /&gt;
&lt;br /&gt;
I'm just speculating here. With all this controversy, I am on the edge of believing... Also, the image was taken down from the site... It gives you a bitly link that takes you back to the bitty link... --[[User:Balloonhead66|Balloonhead66]] 14:20, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It is now very real [[greenpois0n]] will be cancelled (said by [[MuscleNerd]] [http://twitter.com/MuscleNerd/status/26860163077 Twitter Status]) and [[Limera1n]] will be used to jailbreak on 4.1 but [[wikipedia:Apple Inc.|Apple]] knows about both exploit's but [[Geohot]]'s has already being patched (patched in 4.2 beta 2 iboot [http://twitter.com/MuscleNerd/status/26860634891]) --[[User:Liamchat|liamchat]] 19:21, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::The exploit has not been patched though, but because of the code similarities geohot can tell his exploit will be patched anyway by iPad2,1 so he wants it to be used instead of wasted, greenpois0n and SHAtter should be kept as they will affect a larger crowd of iOS devices (assuming apple continue to use the A4 chip. --[[User:Shengis14|Shengis14]] 19:36, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::[[Geohot]]'s exploit will be used in [[greenpois0n]] if it can be utilised in time. Otherwise both exploits will be burned. In relation to the image being taken down, it was proving to be too popular, so imageshack moved it. --[[User:Mushroom|Mushroom]]  19:47, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I dont think so we said a lot about [[SHAtter]] (if apple patch one of the three BSS+Heap+Stack the exploit wont work) so it may be to late to protect [[SHAtter]] but [[Geohot]]'s exploit was fixed in [[iBoot]] so [[wikipedia:Apple Inc.|Apple]] knows 100% what his exploit is --[[User:Liamchat|liamchat]] 20:06, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== He did it==&lt;br /&gt;
It's in the wild. Thoughts? ~Drake&lt;br /&gt;
:It's just BETA2 though... --[[User:Balloonhead66|Balloonhead66]] 22:28, 9 October 2010 (UTC)&lt;br /&gt;
::Has anyone being able to grab information about the exploit we need to delete shatter and name the new dfu exploit --[[User:Liamchat|liamchat]] 23:22, 9 October 2010 (UTC)&lt;br /&gt;
:::BETA2 naming means nothing. We need to delete SHAtter? Wtf? And also this exploit will either be named by Geohot or by it's technical name (like Environment Variable Overflow). [[User:Iemit737|Iemit737]] 00:03, 10 October 2010 (UTC)&lt;br /&gt;
::::I'd like to disassemble this and see what's in that exe of his. Anyone take a gander into this magical land of software yet? The payload's bound to be in there somewhere. ~Drake&lt;br /&gt;
:::::A dump has been released by ih8sn0w, see links. So much for the protection he put on it. It uses the ramdisk from purplera1n ( lulz). You'll need IDA Pro... [[User:Pwnd-v1|Pwnd-v1]] 13:12, 10 October 2010 (UTC)&lt;br /&gt;
::::::Blackra1n uses purpled1sk too :/ All it is is an exploit like arm7_go in DFU that pwns iBoot (temporarily) and applies a userland jailbreak from a ramdisk. --[[User:Palz|Palz]] 22:16, 15 October 2010 (UTC)&lt;br /&gt;
the exploit ( it is a heap overflow ) is used to create a command called geohot ( in the [[NOR_%28NVRAM%29]] same as in [[Purplera1n]] ) maybe purpled1sk is the best for the job [[iBoot]] cannot be changed it will remove [[SHSH]] preventing the device from booting  --[[User:Liamchat|liamchat]] 22:32, 15 October 2010 (UTC)&lt;br /&gt;
:do u hear urself talk? the bootrom exploit in limera1n is not a heap overflow. -__- the heap overflow is the userland exploit used to achieve an untethered status.[[User:Leobruh|Leobruh]] 20:20, 19 October 2010 (UTC)!&lt;br /&gt;
The kernel patch ocurs after the lime logo is shown ( when a ramdisk is mounted ) after the ramdisk is sent you can disconnect the device --[[User:Liamchat|liamchat]] 21:23, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwnage ==&lt;br /&gt;
&lt;br /&gt;
Does limera1n flash the NOR? I never managed to install a custom firmware after using limera1n.--[[User talk:Ryccardo|Ryccardo]], 11 October 2010 (UTC)&lt;br /&gt;
:Sign your posts, please. And, limera1n leaves your NOR untouched. All it does is patch the kernel (which is on your NAND). Theoretically, one might be able to restore to a custom firmware by jumping to a pwned iBSS or iBEC through the limera1n exploit and using that to trick the device into accepting the firmware, but I'm probably mistaken. --[[User:Dra1nerdrake|dra1nerdrake]] 19:28, 11 October 2010 (UTC)&lt;br /&gt;
:It leaves the NOR un-touched otherwise the signature checks would fail during boot. Hence the kernel exploit from [[User:comex|comex]] is used to patch the kernel at runtime. --[[User:GreySyntax|GreySyntax]] 19:49, 11 October 2010 (UTC)&lt;br /&gt;
::Thanks, [[http://twitter.com/iH8sn0w/statuses/27065535774 iH8Sn0w confirms.]] Sorry for the signature, I always forget to use that button. --[[User:Ryccardo|Ryccardo]] 20:43, 11 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Support ==&lt;br /&gt;
&lt;br /&gt;
I propose that appleTV should be removed from the supported list until further notice as while the exploit interacts with the bootrom, the ramdisk never executes to jailbreak the OS and leaves you in recovery mode (yet to establish if it is in a pwned state or not) --[[User:Lilstevie|Lilstevie]] 07:29, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Why no ipt2g support? ==&lt;br /&gt;
&lt;br /&gt;
I have an ipt2g mc model. I currently have no 4.1 jailbreak, since sn0wbreeze is messed up and redsn0w hangs. Why doesn't this exploit work with the new bootrom touches? Have we been forgotten? --[[User:Palz|Palz]] 21:13, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It works for the ipt2g new bootrom, but geohot didn't take his time to remake anything so that it would work with our device. greenpois0n will support our devices, just takes a little while to write up everything needed. --[[User:JacobVengeance|JakeAnthraX]] 05:24, 13 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:IPT2G support is now in GreenPois0n --[[User:Fclinton|FClinton]] 23:39, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== hacktivation.dylib ==&lt;br /&gt;
&lt;br /&gt;
I added info about it and how to remove it for people who activate with iTunes. Hope no one minds. --[[User:Cmdshft|cmdshft]] 04:31, 13 October 2010 (UTC)&lt;br /&gt;
:I have my 3GS officially activated and had no problems at all with this dylib or anything else related to activation so far... I'm officially unlocked too... Should I still remove the dylib even if I had no problems?? --[[User:Luxiel|Luxiel]] 17:02, 19 October 2010 (UTC)&lt;br /&gt;
::Nevermind, i just followed that tutorial and end up fucking my 3GS, restoring it ATM... So, I will use greenpois0n once it is done... That tutorial just fucked my activation... thx for the one that posted it... --[[User:Luxiel|Luxiel]] 02:26, 21 October 2010 (UTC)&lt;br /&gt;
:::Just completing this history... I followed those commands with my officially activated 3GS and I had to clean restore and rejailbreak with limera1n... So I guess this &amp;quot;hacktivation may be harmfull&amp;quot; thing may be wrong...&lt;br /&gt;
&lt;br /&gt;
== Pwn4life ==&lt;br /&gt;
&lt;br /&gt;
Is this a pwned4life?  If it is, can a restore remove it?  --[[User:Balloonhead66|Balloonhead66]] 02:10, 15 October 2010 (UTC)&lt;br /&gt;
:A DFU Mode restore will return you to a fresh and all Apple state --[[User:OMEGA RAZER|OMEGA RAZER]] 04:20, 15 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Pwned4life isn't like permanent jailbreak on the device, just means there is an exploit that will always be there to allow jailbreaks. A restore will get rid of it simple. --[[User:JacobVengeance|JakeAnthraX]] 19:37, 19 October 2010 (UTC)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10906</id>
		<title>Talk:Limera1n</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10906"/>
		<updated>2010-10-21T02:26:48Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* hacktivation.dylib */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Drop size on image == &lt;br /&gt;
Has anyone else noticed that on the picture, the lime raindrop us bigger than the rest of them? Could be nothing but could also mean that [[User:Geohot|geohot]] has worked out SHAtter and use it on the three A4 devices that are there and just used the photos app for the [[N88ap|3GS]].&lt;br /&gt;
Also (if it's real) why is [[User:geohot|geohot's]]  exploit not used and keep SHAtter for when there are more A4 devices around? --[[User:Shengis14|Shengis14]] 07:16, 9 October 2010 (UTC)&lt;br /&gt;
:I did see that and assume it's just the same image everywhere, but on retina display it's just smaller due to higher resolution. --[[User:Http|http]] 09:00, 9 October 2010 (UTC)&lt;br /&gt;
::I also saw that and would ask you to look at the image again. iPod Touch 4g and iPhone 4, both retina, have smaller... This could be because [[geohot]] has a problem with the program as he didn't create a @2x.png image... I believe this is a true jailbreK. [[User:Balloonhead66|Balloonhead66]] 13:57, 9 October 2010 (UTC)&lt;br /&gt;
:::In the dump, I found the lime drop and it is a 320x480 image. Therfore, when you jailbreak a retina device with a 320x480 it shrinks the image because there is no lime@2x.png file...&lt;br /&gt;
&lt;br /&gt;
== Misc. ==&lt;br /&gt;
I think some more info may be needed. What is some background on it? I thought Limera1n was a fake from the 3.x days? --[[User:OMEGA RAZER|OMEGA RAZER]] 22:09, 8 October 2010 (UTC&lt;br /&gt;
:It was never fake see [http://theiphonewiki.com/limera1n http://theiphonewiki.com/limera1n] (a cached copy). --[[User:GreySyntax|GreySyntax]] 22:45, 8 October 2010 (UTC)&lt;br /&gt;
::Thanks for the clarification. Not sure where I heard that. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:09, 8 October 2010 (UTC)&lt;br /&gt;
Geohot made the web page when 3.1.3 come out but he said it used a bootrom exploit for untetherdness that he was saving for the iPhone 4 --[[User:Liamchat|liamchat]] 22:53, 8 October 2010 (UTC)&lt;br /&gt;
Anything else we should mention? :P --[[User:Dra1nerdrake|dra1nerdrake]] 23:14, 8 October 2010 (UTC)&lt;br /&gt;
:Why the insane secrecy of it? I'm not deep in the scene but this is the first I'm hearing more than the name lol. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:18, 8 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Release ==&lt;br /&gt;
&lt;br /&gt;
I thought geohot had no plans to release it... [[User:Balloonhead66|Balloonhead66]] 23:22, 8 October 2010 (UTC)&lt;br /&gt;
:Correct. Read the controversy section of this page. It should answer as to why the sudden change in heart. ~Drake&lt;br /&gt;
&lt;br /&gt;
== SIGN YOUR COMMENTS ON THE TALK PAGE ==&lt;br /&gt;
Please press the button on top of the exit box or type &amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt; manually. This will give you the basic signature. It's also acceptable to just identify yourself. Just make sure we know who you are. ;P ~Drake&lt;br /&gt;
&lt;br /&gt;
== Latest edit to [[Limera1n]] ==&lt;br /&gt;
&lt;br /&gt;
How does it look like a tethered? -- Balloonhead66|23:34, October 8, 2010 (UTC)&lt;br /&gt;
:They're all plugged in with USB cables. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:35, 8 October 2010 (UTC)&lt;br /&gt;
::They could just be charging and he is in  the photos app -- Balloonhead66|23:41, October 8, 2010 (UTC)&lt;br /&gt;
:::I think it's because they need to be plugged in for the ramdisk to be uploaded (hence the logo). --[[User:Palz|Palz]] 21:15, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Who is John Galt? ==&lt;br /&gt;
&lt;br /&gt;
Look at the HTML source of the page. Is this comment new? [[User:Angelo|Angelo]] 23:42, 8 October 2010 (UTC)&lt;br /&gt;
:Yep. I've looked at the source of this page before and after this update. The John Galt is probably meant to throw us off. Geohot does that. :P But, yes, it's new. ~Drake&lt;br /&gt;
::Where did you see that? [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::Type in Firefox URL bar: view-source:http://limera1n.com/ [[User:Angelo|Angelo]] 23:47, 8 October 2010 (UTC)&lt;br /&gt;
::::Or google chrome for that matter :D .  Anyway, I thought you meant the source of this page or the [[Limera1n]] page, not the website... *stupid* Thanks for explaining that! [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::::[http://en.wikipedia.org/wiki/John_Galt Who is John Galt] Kind of funny actually when you read it and what's going on right now --[[User:alpineflip|alpineflip]]&lt;br /&gt;
:::::: yes I see why &amp;quot;learns that all of the stories have an element of truth to them.&amp;quot; maybe it will ra1n again but not today --[[User:Liamchat|liamchat]] 00:35, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Explanation ==&lt;br /&gt;
&lt;br /&gt;
So, I'm sure most, if not all, of you are confused. This Limera1n is nothing more than a plot by geohot to get the chronic dev team to incorporate the exploit used in limera1n into greenpois0n. This is not plausible because the exploit in limera1n is a bootrom level exploit, which can be used to make a jailbreak (albeit [[tethered]]) on its own. To make greenpois0n untethered, chronic dev has used a tweak by comex (in userland) to patch the kernel. The exploit in Limera1n can be used at a later date to make another untethered jailbreak, but it's better to leave the lower level exploits until later, after all, either way, it produces the same affect. To implement the limera1n exploit into greenpois0n, they'd have to rewrite the entire jailbreak, which would offset the release. This should clear up confusion. ~Drake&lt;br /&gt;
&lt;br /&gt;
I reckon it was the iphone dev teams fault if they just had to release spirit after the iphone 4 was released there would be no drama because the ipod touch 4 would hav been jailbroken via star. --[[User:Robinhood|robinhood]] &lt;br /&gt;
&lt;br /&gt;
I think Geohot told someone about his exploit and apple attempted to patch it in a4 bootrom [http://mobile.twitter.com/musclenerd/status/26801617164] --[[User:Liamchat|liamchat]] 01:54, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
===UPDATE:===&lt;br /&gt;
A [http://twitter.com/#!/p0sixninja/status/26799962302 recent tweet] from iPhone hacker p0sixninja has just confirmed that the date WILL NOT be changed. If they can implement geohot's exploit before 10/10, they will use that. If they can't they won't. --[[User:Dra1nerdrake|dra1nerdrake]] 00:53, 9 October 2010 (UTC)&lt;br /&gt;
: This has nothing to-do with Limera1n. -- [[User:Shorty|Shorty]] 01:06, 9 October 2010 (UTC)&lt;br /&gt;
::It does. If they can integrate it into GP then there's not going to be a Limera1n. If they can't in time then there will be two jailbreaks released... --[[User:OMEGA RAZER|OMEGA RAZER]] 01:11, 9 October 2010 (UTC)&lt;br /&gt;
::: This is a grand waste of a bootrom exploit though. ~Drake&lt;br /&gt;
:::: Geohot will not waste the exploit's used in limera1n but greenpois0n is using a bootrom exploit to inject a userland exploit that is odd --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
:::::Yes it does limera1n will use an untetherd bootrom and iboot exploit but Why does Geohot not want us to use comex's kernel patch just for 4.1 then when 4.2 is out we can use shatter to reuse the iboot exploit --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
::::::@[[User:Dra1nerdrake|dra1nerdrake]] - Sorry if I didn't make myself more clear, I was basically on about the first part, not the last bit. -- [[User:Shorty|Shorty]] 01:25, 9 October 2010 (UTC)&lt;br /&gt;
the exploit used by [[limera1n]] is a [[24kPwn]] like [[bootrom]] exploit and a [[IBoot]] exploit  ( read the second to last paragraph [http://posixninja.blogspot.com/2010/06/latest-progress-and-new-updates.html] ) --[[User:Liamchat|liamchat]] 12:55, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Image Taken Down ==&lt;br /&gt;
&lt;br /&gt;
I'm just speculating here. With all this controversy, I am on the edge of believing... Also, the image was taken down from the site... It gives you a bitly link that takes you back to the bitty link... --[[User:Balloonhead66|Balloonhead66]] 14:20, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It is now very real [[greenpois0n]] will be cancelled (said by [[MuscleNerd]] [http://twitter.com/MuscleNerd/status/26860163077 Twitter Status]) and [[Limera1n]] will be used to jailbreak on 4.1 but [[wikipedia:Apple Inc.|Apple]] knows about both exploit's but [[Geohot]]'s has already being patched (patched in 4.2 beta 2 iboot [http://twitter.com/MuscleNerd/status/26860634891]) --[[User:Liamchat|liamchat]] 19:21, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::The exploit has not been patched though, but because of the code similarities geohot can tell his exploit will be patched anyway by iPad2,1 so he wants it to be used instead of wasted, greenpois0n and SHAtter should be kept as they will affect a larger crowd of iOS devices (assuming apple continue to use the A4 chip. --[[User:Shengis14|Shengis14]] 19:36, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::[[Geohot]]'s exploit will be used in [[greenpois0n]] if it can be utilised in time. Otherwise both exploits will be burned. In relation to the image being taken down, it was proving to be too popular, so imageshack moved it. --[[User:Mushroom|Mushroom]]  19:47, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I dont think so we said a lot about [[SHAtter]] (if apple patch one of the three BSS+Heap+Stack the exploit wont work) so it may be to late to protect [[SHAtter]] but [[Geohot]]'s exploit was fixed in [[iBoot]] so [[wikipedia:Apple Inc.|Apple]] knows 100% what his exploit is --[[User:Liamchat|liamchat]] 20:06, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== He did it==&lt;br /&gt;
It's in the wild. Thoughts? ~Drake&lt;br /&gt;
:It's just BETA2 though... --[[User:Balloonhead66|Balloonhead66]] 22:28, 9 October 2010 (UTC)&lt;br /&gt;
::Has anyone being able to grab information about the exploit we need to delete shatter and name the new dfu exploit --[[User:Liamchat|liamchat]] 23:22, 9 October 2010 (UTC)&lt;br /&gt;
:::BETA2 naming means nothing. We need to delete SHAtter? Wtf? And also this exploit will either be named by Geohot or by it's technical name (like Environment Variable Overflow). [[User:Iemit737|Iemit737]] 00:03, 10 October 2010 (UTC)&lt;br /&gt;
::::I'd like to disassemble this and see what's in that exe of his. Anyone take a gander into this magical land of software yet? The payload's bound to be in there somewhere. ~Drake&lt;br /&gt;
:::::A dump has been released by ih8sn0w, see links. So much for the protection he put on it. It uses the ramdisk from purplera1n ( lulz). You'll need IDA Pro... [[User:Pwnd-v1|Pwnd-v1]] 13:12, 10 October 2010 (UTC)&lt;br /&gt;
::::::Blackra1n uses purpled1sk too :/ All it is is an exploit like arm7_go in DFU that pwns iBoot (temporarily) and applies a userland jailbreak from a ramdisk. --[[User:Palz|Palz]] 22:16, 15 October 2010 (UTC)&lt;br /&gt;
the exploit ( it is a heap overflow ) is used to create a command called geohot ( in the [[NOR_%28NVRAM%29]] same as in [[Purplera1n]] ) maybe purpled1sk is the best for the job [[iBoot]] cannot be changed it will remove [[SHSH]] preventing the device from booting  --[[User:Liamchat|liamchat]] 22:32, 15 October 2010 (UTC)&lt;br /&gt;
:do u hear urself talk? the bootrom exploit in limera1n is not a heap overflow. -__- the heap overflow is the userland exploit used to achieve an untethered status.[[User:Leobruh|Leobruh]] 20:20, 19 October 2010 (UTC)!&lt;br /&gt;
The kernel patch ocurs after the lime logo is shown ( when a ramdisk is mounted ) after the ramdisk is sent you can disconnect the device --[[User:Liamchat|liamchat]] 21:23, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwnage ==&lt;br /&gt;
&lt;br /&gt;
Does limera1n flash the NOR? I never managed to install a custom firmware after using limera1n.--[[User talk:Ryccardo|Ryccardo]], 11 October 2010 (UTC)&lt;br /&gt;
:Sign your posts, please. And, limera1n leaves your NOR untouched. All it does is patch the kernel (which is on your NAND). Theoretically, one might be able to restore to a custom firmware by jumping to a pwned iBSS or iBEC through the limera1n exploit and using that to trick the device into accepting the firmware, but I'm probably mistaken. --[[User:Dra1nerdrake|dra1nerdrake]] 19:28, 11 October 2010 (UTC)&lt;br /&gt;
:It leaves the NOR un-touched otherwise the signature checks would fail during boot. Hence the kernel exploit from [[User:comex|comex]] is used to patch the kernel at runtime. --[[User:GreySyntax|GreySyntax]] 19:49, 11 October 2010 (UTC)&lt;br /&gt;
::Thanks, [[http://twitter.com/iH8sn0w/statuses/27065535774 iH8Sn0w confirms.]] Sorry for the signature, I always forget to use that button. --[[User:Ryccardo|Ryccardo]] 20:43, 11 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Support ==&lt;br /&gt;
&lt;br /&gt;
I propose that appleTV should be removed from the supported list until further notice as while the exploit interacts with the bootrom, the ramdisk never executes to jailbreak the OS and leaves you in recovery mode (yet to establish if it is in a pwned state or not) --[[User:Lilstevie|Lilstevie]] 07:29, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Why no ipt2g support? ==&lt;br /&gt;
&lt;br /&gt;
I have an ipt2g mc model. I currently have no 4.1 jailbreak, since sn0wbreeze is messed up and redsn0w hangs. Why doesn't this exploit work with the new bootrom touches? Have we been forgotten? --[[User:Palz|Palz]] 21:13, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It works for the ipt2g new bootrom, but geohot didn't take his time to remake anything so that it would work with our device. greenpois0n will support our devices, just takes a little while to write up everything needed. --[[User:JacobVengeance|JakeAnthraX]] 05:24, 13 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:IPT2G support is now in GreenPois0n --[[User:Fclinton|FClinton]] 23:39, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== hacktivation.dylib ==&lt;br /&gt;
&lt;br /&gt;
I added info about it and how to remove it for people who activate with iTunes. Hope no one minds. --[[User:Cmdshft|cmdshft]] 04:31, 13 October 2010 (UTC)&lt;br /&gt;
:I have my 3GS officially activated and had no problems at all with this dylib or anything else related to activation so far... I'm officially unlocked too... Should I still remove the dylib even if I had no problems?? --[[User:Luxiel|Luxiel]] 17:02, 19 October 2010 (UTC)&lt;br /&gt;
::Nevermind, i just followed that tutorial and end up fucking my 3GS, restoring it ATM... So, I will use greenpois0n once it is done... That tutorial just fucked my activation... thx for the one that posted it... --[[User:Luxiel|Luxiel]] 02:26, 21 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwn4life ==&lt;br /&gt;
&lt;br /&gt;
Is this a pwned4life?  If it is, can a restore remove it?  --[[User:Balloonhead66|Balloonhead66]] 02:10, 15 October 2010 (UTC)&lt;br /&gt;
:A DFU Mode restore will return you to a fresh and all Apple state --[[User:OMEGA RAZER|OMEGA RAZER]] 04:20, 15 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Pwned4life isn't like permanent jailbreak on the device, just means there is an exploit that will always be there to allow jailbreaks. A restore will get rid of it simple. --[[User:JacobVengeance|JakeAnthraX]] 19:37, 19 October 2010 (UTC)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10755</id>
		<title>Talk:Limera1n</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Limera1n&amp;diff=10755"/>
		<updated>2010-10-19T17:02:18Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* hacktivation.dylib */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Drop size on image == &lt;br /&gt;
Has anyone else noticed that on the picture, the lime raindrop us bigger than the rest of them? Could be nothing but could also mean that [[User:Geohot|geohot]] has worked out [[SHAtter]] and use it on the three A4 devices that are there and just used the photos app for the [[N88ap|3GS]].&lt;br /&gt;
Also (if it's real) why is [[User:Geohot|Geohots]]  exploit not used and keep [[SHAtter]] for when there are more A4 devices around? --[[User:Shengis14|Shengis14]] 07:16, 9 October 2010 (UTC)&lt;br /&gt;
:I did see that and assume it's just the same image everywhere, but on retina display it's just smaller due to higher resolution. --[[User:Http|http]] 09:00, 9 October 2010 (UTC)&lt;br /&gt;
::I also saw that and would ask you to look at the image again. iPod Touch 4g and iPhone 4, both retina, have smaller... This could be because [[geohot]] has a problem with the program as he didn't create a @2x.png image... I believe this is a true jailbreK. [[User:Balloonhead66|Balloonhead66]] 13:57, 9 October 2010 (UTC)&lt;br /&gt;
:::In the dump, I found the lime drop and it is a 320x480 image. Therfore, when you jailbreak a retina device with a 320x480 it shrinks the image because there is no lime@2x.png file...&lt;br /&gt;
&lt;br /&gt;
== Misc. ==&lt;br /&gt;
I think some more info may be needed. What is some background on it? I thought Limera1n was a fake from the 3.x days? --[[User:OMEGA RAZER|OMEGA RAZER]] 22:09, 8 October 2010 (UTC&lt;br /&gt;
:It was never fake see [http://theiphonewiki.com/limera1n http://theiphonewiki.com/limera1n] (a cached copy). --[[User:GreySyntax|GreySyntax]] 22:45, 8 October 2010 (UTC)&lt;br /&gt;
::Thanks for the clarification. Not sure where I heard that. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:09, 8 October 2010 (UTC)&lt;br /&gt;
Geohot made the web page when 3.1.3 come out but he said it used a bootrom exploit for untetherdness that he was saving for the iPhone 4 --[[User:Liamchat|liamchat]] 22:53, 8 October 2010 (UTC)&lt;br /&gt;
Anything else we should mention? :P --[[User:Dra1nerdrake|dra1nerdrake]] 23:14, 8 October 2010 (UTC)&lt;br /&gt;
:Why the insane secrecy of it? I'm not deep in the scene but this is the first I'm hearing more than the name lol. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:18, 8 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Release ==&lt;br /&gt;
&lt;br /&gt;
I thought geohot had no plans to release it... [[User:Balloonhead66|Balloonhead66]] 23:22, 8 October 2010 (UTC)&lt;br /&gt;
:Correct. Read the controversy section of this page. It should answer as to why the sudden change in heart. ~Drake&lt;br /&gt;
&lt;br /&gt;
== SIGN YOUR COMMENTS ON THE TALK PAGE ==&lt;br /&gt;
Please press the button on top of the exit box or type &amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt; manually. This will give you the basic signature. It's also acceptable to just identify yourself. Just make sure we know who you are. ;P ~Drake&lt;br /&gt;
&lt;br /&gt;
== Latest edit to [[Limera1n]] ==&lt;br /&gt;
&lt;br /&gt;
How does it look like a tethered? -- Balloonhead66|23:34, October 8, 2010 (UTC)&lt;br /&gt;
:They're all plugged in with USB cables. --[[User:OMEGA RAZER|OMEGA RAZER]] 23:35, 8 October 2010 (UTC)&lt;br /&gt;
::They could just be charging and he is in  the photos app -- Balloonhead66|23:41, October 8, 2010 (UTC)&lt;br /&gt;
:::I think it's because they need to be plugged in for the ramdisk to be uploaded (hence the logo). --[[User:Palz|Palz]] 21:15, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Who is John Galt? ==&lt;br /&gt;
&lt;br /&gt;
Look at the HTML source of the page. Is this comment new? [[User:Angelo|Angelo]] 23:42, 8 October 2010 (UTC)&lt;br /&gt;
:Yep. I've looked at the source of this page before and after this update. The John Galt is probably meant to throw us off. Geohot does that. :P But, yes, it's new. ~Drake&lt;br /&gt;
::Where did you see that? [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::Type in Firefox URL bar: view-source:http://limera1n.com/ [[User:Angelo|Angelo]] 23:47, 8 October 2010 (UTC)&lt;br /&gt;
::::Or google chrome for that matter :D .  Anyway, I thought you meant the source of this page or the [[Limera1n]] page, not the website... *stupid* Thanks for explaining that! [[User:Balloonhead66|Balloonhead66]] 23:50, 8 October 2010 (UTC)&lt;br /&gt;
:::::[http://en.wikipedia.org/wiki/John_Galt Who is John Galt] Kind of funny actually when you read it and what's going on right now --[[User:alpineflip|alpineflip]]&lt;br /&gt;
:::::: yes I see why &amp;quot;learns that all of the stories have an element of truth to them.&amp;quot; maybe it will ra1n again but not today --[[User:Liamchat|liamchat]] 00:35, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Explanation ==&lt;br /&gt;
&lt;br /&gt;
So, I'm sure most, if not all, of you are confused. This Limera1n is nothing more than a plot by geohot to get the chronic dev team to incorporate the exploit used in limera1n into greenpois0n. This is not plausible because the exploit in limera1n is a bootrom level exploit, which can be used to make a jailbreak (albeit [[tethered]]) on its own. To make greenpois0n untethered, chronic dev has used a tweak by comex (in userland) to patch the kernel. The exploit in Limera1n can be used at a later date to make another untethered jailbreak, but it's better to leave the lower level exploits until later, after all, either way, it produces the same affect. To implement the limera1n exploit into greenpois0n, they'd have to rewrite the entire jailbreak, which would offset the release. This should clear up confusion. ~Drake&lt;br /&gt;
&lt;br /&gt;
I reckon it was the iphone dev teams fault if they just had to release spirit after the iphone 4 was released there would be no drama because the ipod touch 4 would hav been jailbroken via star. --[[User:Robinhood|robinhood]] &lt;br /&gt;
&lt;br /&gt;
I think Geohot told someone about his exploit and apple attempted to patch it in a4 bootrom [http://mobile.twitter.com/musclenerd/status/26801617164] --[[User:Liamchat|liamchat]] 01:54, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
===UPDATE:===&lt;br /&gt;
A [http://twitter.com/#!/p0sixninja/status/26799962302 recent tweet] from iPhone hacker p0sixninja has just confirmed that the date WILL NOT be changed. If they can implement geohot's exploit before 10/10, they will use that. If they can't they won't. --[[User:Dra1nerdrake|dra1nerdrake]] 00:53, 9 October 2010 (UTC)&lt;br /&gt;
: This has nothing to-do with Limera1n. -- [[User:Shorty|Shorty]] 01:06, 9 October 2010 (UTC)&lt;br /&gt;
::It does. If they can integrate it into GP then there's not going to be a Limera1n. If they can't in time then there will be two jailbreaks released... --[[User:OMEGA RAZER|OMEGA RAZER]] 01:11, 9 October 2010 (UTC)&lt;br /&gt;
::: This is a grand waste of a bootrom exploit though. ~Drake&lt;br /&gt;
:::: Geohot will not waste the exploit's used in limera1n but greenpois0n is using a bootrom exploit to inject a userland exploit that is odd --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
:::::Yes it does limera1n will use an untetherd bootrom and iboot exploit but Why does Geohot not want us to use comex's kernel patch just for 4.1 then when 4.2 is out we can use shatter to reuse the iboot exploit --[[User:Liamchat|liamchat]] 01:20, 9 October 2010 (UTC)&lt;br /&gt;
::::::@[[User:Dra1nerdrake|dra1nerdrake]] - Sorry if I didn't make myself more clear, I was basically on about the first part, not the last bit. -- [[User:Shorty|Shorty]] 01:25, 9 October 2010 (UTC)&lt;br /&gt;
the exploit used by [[limera1n]] is a [[24kPwn]] like [[bootrom]] exploit and a [[IBoot]] exploit  ( read the second to last paragraph [http://posixninja.blogspot.com/2010/06/latest-progress-and-new-updates.html] ) --[[User:Liamchat|liamchat]] 12:55, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Image Taken Down ==&lt;br /&gt;
&lt;br /&gt;
I'm just speculating here. With all this controversy, I am on the edge of believing... Also, the image was taken down from the site... It gives you a bitly link that takes you back to the bitty link... --[[User:Balloonhead66|Balloonhead66]] 14:20, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It is now very real [[greenpois0n]] will be cancelled (said by [[MuscleNerd]] [http://twitter.com/MuscleNerd/status/26860163077 Twitter Status]) and [[Limera1n]] will be used to jailbreak on 4.1 but [[wikipedia:Apple Inc.|Apple]] knows about both exploit's but [[Geohot]]'s has already being patched (patched in 4.2 beta 2 iboot [http://twitter.com/MuscleNerd/status/26860634891]) --[[User:Liamchat|liamchat]] 19:21, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::The exploit has not been patched though, but because of the code similarities geohot can tell his exploit will be patched anyway by iPad2,1 so he wants it to be used instead of wasted, greenpois0n and SHAtter should be kept as they will affect a larger crowd of iOS devices (assuming apple continue to use the A4 chip. --[[User:Shengis14|Shengis14]] 19:36, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::[[Geohot]]'s exploit will be used in [[greenpois0n]] if it can be utilised in time. Otherwise both exploits will be burned. In relation to the image being taken down, it was proving to be too popular, so imageshack moved it. --[[User:Mushroom|Mushroom]]  19:47, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I dont think so we said a lot about [[SHAtter]] (if apple patch one of the three BSS+Heap+Stack the exploit wont work) so it may be to late to protect [[SHAtter]] but [[Geohot]]'s exploit was fixed in [[iBoot]] so [[wikipedia:Apple Inc.|Apple]] knows 100% what his exploit is --[[User:Liamchat|liamchat]] 20:06, 9 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== He did it==&lt;br /&gt;
It's in the wild. Thoughts? ~Drake&lt;br /&gt;
:It's just BETA2 though... --[[User:Balloonhead66|Balloonhead66]] 22:28, 9 October 2010 (UTC)&lt;br /&gt;
::Has anyone being able to grab information about the exploit we need to delete shatter and name the new dfu exploit --[[User:Liamchat|liamchat]] 23:22, 9 October 2010 (UTC)&lt;br /&gt;
:::BETA2 naming means nothing. We need to delete SHAtter? Wtf? And also this exploit will either be named by Geohot or by it's technical name (like Environment Variable Overflow). [[User:Iemit737|Iemit737]] 00:03, 10 October 2010 (UTC)&lt;br /&gt;
::::I'd like to disassemble this and see what's in that exe of his. Anyone take a gander into this magical land of software yet? The payload's bound to be in there somewhere. ~Drake&lt;br /&gt;
:::::A dump has been released by ih8sn0w, see links. So much for the protection he put on it. It uses the ramdisk from purplera1n ( lulz). You'll need IDA Pro... [[User:Pwnd-v1|Pwnd-v1]] 13:12, 10 October 2010 (UTC)&lt;br /&gt;
::::::Blackra1n uses purpled1sk too :/ All it is is an exploit like arm7_go in DFU that pwns iBoot (temporarily) and applies a userland jailbreak from a ramdisk. --[[User:Palz|Palz]] 22:16, 15 October 2010 (UTC)&lt;br /&gt;
the exploit ( it is a heap overflow ) is used to create a command called geohot ( in the [[NOR_%28NVRAM%29]] same as in [[Purplera1n]] ) maybe purpled1sk is the best for the job [[iBoot]] cannot be changed it will remove [[SHSH]] preventing the device from booting  --[[User:Liamchat|liamchat]] 22:32, 15 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwnage ==&lt;br /&gt;
&lt;br /&gt;
Does limera1n flash the NOR? I never managed to install a custom firmware after using limera1n.--[[User talk:Ryccardo|Ryccardo]], 11 October 2010 (UTC)&lt;br /&gt;
:Sign your posts, please. And, limera1n leaves your NOR untouched. All it does is patch the kernel (which is on your NAND). Theoretically, one might be able to restore to a custom firmware by jumping to a pwned iBSS or iBEC through the limera1n exploit and using that to trick the device into accepting the firmware, but I'm probably mistaken. --[[User:Dra1nerdrake|dra1nerdrake]] 19:28, 11 October 2010 (UTC)&lt;br /&gt;
:It leaves the NOR un-touched otherwise the signature checks would fail during boot. Hence the kernel exploit from [[User:comex|comex]] is used to patch the kernel at runtime. --[[User:GreySyntax|GreySyntax]] 19:49, 11 October 2010 (UTC)&lt;br /&gt;
::Thanks, [[http://twitter.com/iH8sn0w/statuses/27065535774 iH8Sn0w confirms.]] Sorry for the signature, I always forget to use that button. --[[User:Ryccardo|Ryccardo]] 20:43, 11 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Support ==&lt;br /&gt;
&lt;br /&gt;
I propose that appleTV should be removed from the supported list until further notice as while the exploit interacts with the bootrom, the ramdisk never executes to jailbreak the OS and leaves you in recovery mode (yet to establish if it is in a pwned state or not) --[[User:Lilstevie|Lilstevie]] 07:29, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Why no ipt2g support? ==&lt;br /&gt;
&lt;br /&gt;
I have an ipt2g mc model. I currently have no 4.1 jailbreak, since sn0wbreeze is messed up and redsn0w hangs. Why doesn't this exploit work with the new bootrom touches? Have we been forgotten? --[[User:Palz|Palz]] 21:13, 12 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
:It works for the ipt2g new bootrom, but geohot didn't take his time to remake anything so that it would work with our device. greenpois0n will support our devices, just takes a little while to write up everything needed. --[[User:JacobVengeance|JakeAnthraX]] 05:24, 13 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== hacktivation.dylib ==&lt;br /&gt;
&lt;br /&gt;
I added info about it and how to remove it for people who activate with iTunes. Hope no one minds. --[[User:Cmdshft|cmdshft]] 04:31, 13 October 2010 (UTC)&lt;br /&gt;
:I have my 3GS officially activated and had no problems at all with this dylib or anything else related to activation so far... I'm officially unlocked too... Should I still remove the dylib even if I had no problems?? --[[User:Luxiel|Luxiel]] 17:02, 19 October 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Pwn4life ==&lt;br /&gt;
&lt;br /&gt;
Is this a pwned4life?  If it is, can a restore remove it?  --[[User:Balloonhead66|Balloonhead66]] 02:10, 15 October 2010 (UTC)&lt;br /&gt;
:A DFU Mode restore will return you to a fresh and all Apple state --[[User:OMEGA RAZER|OMEGA RAZER]] 04:20, 15 October 2010 (UTC)&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10598</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10598"/>
		<updated>2010-10-16T03:03:31Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* October */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 12 -- [[Chronic_Dev_(team)|Chronic Dev Team]] releases [[greenpois0n]] after changing it's exploit to the one [[limera1n]] uses. By doing this, [[SHAtter]] is kept undisclosed, meaning there is a chance it may be found into 5th Gen devices, if Apple chooses to continue with the [[A4]] CPU. [[Limera1n]] exploit appears to be fixed as of iOS 4.2 beta 2, meaning that the next revision of [[A4]] processors may have it patched already. 3rd Gen and below will always be vulnerable to [[limera1n]]'s exploit.&lt;br /&gt;
&lt;br /&gt;
*October 10 -- Following the first [[limera1n]] BETA release, [[geohot]] released another 3 BETAs, fixing mistakes from the first version. [[Chronic_Dev_(team)|Chronic Dev Team]] officialy anounces that, in order to keep [[SHAtter]] undisclosed and, with that, keep a hope for a 5th Gen jailbreak, [[greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
&lt;br /&gt;
*October 9 -- In order to push [[Chronic_Dev_(team)|Chronic Dev Team]] to change the exploit used on [[greenpois0n]], [[Geohot]] released an unstable BETA version of [[limera1n]]. This BETA release is still buggy and uses an unstable version of the userland exploit made by [[comex]] to untether the [[jailbreak]] process. This version is said to cause problems with some devices and does NOT work on the iPhone 3GS with new bootrom.&lt;br /&gt;
&lt;br /&gt;
*October 8 -- [[Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHAtter]], but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHAtter]] itself and the one used by [[limera1n]], which is patchable and may be a universal one.&lt;br /&gt;
&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new [[SHAtter]] exploit for all [[A4]] processor devices.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10407</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10407"/>
		<updated>2010-10-11T03:40:38Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* October */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 10 -- Following the first [[limera1n]] BETA release, [[geohot]] released another 3 BETAs, fixing mistakes from the first version. [[Chronic_Dev_(team)|Chronic Dev Team]] officialy anounces that, in order to keep [[SHAtter]] undisclosed and, with that, keep a hope for a 5th Gen jailbreak, [[greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
&lt;br /&gt;
*October 9 -- In order to push [[Chronic_Dev_(team)|Chronic Dev Team]] to change the exploit used on [[greenpois0n]], [[Geohot]] released an unstable BETA version of [[limera1n]]. This BETA release is still buggy and uses an unstable version of the userland exploit made by [[comex]] to untether the [[jailbreak]] process. This version is said to cause problems with some devices and does NOT work on the iPhone 3GS with new bootrom.&lt;br /&gt;
&lt;br /&gt;
*October 8 -- [[Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHAtter]], but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHAtter]] itself and the one used by [[limera1n]], which is patchable and may be a universal one.&lt;br /&gt;
&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new [[SHAtter]] exploit for all [[A4]] processor devices.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10277</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10277"/>
		<updated>2010-10-09T21:57:05Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* October */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 9 -- In order to push [[Chronic_Dev_(team)|Chronic Dev Team]] to change the exploit used on [[greenpois0n]], [[Geohot]] released an unstable BETA version of [[limera1n]]. This BETA release is still buggy and uses an unstable version of the userland exploit made by [[comex]] to untether the [[jailbreak]] process. This version is said to cause problems with some devices and does NOT work on the iPhone 3GS with new bootrom.&lt;br /&gt;
&lt;br /&gt;
*October 8 -- [[Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHAtter]], but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHAtter]] itself and the one used by [[limera1n]], which is patchable and may be a universal one.&lt;br /&gt;
&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new [[SHAtter]] exploit for all [[A4]] processor devices.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10275</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10275"/>
		<updated>2010-10-09T21:44:53Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* October */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 9 -- In order to push [[Chronic_Dev_(team)|Chronic Dev Team]] to change the exploit used on [[greenpois0n]], [[Geohot]] released a unstable BETA version of [[limera1n]]. This BETA release is still buggy and uses a unstable version of the userland exploit made by [[comex]] to untether the [[jailbreak]] process. This version is said to cause problems with some devices and does NOT work on the iPhone 3GS with new bootrom.&lt;br /&gt;
&lt;br /&gt;
*October 8 -- [[Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHAtter]], but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHAtter]] itself and the one used by [[limera1n]], which is patchable and may be a universal one.&lt;br /&gt;
&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new [[SHAtter]] exploit for all [[A4]] processor devices.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Luxiel&amp;diff=10260</id>
		<title>User:Luxiel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Luxiel&amp;diff=10260"/>
		<updated>2010-10-09T19:04:42Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I know nothing about developing for iOS or MacOSX, but I own a 3GS and always keep myself updated with firmwares, jailbreaks and news from the scene. As I gather info I may edit the almost forgotten wiki pages which still need some update ^^.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Luxiel&amp;diff=10259</id>
		<title>User:Luxiel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Luxiel&amp;diff=10259"/>
		<updated>2010-10-09T19:04:23Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: New page: I know nothing about developing for iOS or MacOSX, but I own a 3GS and always keep myself updated with firmwares, jailbreaks and new from the scene. As I gather info I may edit the almost ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I know nothing about developing for iOS or MacOSX, but I own a 3GS and always keep myself updated with firmwares, jailbreaks and new from the scene. As I gather info I may edit the almost forgotten wiki pages which still need some update ^^.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10257</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=10257"/>
		<updated>2010-10-09T18:33:45Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* October */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===October===&lt;br /&gt;
*October 8 -- [[Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHAtter]], but, since [[greenpois0n]] is already scheduled to October 10, it may be not possible. [[Geohot]] ETA'd his [[limera1n]] release to October 11, if [[greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHAtter]] itself and the one used by [[limera1n]], which is patchable and may be a universal one.&lt;br /&gt;
&lt;br /&gt;
*October 6 -- Chronic Dev Team issues expected ETA of [[greenpois0n]] as October 10, featuring the new [[SHAtter]] exploit for all [[A4]] processor devices.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
*September 30 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66ap|Apple TV 2G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 27 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81ap|iPod touch 4G]] jailbroken via [[SHAtter]].&lt;br /&gt;
*September 20 -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
*September 9 -- The existence of [[SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
*September 8 -- Apple releases the [[N81ap|iPod touch 4G]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
*September 1 -- Apple event. They announced the new [[N81ap|iPod touch 4G]], [[K66ap|Apple TV 2G]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18ap|iPod touch 3G]], and [[N88ap|iPhone 3GS]] and [[N72ap|iPod touch 2G]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72ap|iPod touch 2G]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on iOS 2.2.1 by uploading [[iBoot]] from iOS 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for iOS 2.2 on [[N72ap|iPod touch 2G]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[2.28.00]].&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 24 -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3 for [[M68ap|iPhones]].&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[User:AriX|AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[N45ap|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=8252</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=8252"/>
		<updated>2010-08-12T18:31:36Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* August */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with iOS 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases iOS 3.2.1 and 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases iOS 4.0&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with iOS 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases iOS 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered]] jailbreak for the [[N18ap|iPod touch 3G]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Apple releases iOS 3.1/3.1.1 (7C144/7C145), closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running iOS 3.0&lt;br /&gt;
* June 17 -- Apple releases iOS 3.0.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72ap|iPod touch 2G]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released a [[redsn0w Lite]], a tethered jailbreak for the [[N72ap|iPod touch 2G]].  It combines the [[ARM7 Go]] vulnerability with the well-established Pwnage flow for other Apple mobile devices. It was bundled in a way that will allow usage on iOS 2.2.1 through uploading the [[ARM7 Go]] vulnerable 2.1.1 iBoot to the device while in [[DFU]] mode.&lt;br /&gt;
* January 29 -- Apple releases iOS 2.2.1, closing the [[AT+stkprof]] exploit&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, the [[AriX]] and the [[Chronic Dev (team)|chronic dev team]] got a ramdisk booting for a tethered jailbreak.&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] hole disclosed where else but here on The iPhone Wiki, for developers to poke and prod at&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [http://twitter.com/iphone_dev/status/1120595069 tweets the vfdecrypt key] for the [[N72ap|iPod touch 2G]] 2.2 firmware, demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband 02.28.00.&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases iOS 2.2.&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases iOS 2.1. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking iOS 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases iOS 1.1.5, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases iOS 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases iOS 1.1.4.&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[soft upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases iOS 1.1.3, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68ap|iPhone]]s, which initially had no [[unlock]].&lt;br /&gt;
* November 12 -- Apple releases iOS 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[Jailbreakme]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[planetbeing]] releases [[touchFree]], the first automated [[n45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[n45ap|iPod touch]], which is later adapted for use in [[Jailbreakme]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases iOS 1.1.1.&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[N45ap|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=8250</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=8250"/>
		<updated>2010-08-12T17:58:56Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* August */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===August===&lt;br /&gt;
*August 12 -- [[Saurik]] releases the first version of PDF Patcher, a tweak that actually installs Apple's patch for the malformed PDF files exploit (used by [[Star]]'s first payload) without updating the iOS. This makes updating to iOS 4.0.2 or iOS 3.2.2 completely useless for jailbreakers, since those versions were made only to patch that.&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]], patching the exploits [[Star]] uses. [[Ultrasn0w]]'s exploit remains, since there's no baseband update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with firmwares 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases 4.0.1 firmware&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases 4.0 firmware&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit_du_hack_2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with firmware 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases 3.1.3 firmware closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered]] jailbreak for the [[N18ap|iPod touch 3G]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Firmware 3.1/3.1.1 (7C144/7C145) Released to the Public. Firmware closes [[iBoot Environment Variable Overflow|iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls purplera1n.&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running firmware 3.0&lt;br /&gt;
* June 17 -- Release of firmware 3.0 to the public.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- The [[0x24000 Segment Overflow|untethered jailbreak]] for the [[N72ap|iPod touch 2G]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released a [[redsn0w Lite]], a tethered jailbreak for the [[N72ap|iPod touch 2G]].  It combines the [[ARM7 Go]] vulnerability with the well-established pwnage flow for other Apple mobile devices. It was bundled in a way that will allow usage on the 2.2.1 firmware through uploading the [[ARM7 Go]] vulnerable 2.1.1 iBoot to the device while in DFU mode.&lt;br /&gt;
* January 29 -- Apple releases 2.2.1 firmware, closing the [[AT+stkprof]] exploit&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, the [[AriX]] and the [[Chronic Dev (team)|chronic dev team]] got a ramdisk booting for a tethered jailbreak.&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] hole disclosed where else but here on The iPhone Wiki, for developers to poke and prod at&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [http://twitter.com/iphone_dev/status/1120595069 tweets the vfdecrypt key] for the [[N72ap|iPod touch 2G]] 2.2 firmware, demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband 02.28.00.&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases 2.2 firmware&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases 2.1 firmware. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking firmware 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases 1.1.5 firmware, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases 2.0 firmware and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases 1.1.4 firmware&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[soft upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases 1.1.3 firmware, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- New [[Baseband Bootloader|Baseband bootloader]] 4.6 comes out, new iPhones can't be unlocked.&lt;br /&gt;
* November 12 -- Apple releases 1.1.2 firmware, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[Jailbreakme]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[planetbeing]] releases [[touchFree]], the first automated [[n45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[n45ap|iPod touch]], which is later adapted for use in [[Jailbreakme]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases 1.1.1 firmware&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=8147</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=8147"/>
		<updated>2010-08-11T22:55:36Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2010==&lt;br /&gt;
===August===&lt;br /&gt;
*August 11 -- Apple releases iOS 4.0.2 for [[iPhone]]/[[iPod touch]] and iOS 3.2.2 for [[K48ap|iPad]], patching the exploits [[Star]] uses. [[Ultrasn0w]]'s exploit remains, since there's no baseband update on those versions.&lt;br /&gt;
*August 3 -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90ap|iPhone 4]].&lt;br /&gt;
*August 1 -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with firmwares 3.1.2 through 4.0.1.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
*July 30 -- [[N90ap|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
*July 26 -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
*July 15 -- Apple releases 4.0.1 firmware&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
*June 24 -- [[N90ap|iPhone 4]] is launched.&lt;br /&gt;
*June 22 -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer bootroms (some [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]] devices, and all [[N18ap|iPod touch 3G]] and newer devices).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to jailbreak 4.0 on [[N82ap|iPhone 3G]] and [[N72ap|iPhone touch 2G]] ([[iBoot-240.4|old bootrom]]).&lt;br /&gt;
*June 21 -- [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[4.26.08]], [[5.11.07]], [[5.12.01]], and [[5.13.04]].&lt;br /&gt;
*June 21 -- Apple releases 4.0 firmware&lt;br /&gt;
*June 19 -- [[User:Geohot|geohot]] holds a speech at the [[Nuit_du_hack_2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
===May===&lt;br /&gt;
*May 3 -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
*May 2 -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with firmware 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
*April 3 -- Apple releases the [[K48ap|iPad]].&lt;br /&gt;
&lt;br /&gt;
===Feb===&lt;br /&gt;
*Feb 12 -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
*Feb 2 -- Apple releases 3.1.3 firmware closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
===November===&lt;br /&gt;
*November 3 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[5.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
*October 11 -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered]] jailbreak for the [[N18ap|iPod touch 3G]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 24 -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* September 9 -- The [[N18ap|iPod touch 3G]] with [[S5L8922]] processor is released. [[N72ap|iPod touch 2G]] units continue shipping, but with [[iBoot-240.5.1|a new bootrom]]. [[N88ap|iPhone 3GS]] units also begin shipping with [[iBoot-359.3.2|a new bootrom]]. These are no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* Firmware 3.1/3.1.1 (7C144/7C145) Released to the Public. Firmware closes [[iBoot Environment Variable Overflow|iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 14 -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* July 7 -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88ap|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88ap|iPhone 3GS]].&lt;br /&gt;
* July 3 -- [[User:Geohot|geohot]] releases [[purplera1n]], a software jailbreak for the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 28 -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88ap|iPhone 3GS]].&lt;br /&gt;
* June 25 -- It's discovered that [[N88ap|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* June 24 -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* June 23 -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot]] he calls purplera1n.&lt;br /&gt;
* June 19 -- Release of [[N88ap|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running firmware 3.0&lt;br /&gt;
* June 17 -- Release of firmware 3.0 to the public.&lt;br /&gt;
* June 8 -- Apple announces the [[N88ap|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 10 -- The [[0x24000 Segment Overflow|untethered jailbreak]] for the [[N72ap|iPod touch 2G]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[posixninja]], [[pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 31 -- The [[iPhone Dev Team]] released a [[redsn0w Lite]], a tethered jailbreak for the [[N72ap|iPod touch 2G]].  It combines the [[ARM7 Go]] vulnerability with the well-established pwnage flow for other Apple mobile devices. It was bundled in a way that will allow usage on the 2.2.1 firmware through uploading the [[ARM7 Go]] vulnerable 2.1.1 iBoot to the device while in DFU mode.&lt;br /&gt;
* January 29 -- Apple releases 2.2.1 firmware, closing the [[AT+stkprof]] exploit&lt;br /&gt;
* January 25 -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, the [[AriX]] and the [[Chronic Dev (team)|chronic dev team]] got a ramdisk booting for a tethered jailbreak.&lt;br /&gt;
* January 17 -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72ap|iPod touch 2G]].&lt;br /&gt;
* January 16 -- [[ARM7 Go]] hole disclosed where else but here on The iPhone Wiki, for developers to poke and prod at&lt;br /&gt;
* January 15 -- The [[iPhone Dev Team]] [http://twitter.com/iphone_dev/status/1120595069 tweets the vfdecrypt key] for the [[N72ap|iPod touch 2G]] 2.2 firmware, demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* January 1 -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband 02.28.00.&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
===December===&lt;br /&gt;
* December 27 -- [[25C3_presentation_Hacking_the_iPhone|25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* December 21 -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
===November===&lt;br /&gt;
* November 21 -- Apple releases 2.2 firmware&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 9 -- Apple releases 2.1 firmware. [[N72ap|iPod touch 2G]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 18 -- Apple releases 2.0.2 fimware. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* August 4 -- Apple releases 2.0.1 fimware&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 22 -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* July 19 -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68ap|iPhone 2G]] and jailbreaking firmware 2.0 on the [[N82ap|iPhone 3G]] and [[N45ap|iPod touch]].&lt;br /&gt;
* July 15 -- Apple releases 1.1.5 firmware, the last of the 1.x firmwares&lt;br /&gt;
* July 11 -- [[N82ap|iPhone 3G]] is released. Apple releases 2.0 firmware and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 9 - [[N82ap|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
===April===&lt;br /&gt;
* April 3 -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
===March===&lt;br /&gt;
* March 12 -- [[iPhone Dev Team|Dev team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* March 4 -- [[User:N000b|George Zhu (n000b)]] releases [[iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
===February===&lt;br /&gt;
* February 28 -- [[Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* February 26 -- Apple releases 1.1.4 firmware&lt;br /&gt;
* February 11 -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* February 8 -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
===January===&lt;br /&gt;
* January 28 -- [[iPhone Dev Team]] releases [[soft upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* January 18 -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* January 18 -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* January 15 -- Apple releases 1.1.3 firmware, closing the [[Mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
===November===&lt;br /&gt;
* November 15 -- New [[Baseband Bootloader|Baseband bootloader]] 4.6 comes out, new iPhones can't be unlocked.&lt;br /&gt;
* November 12 -- Apple releases 1.1.2 firmware, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* November 2 -- [[Jailbreakme]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
===October===&lt;br /&gt;
* October 23 -- [[iPhone-Elite Team]] releases the [[Virginizer]].&lt;br /&gt;
* October 14 -- [[AriX]] releases [[iJailBreak]], the first automated [[n45ap|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* October 12 -- [[planetbeing]] releases [[touchFree]], the first automated [[n45ap|iPod touch]] jailbreak.&lt;br /&gt;
* October 10 -- [[niacin]], [[cmw]], and [[dre]] release the [[LibTiff]] exploit to jailbreak the [[n45ap|iPod touch]], which is later adapted for use in [[Jailbreakme]].&lt;br /&gt;
&lt;br /&gt;
===September===&lt;br /&gt;
* September 27 -- Apple releases 1.1.1 firmware&lt;br /&gt;
* September 11 -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* September 10 -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* September 9 -- Apple announces the [[iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
===August===&lt;br /&gt;
* August 23 -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* August 21 -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
===July===&lt;br /&gt;
* July 23 -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* July 20 -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* July 9 -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* July 3 -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
===June===&lt;br /&gt;
* June 29 -- [[M68ap|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* June 26 -- The [[iPhone Dev Team]] was formed.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8102</id>
		<title>Untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8102"/>
		<updated>2010-08-11T19:42:14Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* Device */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
An untethered jailbreak is a type of [[jailbreak]] where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. &lt;br /&gt;
&lt;br /&gt;
== Device ==&lt;br /&gt;
&lt;br /&gt;
iOS version 4.0.2 and 3.2.2 do not have any jailbreak yet.&lt;br /&gt;
&lt;br /&gt;
All [[iPhone]], [[iPod touch]], and [[K48ap|iPad]] models including the [[N90ap|iPhone 4]] have an untethered jailbreak if they have any firmware version other than those mentioned above.&lt;br /&gt;
&lt;br /&gt;
Devices with a newer [[bootrom]], which include some [[N88ap|iPhone 3GS]] units and &amp;quot;MC&amp;quot; model [[N72ap|iPod touch 2G]] units, as well as all [[N18ap|iPod touch 3G]], [[K48ap|iPad]], and [[N90ap|iPhone 4]] units, can't have a untethered jailbreak by [[PwnageTool]], since PwnageTool relies on exploits in the bootrom that allow signature checks to be circumvented.&lt;br /&gt;
&lt;br /&gt;
However, it is possible to perform a untethered jailbreak on any device with any firmware version between 3.1.2 and 4.0.1 using [[Star]] (This include any [[K48ap|iPad]] models, running 3.2 or 3.2.1). Star stores some code inside the device's VRAM in order to perform the untethered part of the jailbreak. It can be seen as some colored pixels before the [[SpringBoard]] is loaded.&lt;br /&gt;
&lt;br /&gt;
== Operating System ==&lt;br /&gt;
[[Star]] runs on the device itself, so the untethered jailbreak for iOS 3.1.2 to 4.0.1 is completely independent from a computer's operating system since there's no need to connect the device to any computer in order to jailbreak.&lt;br /&gt;
&lt;br /&gt;
[[PwnageTool]] can only be used on Mac OS X.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8054</id>
		<title>Untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8054"/>
		<updated>2010-08-09T18:32:05Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* Device */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
An untethered jailbreak is a jailbreak where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. &lt;br /&gt;
&lt;br /&gt;
== Device ==&lt;br /&gt;
All [[iPhone]], [[iPod touch]], and [[K48ap|iPad]] models including the [[N90ap|iPhone 4]] have an untethered jailbreak at the latest firmware currently available.&lt;br /&gt;
&lt;br /&gt;
Devices with a newer bootrom, which include some [[N88ap|iPhone 3GS]] units, &amp;quot;MC&amp;quot; model [[N72ap|iPod touch 2G]] units, [[N18ap|iPod touch 3G]] units, and [[N90ap|iPhone 4]] units can't have a untethered jailbreak by [[PwnageTool]], as they would need the signature checks patched since they don't have the [[0x24000_Segment_Overflow|24kPwn]] exploit anymore.&lt;br /&gt;
&lt;br /&gt;
However, it is possible to perform a untethered jailbreak on any device with any firmware version between 3.1.2 and 4.0.1 using [[Jailbreakme]] (This include any [[K48ap|iPad]] models, running 3.2 or 3.2.1). This new revision, codenamed &amp;quot;[[Star]]&amp;quot;, stores some code inside the device's VRAM in order to perform the untethered part of the jailbreak. It can be seen as some colored pixels right before the [[SpringBoard]] is loaded.&lt;br /&gt;
&lt;br /&gt;
== Operating System ==&lt;br /&gt;
[[Jailbreakme]] runs on the device itself, so the untethered jailbreak for iOS 3.1.2 to 4.0.1 is completely independent from the operating system since there's no need to connect the device to any computer in order to jailbreak.&lt;br /&gt;
&lt;br /&gt;
[[PwnageTool]] can only be used on MacOS X.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8053</id>
		<title>Untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8053"/>
		<updated>2010-08-09T18:27:39Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* Operating System */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
An untethered jailbreak is a jailbreak where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. &lt;br /&gt;
&lt;br /&gt;
== Device ==&lt;br /&gt;
All [[iPhone]], [[iPod touch]], and [[K48ap|iPad]] models including the [[N90ap|iPhone 4]] have an untethered jailbreak at the latest firmware currently available.&lt;br /&gt;
&lt;br /&gt;
Devices with a newer bootrom, which include some [[N88ap|iPhone 3GS]] units, &amp;quot;MC&amp;quot; model [[N72ap|iPod touch 2G]] units, [[N18ap|iPod touch 3G]] units, and [[N90ap|iPhone 4]] units can't have a untethered jailbreak by [[PwnageTool]], as they would need the signature checks patched since they don't have the [[0x24000_Segment_Overflow|24kPwn]] exploit anymore.&lt;br /&gt;
&lt;br /&gt;
However, it is possible to perform a untethered jailbreak on any device with any firmware version between 3.1.2 and 4.0.1 using [[Jailbreakme]] (This include any [[K48ap|iPad]] models, running 3.2 or 3.2.1).&lt;br /&gt;
&lt;br /&gt;
== Operating System ==&lt;br /&gt;
[[Jailbreakme]] runs on the device itself, so the untethered jailbreak for iOS 3.1.2 to 4.0.1 is completely independent from the operating system since there's no need to connect the device to any computer in order to jailbreak.&lt;br /&gt;
&lt;br /&gt;
[[PwnageTool]] can only be used on MacOS X.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8047</id>
		<title>Untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8047"/>
		<updated>2010-08-09T18:13:11Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* Device */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
An untethered jailbreak is a jailbreak where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. &lt;br /&gt;
&lt;br /&gt;
== Device ==&lt;br /&gt;
All [[iPhone]], [[iPod touch]], and [[K48ap|iPad]] models including the [[N90ap|iPhone 4]] have an untethered jailbreak at the latest firmware currently available.&lt;br /&gt;
&lt;br /&gt;
Devices with a newer bootrom, which include some [[N88ap|iPhone 3GS]] units, &amp;quot;MC&amp;quot; model [[N72ap|iPod touch 2G]] units, [[N18ap|iPod touch 3G]] units, and [[N90ap|iPhone 4]] units can't have a untethered jailbreak by [[PwnageTool]], as they would need the signature checks patched since they don't have the [[0x24000_Segment_Overflow|24kPwn]] exploit anymore.&lt;br /&gt;
&lt;br /&gt;
However, it is possible to perform a untethered jailbreak on any device with any firmware version between 3.1.2 and 4.0.1 using [[Jailbreakme]] (This include any [[K48ap|iPad]] models, running 3.2 or 3.2.1).&lt;br /&gt;
&lt;br /&gt;
== Operating System ==&lt;br /&gt;
As of right now, there is no way to jailbreak the iOS 4 untethered on Linux-based operating systems. This can be done, however, with Mac OS X or Windows.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8045</id>
		<title>Untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=8045"/>
		<updated>2010-08-09T18:07:28Z</updated>

		<summary type="html">&lt;p&gt;Luxiel: /* Device */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
An untethered jailbreak is a jailbreak where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. &lt;br /&gt;
&lt;br /&gt;
== Device ==&lt;br /&gt;
All [[iPhone]], [[iPod touch]], and [[K48ap|iPad]] models including the [[N90ap|iPhone 4]] have an untethered jailbreak at the latest firmware available.&lt;br /&gt;
&lt;br /&gt;
Devices with a newer bootrom, which include some [[N88ap|iPhone 3GS]] units, &amp;quot;MC&amp;quot; model [[N72ap|iPod touch 2G]] units, [[N18ap|iPod touch 3G]] units, and [[N90ap|iPhone 4]] units can't have a untethered jailbreak by [[Pwnage Tool]]. However, it is possible to perform a untethered jailbreak on any device with any firmware between iOS 3.1.2 and 4.0.1 using [[JailbreakMe]] (This include any [[K48ap|iPad]] models, running 3.2 or 3.2.1).&lt;br /&gt;
&lt;br /&gt;
== Operating System ==&lt;br /&gt;
As of right now, there is no way to jailbreak the iOS 4 untethered on Linux-based operating systems. This can be done, however, with Mac OS X or Windows.&lt;/div&gt;</summary>
		<author><name>Luxiel</name></author>
		
	</entry>
</feed>