The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Main Page"
(direct link chips) |
m (added missing BCM4330) |
||
Line 151: | Line 151: | ||
**[[BCM4325]] |
**[[BCM4325]] |
||
**[[BCM4329]] |
**[[BCM4329]] |
||
+ | **[[BCM4330]] |
||
* [[Compass]]: [[AKM8973]], [[AKM8975]] |
* [[Compass]]: [[AKM8973]], [[AKM8975]] |
||
* [[Gyroscope]]: [[AGD1 2022 FP6AQ]] |
* [[Gyroscope]]: [[AGD1 2022 FP6AQ]] |
Revision as of 23:25, 25 April 2012
Template:Heading More information is available on the Firmware and Jailbreak pages.
Device | iPhone & iPod touch | iPhone 3G & iPod touch 2G | iPhone 3GS (old bootrom) | Apple TV 2G, Apple TV 3G | iPad 2, iPad 3, and iPhone 4S | Everything else |
---|---|---|---|---|---|---|
Latest Firmware | 3.1.3 (Build 7E18) | 4.2.1 (Build 8C148) | 5.1 (Build 9B176) | 5.0 (Build 9B179b) | 5.1 (Build 9B176)
(Build 9B179 for iPhone 4S) |
5.1 (Build 9B176) |
Is there a jailbreak available? | Yes | Yes | Yes | No | No | Yes, but tethered |
If the device is locked to a carrier, is there a software-based unlock? | Yes | Requires a preserved baseband, or baseband 06.15.00 | N/A | Yes, but you must be jailbroken and legitimately activated. | Yes, but you must be jailbroken and legitimately activated. |
Template:Col-begin Template:Col-2 Template:Heading
Jailbreak Software
Patches
Vulnerabilities and Exploits
- 0x24000 Segment Overflow (24kpwn)
- BPF STX Kernel Write Exploit
- HFS Heap Overflow
- HFS Legacy Volume Name Stack Buffer Overflow (feedface)
- Incomplete Codesign Exploit
- IOSurface Kernel Exploit
- Limera1n Exploit
- Malformed CFF Vulnerability
- MobileBackup Copy Exploit
- ndrv_setspec() Integer Overflow
- Packet Filter Kernel Exploit
- Racoon String Format Overflow Exploit
- SHA-1 Image Segment Overflow (SHAtter)
- usb_control_msg(0x21, 2) Exploit
- usb_control_msg(0xA1, 1) Exploit (steaks4uce)
Template:Col-2 Template:HeadingB
Devices (see also Models)
Application Processors
- S5L8900 (iPhone, iPod touch, iPhone 3G)
- S5L8720 (iPod touch 2G)
- S5L8920 (iPhone 3GS)
- S5L8922 (iPod touch 3G)
- S5L8930 (iPad, iPhone 4 GSM, iPod touch 4G, Apple TV 2G, iPhone 4 CDMA)
- S5L8940 (iPad 2, iPhone 4S)
- S5L8942 (Apple TV 3G, iPad2 R2)
- S5L8945 (iPad 3)
Baseband Devices
- PMB8876 or S-Gold 2 (iPhone)
- PMB8878 or X-Gold 608 (iPhone 3G, iPhone 3GS, iPad)
- XMM6180 or X-Gold 618 (iPhone 4 GSM, iPad 2 GSM)
- MDM6600 (iPhone 4 CDMA, iPad 2 CDMA)
- MDM6610 (iPhone 4S)
- MDM9x00 (iPad 3)
Other
Template:Col-begin Template:Col-2 Template:Heading
iPhone Hackers
iPhone Hacker Teams
Application Development
- Apple Certification Process
- Bypassing iPhone Code Signatures
- Distribution Methods
- Frameworks
- MobileDevice Library
- Toolchain (Includes tutorials)
- Toolchain 2.0 (Includes tutorials)
Application Copy Protection
- Application Structure and Signatures
- Bugging Debuggers
- Copy Protection Overview
- Defeating Cracks
- Mach-O Loading Process
Template:Col-2 Template:HeadingB
Guides
Definitions
- Activation
- ASLR
- Baseband
- Bootloader
- Bootchain
- Bootrom / VROM
- CHIPID
- CPID
- DFU Mode
- ECID
- iBEC
- iBoot
- iBSS
- Jailbreak
- Kernel
- launchd
- LLB
- NAND
- NOR
- NORID
- SHSH
- Unlock
Disclaimer |