Difference between revisions of "IDroid"

From The iPhone Wiki
Jump to: navigation, search
m
 
(34 intermediate revisions by 14 users not shown)
Line 1: Line 1:
  +
{{lowercase}}
Hacked by Chroniccommand
 
  +
[[File:Openiboot.png|thumb|right|200px|Device running the OpeniBoot console.]]
Hacked by Chroniccommand
 
  +
'''iDroid''' is a project with goals of porting Linux and Android to [[List of iPhones|iPhone]], [[List of iPod touches|iPod touch]] and [[List of iPads|iPad]] and use different OSes as alternatives to standard [[iOS]].
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
iDroid is not actually a hack/exploit neither an unlock, but it is based on [[Bootrom]] exploits which allowing the running of unsigned code at low level.
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
=== OpeniBoot ===
Hacked by Chroniccommand
 
  +
The goals of OpeniBoot are:
Hacked by Chroniccommand
 
  +
* to run low-level code
Hacked by Chroniccommand
 
  +
* to have low and critical drivers ([[NAND]] and [[NOR]] driver, [[NOR_(NVRAM)|NVRAM]]...).
Hacked by Chroniccommand
 
  +
* to have a debugger and development environment (chainloading, upgrading itself and USB mass storage).
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
=== Linux ===
Hacked by Chroniccommand
 
  +
A Linux Bootloader, a working Linux kernel (cross-compiler), porting drivers, run Wi-Fi and command line through SSH.
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
=== Android ===
Hacked by Chroniccommand
 
  +
On {{date|2010|04|21}}, an Android distribution based on iPhoneLinux called iDroid was released.
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
* Announcement on the linuxoniphone blog: [http://linuxoniphone.blogspot.com/2010/04/ive-been-working-on-this-quietly-in.html iDroid initial release].
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
== See Also ==
Hacked by Chroniccommand
 
  +
* [[Android]]
Hacked by Chroniccommand
 
  +
Hacked by Chroniccommand
 
  +
[[Category:Android on iPhone]]
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 
Hacked by Chroniccommand
 

Latest revision as of 13:08, 17 September 2021

Device running the OpeniBoot console.

iDroid is a project with goals of porting Linux and Android to iPhone, iPod touch and iPad and use different OSes as alternatives to standard iOS.

iDroid is not actually a hack/exploit neither an unlock, but it is based on Bootrom exploits which allowing the running of unsigned code at low level.

OpeniBoot

The goals of OpeniBoot are:

  • to run low-level code
  • to have low and critical drivers (NAND and NOR driver, NVRAM...).
  • to have a debugger and development environment (chainloading, upgrading itself and USB mass storage).

Linux

A Linux Bootloader, a working Linux kernel (cross-compiler), porting drivers, run Wi-Fi and command line through SSH.

Android

On 21 April 2010, an Android distribution based on iPhoneLinux called iDroid was released.

See Also