Difference between revisions of "Main Page"

From The iPhone Wiki
Jump to: navigation, search
m (Geohot (and now everyone else in the teams) has a bootrom exploit the work with more then just A4 devices)
m (Lime not green oops)
Line 5: Line 5:
 
{| border="1" class="wikitable" style="width:100%;"
 
{| border="1" class="wikitable" style="width:100%;"
 
|-
 
|-
|style="background-color:green; text-align:center; width:25%;"| '''[[Jailbreak (S5L8920+)|Find bootrom exploit allowing unsigned code exec via USB (S5L8920+)]]'''
+
|style="background-color:lime; text-align:center; width:25%;"| '''[[Jailbreak (S5L8920+)|Find bootrom exploit allowing unsigned code exec via USB (S5L8920+)]]'''
 
|style="background-color:orange; text-align:center; width:25%;"| '''[[Jailbreak (S5L8920+)|Find bootrom exploit allowing unsigned code exec on startup (S5L8920+)]]'''
 
|style="background-color:orange; text-align:center; width:25%;"| '''[[Jailbreak (S5L8920+)|Find bootrom exploit allowing unsigned code exec on startup (S5L8920+)]]'''
 
|style="background-color:orange; text-align:center; width:25%;"| '''[[X-Gold 608 Unlock|Break Chain of Trust (X-Gold 608)]]'''
 
|style="background-color:orange; text-align:center; width:25%;"| '''[[X-Gold 608 Unlock|Break Chain of Trust (X-Gold 608)]]'''

Revision as of 02:38, 9 October 2010

Iptwiki.png

Main Page/Welcome

Find bootrom exploit allowing unsigned code exec via USB (S5L8920+) Find bootrom exploit allowing unsigned code exec on startup (S5L8920+) Break Chain of Trust (X-Gold 608) Break Chain of Trust (X-Gold 618)


Template:Col-begin Template:Col-2 Template:HeadingA

Jailbreak Software

Template:Col-2 Template:HeadingB

iPhone

iPod touch

iPad

Apple TV

Processors

Other

Template:Col-end

Template:Col-begin Template:Col-2 Template:HeadingA

iPhone Hackers

iPhone Hacker Teams

Application Development

Application Copy Protection

Template:Col-2 Template:HeadingB

Guides

Definitions

Template:Col-end

Disclaimer