Difference between revisions of "Tethered jailbreak"

From The iPhone Wiki
Jump to: navigation, search
(redsn0w 0.9.6 beta 4)
m
 
(15 intermediate revisions by 5 users not shown)
Line 1: Line 1:
  +
A '''tethered jailbreak''' is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as [[Recovery Mode]]. In order for the device to start completely and with a patched kernel, it must be "re-jailbroken" with a computer (using the "boot tethered" feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots.
Tethered means being basically "attached" to your computer in a way; you must boot your device by running code on it (via the dock connector) to make use of an exploit.
 
   
  +
== Using a tethered jailbreak ==
==[[N72ap|iPod touch 2G]]==
 
The initial jailbreak for the [[N72ap|iPod touch 2G]] was tethered, until the hybrid dev team released the [[0x24000 Segment Overflow]]. The codename for the tethered jailbreak was [[redsn0w Lite]].
+
To boot tethered, their user must plug the device into a computer and run the jailbreak tool to "boot tethered".
   
  +
If a user attempts to boot the device without using a computer, the device will either be stuck at the Apple logo, in [[Recovery Mode]], or in a seemingly "un-jailbroken" state where [[Cydia.app|Cydia]], Mail, and Safari crash (and jailbreak-only tweaks/themes don't work) - until you boot tethered.
==Linux==
 
Currently, certain devices are capable of booting to Linux. The downside is that this is a tethered boot.
 
   
== Explanation ==
+
== Tethered exploits ==
  +
The [[limera1n Exploit]] and other [[bootrom]] exploits can be used to tethered jailbreak older devices on any iOS version, because bootrom exploits take advantage of code that is permanently embedded in the device's hardware, which Apple cannot update with iOS updates. Those tools do usually need minor software updates (not exploit-related) to explicitly support new iOS versions. They also use additional exploits (specific to each iOS version) to produce untethered jailbreaks when possible.
Devices are tethered because there is one or more area where the device fails one or more signature check along the way due to the jailbreak. The device is able to boot up because there is a way to execute code via USB that allows you to bootstrap to a pwned (no signature check) iBSS, iBEC, or iBoot to finish the boot process.
 
   
  +
The initial jailbreak for the [[N72AP|iPod touch (2nd generation)]] was tethered, until the hybrid dev team released the [[0x24000 Segment Overflow]]. The codename for the tethered jailbreak was [[redsn0w Lite]].
== [[redsn0w]] 0.9.6 beta 4 ==
 
  +
Because there is no exploit that allows the [[Kernelcache|Kernel]] to be edited without it failing signature check every boot because the kernel does not check that the root filesystem is not edited, so you can instal Apps.
 
  +
==See Also==
  +
*[[Jailbreak]]
  +
*[[Jailbreak Exploits]]
  +
*[[Untethered jailbreak]]
  +
*[[Semi-tethered jailbreak]]
  +
*[[Semi-untethered jailbreak]]
  +
  +
[[Category:Jailbreaking]]

Latest revision as of 09:26, 26 March 2017

A tethered jailbreak is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as Recovery Mode. In order for the device to start completely and with a patched kernel, it must be "re-jailbroken" with a computer (using the "boot tethered" feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots.

Using a tethered jailbreak

To boot tethered, their user must plug the device into a computer and run the jailbreak tool to "boot tethered".

If a user attempts to boot the device without using a computer, the device will either be stuck at the Apple logo, in Recovery Mode, or in a seemingly "un-jailbroken" state where Cydia, Mail, and Safari crash (and jailbreak-only tweaks/themes don't work) - until you boot tethered.

Tethered exploits

The limera1n Exploit and other bootrom exploits can be used to tethered jailbreak older devices on any iOS version, because bootrom exploits take advantage of code that is permanently embedded in the device's hardware, which Apple cannot update with iOS updates. Those tools do usually need minor software updates (not exploit-related) to explicitly support new iOS versions. They also use additional exploits (specific to each iOS version) to produce untethered jailbreaks when possible.

The initial jailbreak for the iPod touch (2nd generation) was tethered, until the hybrid dev team released the 0x24000 Segment Overflow. The codename for the tethered jailbreak was redsn0w Lite.

See Also