Types Many different types of jailbreaks have been developed over the years, differing in how and when the exploit is applied.
Untethered When a jailbroken device is booting, it loads Apple's own boot software initially. The device is then
exploited and the kernel is
patched every time it is turned on. An untethered jailbreak is a jailbreak that does not require any assistance when it boots up. The kernel will be patched without the help of a computer or an application.
Tethered A tethered jailbreak is the opposite of an untethered jailbreak, in the sense that a computer is required to boot the device. Without a computer running the jailbreaking software, the iOS device will not be able to boot at all. While using a tethered jailbreak, the user will still be able to restart/kill the device's
SpringBoard process without needing to reboot. Many early jailbreaks were offered initially as tethered jailbreaks. The reason a computer is mandatory for booting is often related to the exploit targeting the device's iBoot process. While untethered jailbreaks find a way to make kernel patches persist in memory across reboots, the tethered exploit only temporarily modifies iBoot's signature verification checks. When the device is powered off, this temporary patch is lost. The unmodified iBoot then fails its integrity check on the modified files, preventing the device from booting until the computer is used to re-run the exploit and bypass the iBoot verification steps.
Semi-tethered This type of jailbreak allows a user to reboot their phone normally, but upon doing so, the jailbreak and any modified code will be effectively disabled, as it will have an unpatched kernel. Any functionality independent of the jailbreak will still run as normal, such as making a phone call, texting, or using App Store applications. To be able to have a patched kernel and run modified code again, the device must be booted using a computer.
Semi-untethered This type of jailbreak is like a semi-tethered jailbreak in which when the device reboots, it no longer has a patched kernel, but the key difference is that the kernel can be patched without using a computer. The kernel is usually patched using an application installed on the device without patches. This type of jailbreak has become increasingly popular, with most recent jailbreaks classified as semi-untethered.
History of tools , p0sixninja, and
geohot) who have contributed to building the early jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at
DEF CON. ====
JailbreakMe and AppSnapp ==== A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it, and soon a jailbreak-only game app became available. In October 2007,
JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone OS 1.1.1 on both the iPhone and iPod Touch, and it included Installer.app as a way to get software for the jailbroken device.
ZiPhone In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.
PwnageTool The iPhone Dev Team, which is not affiliated with Apple, has released a series of free desktop-based jailbreaking tools. In July 2008 it released a version of PwnageTool to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod Touch, newly including Cydia as the primary third-party installer for jailbroken software. PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions.
redsn0w After Apple released iPhone OS 3.0 in June 2009, the Dev Team published redsn0w as a simple jailbreaking tool for Mac and Windows, and also updated PwnageTool primarily intended for expert users making custom firmware, and only for Mac. It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.
purplera1n & blackra1n George Hotz developed the first iPhone unlock, which was a hardware-based solution. Later, in 2009, he released a jailbreaking tool for the
iPhone 3G and
iPhone 3GS on iPhone OS 3.0 called purplera1n, and
blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod Touch and other devices.
limera1n In October 2010, George Hotz released limera1n, a low-level exploit of
boot ROM code that permanently works to jailbreak the iPhone 4 and is used as a part of tools including redsn0w.
Spirit and JailbreakMe Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010. Spirit jailbreaks devices including iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iPhone OS 3.2. In July 2011, he released JailbreakMe 3.0, a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3). It used a flaw in
PDF file rendering in mobile
Safari.
Greenpois0n Chronic Dev Team initially released
Greenpois0n in October 2010, a desktop-based tool for untethered jailbreaking iOS 4.1 and later iOS 4.2.1 on most devices including the Apple TV, as well as iOS 4.2.6 on CDMA (Verizon) iPhones.
ultrasn0w As of December 2011, redsn0w included the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod Touch (3rd and 4th generation).
Absinthe The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release
Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the
iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S. In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod Touch models that support iOS 5.1.1, including jailbreaking the
third-generation iPad for the first time.
evasi0n An iOS 6.X untethered jailbreak tool called "evasi0n" was released for Linux, OS X, and Windows on February 4, 2013. Due to the high volume of interest in downloading the jailbreak utility, the site initially gave anticipating users download errors. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak.
TaiG On November 29, 2014, TaiG team released their untethered jailbreak tool called "TaiG" for devices running iOS 8.0–8.1.1. On December 10, 2014, the app was updated to include support for iOS 8.1.2. On July 3, 2015, TaiG 2.3.0 was released, which includes support for iOS 8.0–8.4.
Pangu9 On October 14, 2015, Pangu Team released Pangu9, their untethered jailbreak tool for iOS 9.0 through 9.0.2. On March 11, 2016, Pangu Team updated their tool to support iOS 9.1 for 64-bit devices.
Table of tools }
Untethered:
Tethered: •
1 •
2 •
3 4th & 5th generation (4K)
Apple TV}} •
7}} •
7 Plus}} tvOS 26 (Apple TV HD and 4K 1st Gen only)
M1 based iPads 16.5.1 (
A12-
A14,
M1) 16.5 (
A15-
A16,
M2) (excludes 15.8.7 on all devices)
M1-
M2 based iPads
M1-
M2 based iPads == History of exploit-disabling patch releases ==