To go back to the home page CLICK HERE
Jailbreaking is the process of removing hardware restrictions imposed by iOS, Apple's operating system, on devices running it through the use of software exploits; such devices include the iPhone, iPod touch, iPad, and second-generation Apple TV. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store.
Jailbreaking is a form of privilege escalation,[1][2] and the term has been used to describe privilege escalation on devices by other manufacturers as well.[3][4] The name refers to breaking the device out of its "jail",[5] which is a technical term used in Unix-style systems, for example in the term "FreeBSD jail". A jailbroken iPhone, iPod touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls.
Restoring a device with iTunes removes the jailbreak.[6][7][8]
Contents
- Reasons for jailbreaking
- Security, privacy, and stability
- Comparison to Android rooting
- Difficulty
- Legal status
- Types of jailbreaks
- History of iOS jailbreaking tools
- See also
- Notes
- References
- External links
Reasons for jailbreakingEditOne of the reasons for jailbreaking is to expand the feature set limited by Apple and its App Store.[9] Apple checks apps for compliance with its iOS Developer Program License Agreement before accepting them for distribution in the App Store.[10]However, their reasons for banning apps are not limited to safety and security and may be regarded as arbitrary and capricious.[11] To access banned apps,[12] users rely on jailbreaking to circumvent Apple's censorship of content and features. Jailbreaking permits the downloading of programs not approved by Apple,[13] such as customization apps used to change the user Interface.
Device customizationEditSince software programs available through Cydia are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps.[14] Users install these programs for purposes including personalization and customization of the interface by tweaks developed by developers such as Surinex and such,[14] adding desired features and fixing annoyances,[15] and making development work on the device easier by providing access to the filesystem and command-line tools.[16][17]
Many Chinese iOS device owners also jailbreak their phones to install third-party Chinese character input systems because they are easier to use than Apple's.[18]
Use of handset on multiple carriersEditJailbreaking also opens the possibility for using software to unofficially unlock carrier-locked iPhones so they can be used with other carriers.[19] Software-based unlocks have been available since September 2007,[20] with each tool applying to a specific iPhone model and baseband version (or multiple models and versions).[21] This includes the iPhone 4, iPhone 3GS, and iPhone 3G models.
Installation of malwareEditComputer criminals may jailbreak an iPhone to install malware, or target jailbroken iPhones on which malware can be installed more easily. The Italian cybersecurity company Hacking Team, which sells hacking software to law enforcement agencies, advised police to jailbreak iPhones to allow tracking software to be installed on them.[22][23]
Software piracyEditOn iPhones the installation of consumer software is generally restricted to installation through the App Store. Jailbreaking therefore allows the installation of pirated applications.[24] It has been suggested that a major motivation for Apple to prevent jailbreaking is to protect the income of its App Store, including third-party developers and allow the buildup of a sustainable market for third-party software.[25]
Early exploit fixesEditOn July 15, 2011, Apple released a new version of iOS that closed the exploit used in JailbreakMe 3.0. The German Federal Office for Information Security had reported that the "critical weakness" uncovered by JailbreakMe meant that iOS users could potentially have their information stolen or unwillingly download malware by clicking on maliciously crafted PDFfiles.[26] Before Apple released a fix for this security hole, jailbreak users had access to a fix published by the developer of JailbreakMe. In Q3 2014 Apple released iOS 8.1.3 that patched up the exploits used in jailbreak for iOS 8.0-8.1.2. It was not possible to jailbreak till iOS 8.3 update. Later a jailbreak was developed by a team called TaiG.
Security, privacy, and stabilityEditThe first iPhone worm, iKee, appeared in early November 2009, created by a 21-year-old Australian student in the town of Wollongong. He told Australian media that he created the worm to raise awareness of security issues: jailbreaking allows users to install an SSH service, which those users can leave in the default unsecure state.[27] In the same month, F-Securereported on a new malicious worm compromising bank transactions from jailbroken phones in the Netherlands, similarly affecting devices where the owner had installed SSH without changing the default password.[28][29]
A Forbes staff analyzed UCSB study on 1407 free programs available from a third party source and Apple. Of the 1,407 free apps investigated in the cited study, 825 were downloaded from Apple’s App Store using the website App Tracker, and 526 from BigBoss (Cydia's default repository). 21% of official apps tested leaked device ID and 4% leaked location. Unofficial apps leaked 4% and 0.2% respectively. 0.2% of apps from Cydia leaked photos and browsing history, while the App Store leaked none. He commented that unauthorized apps tend to respect privacy better than official ones.[30] Also, there is a program called PrivaCy that allows user to control the upload of usage statistics to remote servers.[30]
Installing software published outside the App Store has the potential to affect battery life and system stability if the software is poorly optimized or frequently uses resource-draining services (such as 3G or Wi-Fi).[31][32][33]
In August 2015 the KeyRaider malware was discovered that affects only jailbroken iPhones.[34]
Comparison to Android rootingEditJailbreaking of iOS devices is sometimes compared to "rooting" of Android devices. Although the two concepts both involve privilege escalation, they differ substantially in scope. Android devices, with few exceptions[clarification needed], do not natively implement strong technical security measures to prevent users from modifying or replacing the operating system; enabling installation of apps that have not been reviewed or authorized by a central authority such as Google—known as "sideloading"—is a simple user preference.[35]
In marked contrast, iOS is engineered with strong security measures (including a "locked bootloader") intended to prevent users from modifying the operating system, and to prevent apps from gaining root privileges; jailbreaking an iOS device to defeat all of these security measures presents a significant technical challenge. Jailbreaking also violates Apple's end-user license agreement for iOS.[36] Until 2015 sideloading apps in general was difficult for most individual users, requiring them to purchase developer membership, though corporations could install private applications onto corporate phones. After 2015, this became free for all users, but apps installed this way have the restrictions of all other apps.
DifficultyEditApple has released various updates to iOS that patch exploits used by jailbreak utilities; this includes a patch released in iOS 6.1.3 to software exploits used by the original evasi0n iOS 6–6.1.2 jailbreak, and again in iOS 7.1 patching the Evasi0n 7 jailbreak for iOS 7–7.0.6-7.1 beta 3. Bootrom exploits (exploits found in the hardware of the device) cannot be patched by Apple by system updates, but could be fixed in hardware revisions such as new chips or new hardware in its entirety. This occurred when Apple released a new hardware model of the iPhone 3GS in 2009.[37]
At WWDC 2015, Apple announced that iOS 9 will feature a new 'rootless' security system, making it more difficult to replace system files. This would make jailbreaking (and installation of malware generally) more difficult.
Blogger John Gruber, known for his closeness to Apple, has argued that some jailbreak exploits are misunderstood by users and are more serious than they appear. He commented on a jailbreak exploit announced in 2010 that "it's odd how the press is mostly covering this as 'jailbreaking now more convenient' rather than 'remote code exploit now in the wild'", pointing out that the exploit allowed the creator of a malicious website to take control of iPhones accessing it.[38]
Legal statusEditJailbreaking is something that is legal in the United States but may not be in other countries, so its legal status is affected by laws regarding circumvention of digital locks, such as laws protecting digital rights management (DRM) mechanisms. Many countries do not have such laws, and some countries have laws including exceptions for jailbreaking.
International treaties have influenced the development of laws affecting jailbreaking. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as jailbreaking. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as jailbreaking to run alternative software,[39] but member states vary on the implementation of the directive.
While Apple technically does not support jailbreaking as a violation of its EULA, jailbreaking communities have generally not been legally threatened by Apple. At least one prominent jailbreaker has subsequently received a temporary internship at Apple, although the developer did not become a permanent employee.[40] Apple has also regularly (though possibly somewhat jokingly) thanked jailbreak communities for detecting security holes in iOS release notes.[41]
AustraliaEditIn 2010, Electronic Frontiers Australia said that it is unclear whether jailbreaking is legal in Australia, and that anti-circumvention laws may apply.[42] These laws were strengthened by the Copyright Amendment Act 2006.
CanadaEditIn November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.[43] Jailbreaking a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.
There had been several efforts from 2008-2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[44] but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.[45]
IndiaEditIndia's copyright law permits circumventing DRM for non-copyright-infringing purposes.[46][47] Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.[48] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report"Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.[46][47]
SingaporeEditJailbreaking might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.[49]
United KingdomEditThe law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Jailbreaking may be a form of circumvention covered by that law, but this has not been tested in court.[39][50] Competition laws may also be relevant.[51]
United StatesEditThe Digital Millennium Copyright Act says "no person shall circumvent a technological measure that effectively controls access to a work protected under" the Digital Millennium Copyright Act, which may apply to jailbreaking;[52] there is an exemption from this law only for jailbreaking mobile phones "at least through 2015."[53] Note that the exemption is for jailbreaking only, not unlocking (recent phones), and that Apple has announced that jailbreaking "can violate the warranty".[54]However, in the United States, Apple cannot void an iPhone's warranty unless it can show that a problem or component failure is linked to the installation or placement of after-market item such as unauthorized applications, because of the Federal Trade Commission's Magnuson-Moss Warranty Act of 1975.[55][56][57]
In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers.[58][59] Apple had previously filed comments opposing this exemption and indicated that it had considered jailbreaking to be a violation of copyright (and by implication prosecutable under the DMCA). Apple's request to define copyright law to include jailbreaking as a violation was denied as part of the 2009 DMCA rulemaking. In their ruling, the Library of Congress affirmed on July 26, 2010 that jailbreaking is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The jailbreaking of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, such as iPads, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[60][61][62] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[61]
Tim Wu, a professor at Columbia Law School, argued in 2007 that jailbreaking "Apple's superphone is legal, ethical, and just plain fun."[63] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[64] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[63] In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow iPhone users to jailbreak their devices legally.[65] It is still possible Apple may employ technical countermeasures to prevent jailbreaking or prevent jailbroken phones from functioning, but it will not be able to sue users who jailbreak.[66] It is also unclear whether it is legal to traffic in the tools used to make jailbreaking easy.[66]
New ZealandEditNew Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.[67][68] This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.
Types of jailbreaksEditWhen a device is booting, it loads Apple's own kernel initially. The device must then be exploited and have the kernel patched each time it is turned on.
An "untethered" jailbreak has the property that if the user turns the device off and back on, the device will start up completely, and the kernel will be patched without the help of a computer – thus enabling the user to boot without the need to use a computer.[69] These jailbreaks are harder to make and take a lot of reverse engineering and years of experience.
With a "tethered" jailbreak, a computer is needed to turn the device on each time it is rebooted. If the device starts back up on its own, it will no longer have a patched kernel, and it may get stuck in a partially started state. By using a computer, the phone is essentially "re-jailbroken" (using the "boot tethered" feature of a jailbreaking tool) each time it is turned on.[70] With a tethered jailbreak, you can still restart SpringBoard ("respring") on the device without needing to reboot.
There is also "semi-tethered" solution, which means that when the device boots, it will no longer have a patched kernel (so it will not be able to run modified code), but it will still be usable for normal functions such as making phone calls, or texting.[71] To use any features that require running modified code, the user must start the device with the help of the jailbreaking tool in order for it to start with a patched kernel (jailbroken).
History of iOS jailbreaking toolsEditSeveral people (including saurik, p0sixninja, and geohot) who have contributed to building jailbreaking tools such as AppSnapp, greenpois0n, Absinthe, purplera1n, blackra1n, limera1n, and others. August 2011 at DEF CON.
A few days after the original iPhone became available in July 2007, developers released the first jailbreaking tool for it,[72] and soon a jailbreak-only game app became available.[73]In October 2007, JailbreakMe 1.0 (also called "AppSnapp") allowed people to jailbreak iPhone iOS 1.1.1 on both the iPhone and iPod touch,[74][75] and it included Installer.app as a way to get software for the jailbroken device. In February 2008, Zibri released ZiPhone, a tool for jailbreaking iPhone OS 1.1.3 and iPhone OS 1.1.4.[76]
The iPhone Dev Team (not affiliated with Apple) has released a series of free desktop-based jailbreaking tools. It released a version of PwnageTool in July 2008 to jailbreak the then new iPhone 3G on iPhone OS 2.0 as well as the iPod touch,[77][78] newly including Cydia as the primary third-party installer for jailbroken software[79] (PwnageTool continues to be updated for untethered jailbreaks of newer iOS versions).[80][81] The iPhone Dev Team released QuickPWN to jailbreak iPhone OS 2.2 on iPhone and iPod touch, also including options to enable functionality that was possible but disabled by Apple on certain devices.[82] After Apple released iOS 3.0, the Dev Team published redsn0w as a simple jailbreaking tool usable on Mac and Windows, and also updated PwnageTool (now primarily intended for expert users making custom firmware, and only for Mac).[83] It continues to maintain redsn0w for jailbreaking most versions of iOS 4 and iOS 5 on most devices.[84] As of December 2011, redsn0w includes the "Corona" untether by pod2g for iOS 5.0.1 for iPhone 3GS, iPhone 4, iPad (1st generation), and iPod touch (3rd and 4th generation).[81]As of June 2012, redsn0w also includes the "Rocky Racoon" untether by pod2g for iOS 5.1.1 on all iPhone, iPad, and iPod touch models that support iOS 5.1.1.[85]
George Hotz, who developed the first iPhone unlock, released a jailbreaking tool for the iPhone 3GS on iPhone OS 3.0 called purplera1n,[86] and blackra1n for iPhone OS version 3.1.2 on the 3rd generation iPod touch and other devices.[87] In October 2010, he released limera1n, a low-level boot ROM exploit that permanently works to jailbreak the iPhone 4 and is used as part of tools including redsn0w.[88]
Nicholas Allegra (better known as "comex") released a program called Spirit in May 2010. Spirit jailbreak for devices including iPad (which was just released) and then new iPhones running iPhone OS 3.1.2, 3.1.3, and iPad running iOS 3.2[89]In August 2010, comex released JailbreakMe
2.0, a web-based tool that was the first to jailbreak the iPhone 4 (on iOS 4.0.1).[90][91] In July 2011, he released JailbreakMe 3.0,[92] a web-based tool for jailbreaking all devices on certain versions of iOS 4.3, including the iPad 2 for the first time (on iOS 4.3.3).[93] JailbreakMe 3.0 uses a flaw in PDF file rendering in mobile Safari.[94][95]
Chronic Dev Team initially released greenpois0n in October 2010, a desktop-based tool for jailbreaking iOS 4.1[96] and later iOS 4.2.1[97] on most devices including the Apple TV,[98] as well as iOS 4.2.6 on CDMA (Verizon) iPhones.[99]
The iPhone Dev Team, Chronic Dev Team, and pod2g collaborated to release Absinthe in January 2012, a desktop-based tool to jailbreak the iPhone 4S for the first time and the iPad 2 for the second time, on iOS 5.0.1 for both devices and also iOS 5.0 for iPhone 4S.[69][70][100][101] In May 2012 it released Absinthe 2.0, which can jailbreak iOS 5.1.1 untethered on all iPhone, iPad, and iPod touch models that support iOS 5.1.1, including jailbreaking the third-generation iPad for the first time.[102] The hackers together called the evad3rs released an iOS 6.X jailbreak tool called evasi0n. The expected release was on Sunday, February 3, 2013, though it was actually released on Monday, February 4, 2013 at noon Eastern Standard Time. The site initially gave anticipating users download errors as there was a high volume of interest in the download for the jailbreak utility, which is available for Linux, OS X, and Windows. When Apple upgraded its software to iOS 6.1.3 it permanently patched out the evasi0n jailbreak. Apple has now upgraded its software to iOS 6.1.4.[103] which is only available for the iPhone 5. On April 2013, the latest versions of Sn0wbreeze was released, which added the support for tethered jailbreaking on A4 devices (i.e. devices not newer than the iPhone 4, iPad (1st generation), or iPod touch (4th generation)).[104][105][106]
On December 22, 2013, the evad3rs released a new version of evasi0n that supports jailbreaking iOS 7.0.x, known as evasi0n7.
After the release of evasi0n7, winocm, ih8sn0w and SquiffyPwn released p0sixspwn on December 30, 2013 for untethering devices on iOS 6.1.3 - 6.1.5. Initially, it was necessary to jailbreak tethered using redsn0w and install p0sixpwn at Cydia. A few days later, on January 4, 2014, the same team released a version of p0sixpwn for jailbreaking using a computer.
iOS 7.1 patched the exploits used by evasi0n7, and on June 23, 2014, Pangu, a Chinese untethered jailbreak was released for iOS 7.1.
On October 22, 2014, Pangu Team released Pangu8 to jailbreak all devices running iOS 8-8.1. The first versions did not bundle Cydia, nor was there an iOS 8 compatible version of Cydia at the time.
November 29, 2014, was the day TaiG team released their version of jailbreak tool, available to devices running iOS 8.0-8.1.1. And, on December 10, 2014, their app was updated to include support for iOS 8.1.2.[107] As of 3 July 2015, TaiG 2.3.0 was released which includes support for iOS 8.0-8.4.[108]
Apple updated IOS to 8.4.1 making Taig jailbreak stop working any more, PanGu and TaiG Jailbreak team said that they are working to exploiting the Cydia debs with files completely to iOS 8.4.1. Pangu have shown the iOS 8.4.1 Jailbreak comp-ability chances in the WWDC that held recently.[109]
iOS 9- the biggest release of Apple at WWDC 2015.The company has released the iOS 9 for all devices that all are running iOS 8. It has many new features, But all of them Apple said,that iOS 9 is released with rootless security system. From September 16, the jailbreaking and hackers team faces a big challenge and that is to jailbreak iOS 9. Though the betas jailbreak have arrived and the other betas are also in working of jailbreaking.In September @Twitter, i h8sn0w on their official Twitter account, they released a post about the jailbreaking of iOS 9 the team released a post. on that post there was written that,iOS 9 is jailbreakable and the ih8sn0w also linked their released YouTube video. In that video it was shown that, the iOS 9 is jailbreaking and jailbreakable on an iPhone. The ih8sn0w, TaiG, Pangu, iN3O X, and the i0n1c team are working for releasing a pure iOS 9 jailbreak. It may take a few months to release the public version of jailbreak of iOS 9 by the jailbreaking teams.
First jailbreaks by device and iOS versionEdit Device OS Both
Device/OSRelease dateToolDeveloper(s)Time (days) until first jailbreakDate of first jailbreakiPhone / iPhone OS 1.0June 29, 2007(no name)iPhone Dev Team[110]July 10, 2007[72]11iPod touchSeptember 5, 2007(no name)niacin and dreOctober 10, 2007[111][112]35iPhone 3G / iPhone OS 2.0July 11, 2008PwnageTooliPhone Dev TeamJuly 20, 2008[78]9iPod touch (2nd generation)September 9, 2008redsn0wiPhone Dev Team and Chronic Dev TeamJanuary 30, 2009[113][114]143iPhone OS 3.0June 17, 2009PwnageTooliPhone Dev TeamJune 19, 2009[115]2iPhone 3GSJune 19, 2009purplera1nGeorge HotzJuly 3, 2009[116]14iPadApril 30, 2010SpiritcomexMay 3, 2010[89]3iOS 4.0June 21, 2010PwnageTooliPhone Dev TeamJune 23, 2010[117][118]2iPhone 4June 24, 2010JailbreakMe2.0comexAugust 1, 2010[90]38Apple TV (2nd generation)September 1, 2010PwnageTooliPhone Dev TeamOctober 20, 2010[119]49iPad 2March 11, 2011JailbreakMe 3.0comexJuly 5, 2011[93]116iOS 5.0October 12, 2011redsn0wiPhone Dev TeamOctober 13, 2011[84]1iPhone 4SOctober 14, 2011Absinthepod2g, Chronic Dev Team, iPhone Dev TeamJanuary 20, 2012[69][70]98Apple TV (3rd generation)March 7, 2012----iPad (3rd generation)March 16, 2012Absinthe 2.0pod2g, Chronic Dev Team, iPhone Dev TeamMay 25, 201270iOS 6.0September 19, 2012redsn0wiPhone Dev TeamSeptember 19, 20120iPhone 5September 21, 2012evasi0nevad3rsFebruary 4, 2013136iPod touch (5th generation)October 23, 2012evasi0nevad3rsFebruary 4, 2013104iPad (4th generation)November 2, 2012evasi0nevad3rsFebruary 4, 201394iPad MiniNovember 2, 2012evasi0nevad3rsFebruary 4, 201394iOS 7September 18, 2013evasi0n7evad3rsDecember 22, 201395iPhone 5CSeptember 20, 2013evasi0n7evad3rsDecember 22, 201393iPhone 5SSeptember 20, 2013evasi0n7evad3rsDecember 22, 201393iPad AirNovember 1, 2013evasi0n7evad3rsDecember 22, 201351iPad Mini 2November 12, 2013evasi0n7evad3rsDecember 22, 201340iOS 7.1-7.1.2May 29, 2014PanguPangu TeamJune 23, 201425iOS 8September 17, 2014Pangu8Pangu TeamOctober 22, 201435iPhone 6September 19, 2014Pangu8Pangu TeamOctober 22, 201433iPhone 6 PlusSeptember 19, 2014Pangu8Pangu TeamOctober 22, 201433iPad Air 2October 22, 2014Pangu8Pangu TeamOctober 22, 20140iPad Mini 3October 22, 2014Pangu8Pangu TeamOctober 22, 20140iOS 8.1.1-8.4November 17, 2014TaiG, PP JailbreakTaiG, PP JailbreakNovember 29, 201412Apple WatchApril 24, 2015----iPod touch (6th generation)July 15, 2015TaiG, PP JailbreakTaiG, PP JailbreakJuly 16, 20151iOS 9September 16, 2015----Recent releases of jailbreaking toolsEditNameRelease DateHardwareFirmwareUntethered?Developer(s)JailbreakMe3.0[120]July 5, 2011[120]
[120]4.2.6–4.2.8
4.3–4.3.3[120][notes 1]Yes[120]comex[120]Seas0npass[121]October 18, 2011[121]2nd generation Apple TV[121]4.3–5.3[121]Yes[121]redsn0w 0.9.15 beta 3[122][123]November 1, 2012
[81][122][124]4.1–6.1.6Untethered: 4.1–4.3.3, 4.2.6–4.2.8, 5.0.1, 5.1.1,[125] 5.0/5.1 (only for iPhone 3GS with old boot ROM)[123]
Tethered: 4.2.9–4.2.10, 4.3.4–4.3.5, 5.0, 5.1, 6.0–6.1.6 (not available for devices newer than the iPhone 4, iPad (1st generation), or iPod touch (4th generation))[126]
iPhone Dev Team[81]Absinthe2.0.4[100]May 30, 2012
[101]5.1.1[101]Yes[69]pod2g, Chronic Dev Team, iPhone Dev Team[100]evasi0nFebruary 4, 2013
- iPhone 3GS
- iPhone 4
- iPhone 4S
- iPhone 5
- iPod Touch (4th generation)
- iPod Touch (5th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Mini (1st generation)
6.0-6.1.2[127]Yespod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)evasi0n7December 22, 2013
- iPhone 4
- iPhone 4S
- iPhone 5
- iPhone 5S
- iPhone 5C
- iPod Touch (5th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Air
- iPad Mini (1st generation)
- iPad Mini 2
7.0-7.0.6[127]Yespod2g, MuscleNerd, pimskeks, and planetbeing (evad3rs)p0sixspwnDecember 30, 2013
- iPhone 3GS
- iPhone 4
- iPhone 4S
- iPhone 5
- iPod Touch (4th generation)
- iPod Touch (5th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Mini (1st generation)
6.1.3-6.1.6Yeswinocm, iH8sn0w, and SquiffyPwnPanguJune 23, 2014[128]
- iPhone 4
- iPhone 4S
- iPhone 5
- iPhone 5C
- iPhone 5S
- iPod Touch (5th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Air
- iPad Mini (1st generation)
- iPad Mini 2
[128]7.1-7.1.2Yesdm557, windknown, ogc557, and Daniel_K4 (@PanguTeam)Pangu8October 22, 2014
- iPhone 4S
- iPhone 5
- iPhone 5C
- iPhone 5S
- iPhone 6
- iPhone 6 Plus
- iPod Touch (5th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Air
- iPad Air 2
- iPad Mini (1st generation)
- iPad Mini 2
- iPad Mini 3
8.0-8.1Yeswindknown, ogc557, Daniel_K4, zengbanxian, INT80 (@PanguTeam)TaiGNovember 29, 2014
- iPhone 4S
- iPhone 5
- iPhone 5C
- iPhone 5S
- iPhone 6
- iPhone 6 Plus
- iPod Touch (5th generation)
- iPod Touch (6th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Air
- iPad Air 2
- iPad Mini (1st generation)
- iPad Mini 2
- iPad Mini 3
8.0-8.4YesTaiGPPJailbreakJanuary 18, 2015
- iPhone 4S
- iPhone 5
- iPhone 5C
- iPhone 5S
- iPhone 6
- iPhone 6 Plus
- iPod Touch (5th generation)
- iPod Touch (6th generation)
- iPad 2
- iPad (3rd generation)
- iPad (4th generation)
- iPad Air
- iPad Air 2
- iPad Mini (1st generation)
- iPad Mini 2
- iPad Mini 3
8.0-8.4YesPPJailbreak