<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lug.mtu.edu/w/index.php?action=history&amp;feed=atom&amp;title=Minutes_2026-04-09</id>
	<title>Minutes 2026-04-09 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lug.mtu.edu/w/index.php?action=history&amp;feed=atom&amp;title=Minutes_2026-04-09"/>
	<link rel="alternate" type="text/html" href="https://lug.mtu.edu/w/index.php?title=Minutes_2026-04-09&amp;action=history"/>
	<updated>2026-04-16T20:08:29Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://lug.mtu.edu/w/index.php?title=Minutes_2026-04-09&amp;diff=8096&amp;oldid=prev</id>
		<title>Freya: Created page with &quot;Presentation by Simone on iOS Jailbreaking  * What is it? ** Remove restrictions ** Root access ** Sideloading apps ** Bypass code signing * Tools ** Cydia (old) ** Sileo ** Checkra1n * iOS Architecture ** Darwin kernel (derived from FreeBSD) ** Enforces code signing ** Apps are sandboxed ** Secure boot chain (iBoot) * How does it work? ** Exploits *** Bootrom exploits like checkra1n and redsn0w, which are usually unpatchable *** Userland exploits through apps or tools,...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lug.mtu.edu/w/index.php?title=Minutes_2026-04-09&amp;diff=8096&amp;oldid=prev"/>
		<updated>2026-04-09T23:29:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Presentation by Simone on iOS Jailbreaking  * What is it? ** Remove restrictions ** Root access ** Sideloading apps ** Bypass code signing * Tools ** Cydia (old) ** Sileo ** Checkra1n * iOS Architecture ** Darwin kernel (derived from FreeBSD) ** Enforces code signing ** Apps are sandboxed ** Secure boot chain (iBoot) * How does it work? ** Exploits *** Bootrom exploits like checkra1n and redsn0w, which are usually unpatchable *** Userland exploits through apps or tools,...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Presentation by Simone on iOS Jailbreaking&lt;br /&gt;
&lt;br /&gt;
* What is it?&lt;br /&gt;
** Remove restrictions&lt;br /&gt;
** Root access&lt;br /&gt;
** Sideloading apps&lt;br /&gt;
** Bypass code signing&lt;br /&gt;
* Tools&lt;br /&gt;
** Cydia (old)&lt;br /&gt;
** Sileo&lt;br /&gt;
** Checkra1n&lt;br /&gt;
* iOS Architecture&lt;br /&gt;
** Darwin kernel (derived from FreeBSD)&lt;br /&gt;
** Enforces code signing&lt;br /&gt;
** Apps are sandboxed&lt;br /&gt;
** Secure boot chain (iBoot)&lt;br /&gt;
* How does it work?&lt;br /&gt;
** Exploits&lt;br /&gt;
*** Bootrom exploits like checkra1n and redsn0w, which are usually unpatchable&lt;br /&gt;
*** Userland exploits through apps or tools, usually get patched very quickly&lt;br /&gt;
** Attempt privilege escalation&lt;br /&gt;
** Patch out kernel protections&lt;br /&gt;
*** Caries wildly by iOS version and device&lt;br /&gt;
* Types of jailbreaks&lt;br /&gt;
** Untethered&lt;br /&gt;
*** Full reboot persistence&lt;br /&gt;
*** Died out by iOS 9&lt;br /&gt;
** Semi-untethered&lt;br /&gt;
*** No reboot persistence&lt;br /&gt;
*** Requires an app to jailbreak each boot&lt;br /&gt;
*** Apps must be resigned each week&lt;br /&gt;
*** Most common type&lt;br /&gt;
** Semi-tethered&lt;br /&gt;
*** Requires a computer to jailbreak each boot&lt;br /&gt;
*** Most bootrom exploits are this type&lt;br /&gt;
*** Computer tool overrides iOS boot chain&lt;br /&gt;
** Tethered&lt;br /&gt;
*** Requires a computer each boot&lt;br /&gt;
*** Rare&lt;br /&gt;
** Demo using iOS 10 on an iPhone 5S&lt;br /&gt;
*** Using browser exploit called Totally Not Spyware&lt;br /&gt;
**** Creates a popup saying the kernel was patched&lt;br /&gt;
*** Zebra is the package manager for this jailbreak&lt;br /&gt;
*** Reloaded into jailbroken state with theme&lt;br /&gt;
*** Hard crashed :(&lt;br /&gt;
*** After jailbreaking again, it reloads again and then died immediately.&lt;br /&gt;
** What you can do&lt;br /&gt;
*** Install package manager&lt;br /&gt;
**** Cydia, Sileo, Zebra&lt;br /&gt;
**** Frontends for apt&lt;br /&gt;
*** Customization&lt;br /&gt;
**** Theming&lt;br /&gt;
**** UI modifications&lt;br /&gt;
*** Modify app or system behavior&lt;br /&gt;
*** SSH server&lt;br /&gt;
** Jailbreaking is dead now&lt;br /&gt;
*** Modern iOS is much more secure&lt;br /&gt;
**** Signed boot chain&lt;br /&gt;
**** Page protection to stop kernel read and write&lt;br /&gt;
**** Pointer authentication code&lt;br /&gt;
**** Hasn&amp;#039;t been a bootrom exploit in years&lt;br /&gt;
*** Can&amp;#039;t downgrade iOS&lt;br /&gt;
**** Every iOS version is signed per individual device&lt;br /&gt;
**** SHSH blob must be saved to downgrade, but must be saved while still signed by Appled&lt;br /&gt;
**** Firmware incompatibilities&lt;br /&gt;
*** Apple hired prominent Jailbreak developers&lt;br /&gt;
**** Bug bounty programs&lt;br /&gt;
*** Apple added some Jailbreak features to stock iOS&lt;br /&gt;
**** Dark theme&lt;br /&gt;
**** Icon themes&lt;br /&gt;
** Jailbreak compatibility&lt;br /&gt;
*** iPhone X and older&lt;br /&gt;
**** All versions vulnerable&lt;br /&gt;
**** Bootrom and software exploits&lt;br /&gt;
**** Devices are no longer supported by Apple&lt;br /&gt;
*** Newer devices&lt;br /&gt;
**** Userland exploits on iOS 17 and older&lt;br /&gt;
**** Generally don&amp;#039;t exist now&lt;br /&gt;
** Risks&lt;br /&gt;
*** Security risks&lt;br /&gt;
*** Can be unstable&lt;br /&gt;
*** Some apps will break&lt;br /&gt;
**** Games&lt;br /&gt;
**** Banking apps&lt;br /&gt;
*** Updating iOS usually patches the exploit&lt;br /&gt;
*** Legal grey area&lt;br /&gt;
**** Not exactly illegal&lt;br /&gt;
**** Violates Apple EULA&lt;/div&gt;</summary>
		<author><name>Freya</name></author>
	</entry>
</feed>