SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Jailbreaking the iPhone
We Control Own iDevices.
Presented By:
Mihir Patel
• Jailbreaking allows iOS users to gain root access to the operating system
and file system.
• Jailbreaking removes certain security mechanism to allow installation and
distribution of untrusted third party applications e.g, with Cydia, an
alternate apps manager for iOS devices.
• Jailbreaking is to expand the feature set limited by Apple and its App
Store.
• Jailbreaking - which can be accomplished using various tools including
JailbreakMe.com,redsn0w,evasi0n.
• Jailbreaking void your warranty, but are not illegal.
Jailbreaking the iPhone
Jailbreaking the iPhone
Some of the things you can do with jailbroken devices
include:
• Change the interface of your iOS device
• Remove built-in apps that come with the iOS
• Install apps not authorized by Apple or available through the App
Store
• Get and install paid apps for free (however, this is theft and illegal)
• Download music, videos, ebooks, and other content for free (in some
cases, this is theft)
• Get tethering without additional fees
• Access the iOS filesystem
How to Jailbreak the iPhone
Step 1:
Firstly, it’s always best to make a backup of your device and restore it. You can do
both of these in iTunes.
Step 2:
Go to http://evasi0n.com/ and download either the Windows or OSX depending on
whether you own a Mac or PC.
Step 3: Open or save the file. Click save download.
Step 4: Connect your device via USB to your computer and click on the evasi0n
icon.
Step 5: The program will eventually require you to find and click on the new
evasi0n icon amongst your other apps.
Step 6: Device may restart but eventually the program will announce it’s
complete and your device will be jailbroken.
Step 7: Now, Cydia has found its way onto your device. Click on it, allow it to
update, click on ‘user’ when it asks you what kind of person you are and you’re
done.
Pros of Jailbreaking
• Customizations- customize the iPhone’s interface in ways not
allowed by Apple.
• Ability to modify any part of the OS to your like
• Tethering- Connect your device as a broadband modem to connect
your laptop to the Internet.
• Access to forbidden apps and services
• Set Default apps
• Themes
• Tweaks
• Use Wi-Fi Only Apps Over 3G network
• Set any song as Ringtone
• Password Protect an app or folder
• Overseas use with different carrier
Cons of Jailbreaking
• Your phone is more open to attack- change the root password
“alpine” to your desired password by SSH.
• Your battery life could suffer- Unknown apps and Process use drain
battery.
• Your phone could become less stable and secure
• Apple and your warranty- Forget to go to apple store.
• Updates and jailbreaks- No Further OTA Update from apple.
It’s simple to uninstall a jailbreak too – you just restore your device in
iTunes. You can also access iTunes, the App Store and all your apps and
backups like normal.
Types Of Jailbreak
•Tethered: With a tethered jailbreak, the device to be plugged
into a computer when turned on. if phone is not plugged into
computer and booted with special jailbreak software the device will
not enter in jailbreak state.
• Untethered: An untethered jailbreak is the preferred jailbreak
because it requires no connection to your computer except for the
initial jailbreaking process.
Untethered is always best for jailbreak.
Conclusion
• The more the iOS has been updated, the fewer the jailbreaking
incidences.
• If you do decide to jailbreak your iPhone, iPad or iPod Touch,
be sure to carefully research the apps you want to install,
because you'll be entering a world of no restrictions.
• Apple is always learn from new tweaks from cydia developer
and add that feature to new iOS update.
REFERENCES
http://cydia.saurik.com
http://www.jailbreakme.com
http://blog.iphone-dev.org
http://www.evasi0n.com
http://www.iphonehacks.com

Weitere ähnliche Inhalte

Was ist angesagt?

Data council sf amundsen presentation
Data council sf    amundsen presentationData council sf    amundsen presentation
Data council sf amundsen presentationTao Feng
 
CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicSam Bowne
 
RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석
RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석
RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석r-kor
 
SOUG Oracle Unified Audit for Multitenant Databases
SOUG Oracle Unified Audit for Multitenant DatabasesSOUG Oracle Unified Audit for Multitenant Databases
SOUG Oracle Unified Audit for Multitenant DatabasesStefan Oehrli
 
Grokking Techtalk #40: Consistency and Availability tradeoff in database cluster
Grokking Techtalk #40: Consistency and Availability tradeoff in database clusterGrokking Techtalk #40: Consistency and Availability tradeoff in database cluster
Grokking Techtalk #40: Consistency and Availability tradeoff in database clusterGrokking VN
 
The look up table (LUT)
The look up table (LUT)The look up table (LUT)
The look up table (LUT)Basel Mansour
 
Troubleshooting Memory Problems in Java Applications
Troubleshooting Memory Problems in Java ApplicationsTroubleshooting Memory Problems in Java Applications
Troubleshooting Memory Problems in Java ApplicationsPoonam Bajaj Parhar
 
Android PPT Presentation 2018
Android PPT Presentation 2018Android PPT Presentation 2018
Android PPT Presentation 2018Rao Purna
 
Apache Tez – Present and Future
Apache Tez – Present and FutureApache Tez – Present and Future
Apache Tez – Present and FutureDataWorks Summit
 
Fault tolearant system
Fault tolearant systemFault tolearant system
Fault tolearant systemarvinthsaran
 
I have come to bury the BIOS, not to open it: The need for holistic systems
I have come to bury the BIOS, not to open it: The need for holistic systemsI have come to bury the BIOS, not to open it: The need for holistic systems
I have come to bury the BIOS, not to open it: The need for holistic systemsbcantrill
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
AMD processors
AMD processorsAMD processors
AMD processorssanthu652
 

Was ist angesagt? (20)

Data council sf amundsen presentation
Data council sf    amundsen presentationData council sf    amundsen presentation
Data council sf amundsen presentation
 
CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
 
RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석
RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석
RUCK 2017 - 강병엽 - Spark와 R을 연동한 빅데이터 분석
 
First steps on CentOs7
First steps on CentOs7First steps on CentOs7
First steps on CentOs7
 
SOUG Oracle Unified Audit for Multitenant Databases
SOUG Oracle Unified Audit for Multitenant DatabasesSOUG Oracle Unified Audit for Multitenant Databases
SOUG Oracle Unified Audit for Multitenant Databases
 
Vxworks
VxworksVxworks
Vxworks
 
Grokking Techtalk #40: Consistency and Availability tradeoff in database cluster
Grokking Techtalk #40: Consistency and Availability tradeoff in database clusterGrokking Techtalk #40: Consistency and Availability tradeoff in database cluster
Grokking Techtalk #40: Consistency and Availability tradeoff in database cluster
 
The look up table (LUT)
The look up table (LUT)The look up table (LUT)
The look up table (LUT)
 
Troubleshooting Memory Problems in Java Applications
Troubleshooting Memory Problems in Java ApplicationsTroubleshooting Memory Problems in Java Applications
Troubleshooting Memory Problems in Java Applications
 
Android PPT Presentation 2018
Android PPT Presentation 2018Android PPT Presentation 2018
Android PPT Presentation 2018
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
Apache Tez – Present and Future
Apache Tez – Present and FutureApache Tez – Present and Future
Apache Tez – Present and Future
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Fault tolearant system
Fault tolearant systemFault tolearant system
Fault tolearant system
 
I have come to bury the BIOS, not to open it: The need for holistic systems
I have come to bury the BIOS, not to open it: The need for holistic systemsI have come to bury the BIOS, not to open it: The need for holistic systems
I have come to bury the BIOS, not to open it: The need for holistic systems
 
Embeded system
Embeded systemEmbeded system
Embeded system
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
AMD processors
AMD processorsAMD processors
AMD processors
 
Android ppt
Android pptAndroid ppt
Android ppt
 

Ähnlich wie Jailbreaking iOS

CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSSam Bowne
 
GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!Monika Davis
 
iPhone Jailbreaking
iPhone JailbreakingiPhone Jailbreaking
iPhone Jailbreakingclarktr2
 
How to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhoneHow to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhoneRobin
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
 
unlock iphone 4 reviews
unlock iphone 4 reviewsunlock iphone 4 reviews
unlock iphone 4 reviewsheadeachhix
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
How to speed up iPhone 4
How to speed up iPhone 4How to speed up iPhone 4
How to speed up iPhone 4Ricky Shah
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applicationseightbit
 
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step TutorialHOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step TutorialVAST ONLINE TRAFFIC™
 
Speed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and FreezingSpeed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and FreezingLillyRoberts1
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testingeightbit
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testingeightbit
 
Toorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatToorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatEric Monti
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS ConsolidatedKarter Rohrer
 

Ähnlich wie Jailbreaking iOS (20)

128-ch3.pptx
128-ch3.pptx128-ch3.pptx
128-ch3.pptx
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!
 
Jail breaking
Jail breakingJail breaking
Jail breaking
 
iOS Jail break
iOS Jail breakiOS Jail break
iOS Jail break
 
iPhone Jailbreaking
iPhone JailbreakingiPhone Jailbreaking
iPhone Jailbreaking
 
iOS Basics
iOS BasicsiOS Basics
iOS Basics
 
How to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhoneHow to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhone
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
unlock iphone 4 reviews
unlock iphone 4 reviewsunlock iphone 4 reviews
unlock iphone 4 reviews
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
How to speed up iPhone 4
How to speed up iPhone 4How to speed up iPhone 4
How to speed up iPhone 4
 
Discovering the i pad
Discovering the i padDiscovering the i pad
Discovering the i pad
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
 
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step TutorialHOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
 
Speed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and FreezingSpeed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and Freezing
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
 
Toorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatToorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for That
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 

Kürzlich hochgeladen

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Jailbreaking iOS

  • 1. Jailbreaking the iPhone We Control Own iDevices. Presented By: Mihir Patel
  • 2. • Jailbreaking allows iOS users to gain root access to the operating system and file system. • Jailbreaking removes certain security mechanism to allow installation and distribution of untrusted third party applications e.g, with Cydia, an alternate apps manager for iOS devices. • Jailbreaking is to expand the feature set limited by Apple and its App Store. • Jailbreaking - which can be accomplished using various tools including JailbreakMe.com,redsn0w,evasi0n. • Jailbreaking void your warranty, but are not illegal. Jailbreaking the iPhone
  • 3. Jailbreaking the iPhone Some of the things you can do with jailbroken devices include: • Change the interface of your iOS device • Remove built-in apps that come with the iOS • Install apps not authorized by Apple or available through the App Store • Get and install paid apps for free (however, this is theft and illegal) • Download music, videos, ebooks, and other content for free (in some cases, this is theft) • Get tethering without additional fees • Access the iOS filesystem
  • 4. How to Jailbreak the iPhone Step 1: Firstly, it’s always best to make a backup of your device and restore it. You can do both of these in iTunes. Step 2: Go to http://evasi0n.com/ and download either the Windows or OSX depending on whether you own a Mac or PC. Step 3: Open or save the file. Click save download. Step 4: Connect your device via USB to your computer and click on the evasi0n icon. Step 5: The program will eventually require you to find and click on the new evasi0n icon amongst your other apps. Step 6: Device may restart but eventually the program will announce it’s complete and your device will be jailbroken. Step 7: Now, Cydia has found its way onto your device. Click on it, allow it to update, click on ‘user’ when it asks you what kind of person you are and you’re done.
  • 5. Pros of Jailbreaking • Customizations- customize the iPhone’s interface in ways not allowed by Apple. • Ability to modify any part of the OS to your like • Tethering- Connect your device as a broadband modem to connect your laptop to the Internet. • Access to forbidden apps and services • Set Default apps • Themes • Tweaks • Use Wi-Fi Only Apps Over 3G network • Set any song as Ringtone • Password Protect an app or folder • Overseas use with different carrier
  • 6. Cons of Jailbreaking • Your phone is more open to attack- change the root password “alpine” to your desired password by SSH. • Your battery life could suffer- Unknown apps and Process use drain battery. • Your phone could become less stable and secure • Apple and your warranty- Forget to go to apple store. • Updates and jailbreaks- No Further OTA Update from apple. It’s simple to uninstall a jailbreak too – you just restore your device in iTunes. You can also access iTunes, the App Store and all your apps and backups like normal.
  • 7. Types Of Jailbreak •Tethered: With a tethered jailbreak, the device to be plugged into a computer when turned on. if phone is not plugged into computer and booted with special jailbreak software the device will not enter in jailbreak state. • Untethered: An untethered jailbreak is the preferred jailbreak because it requires no connection to your computer except for the initial jailbreaking process. Untethered is always best for jailbreak.
  • 8. Conclusion • The more the iOS has been updated, the fewer the jailbreaking incidences. • If you do decide to jailbreak your iPhone, iPad or iPod Touch, be sure to carefully research the apps you want to install, because you'll be entering a world of no restrictions. • Apple is always learn from new tweaks from cydia developer and add that feature to new iOS update.