SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Jailbreaking the iPhone
We Control Own iDevices.
Presented By:
Mihir Patel
• Jailbreaking allows iOS users to gain root access to the operating system
and file system.
• Jailbreaking removes certain security mechanism to allow installation and
distribution of untrusted third party applications e.g, with Cydia, an
alternate apps manager for iOS devices.
• Jailbreaking is to expand the feature set limited by Apple and its App
Store.
• Jailbreaking - which can be accomplished using various tools including
JailbreakMe.com,redsn0w,evasi0n.
• Jailbreaking void your warranty, but are not illegal.
Jailbreaking the iPhone
Jailbreaking the iPhone
Some of the things you can do with jailbroken devices
include:
• Change the interface of your iOS device
• Remove built-in apps that come with the iOS
• Install apps not authorized by Apple or available through the App
Store
• Get and install paid apps for free (however, this is theft and illegal)
• Download music, videos, ebooks, and other content for free (in some
cases, this is theft)
• Get tethering without additional fees
• Access the iOS filesystem
How to Jailbreak the iPhone
Step 1:
Firstly, it’s always best to make a backup of your device and restore it. You can do
both of these in iTunes.
Step 2:
Go to http://evasi0n.com/ and download either the Windows or OSX depending on
whether you own a Mac or PC.
Step 3: Open or save the file. Click save download.
Step 4: Connect your device via USB to your computer and click on the evasi0n
icon.
Step 5: The program will eventually require you to find and click on the new
evasi0n icon amongst your other apps.
Step 6: Device may restart but eventually the program will announce it’s
complete and your device will be jailbroken.
Step 7: Now, Cydia has found its way onto your device. Click on it, allow it to
update, click on ‘user’ when it asks you what kind of person you are and you’re
done.
Pros of Jailbreaking
• Customizations- customize the iPhone’s interface in ways not
allowed by Apple.
• Ability to modify any part of the OS to your like
• Tethering- Connect your device as a broadband modem to connect
your laptop to the Internet.
• Access to forbidden apps and services
• Set Default apps
• Themes
• Tweaks
• Use Wi-Fi Only Apps Over 3G network
• Set any song as Ringtone
• Password Protect an app or folder
• Overseas use with different carrier
Cons of Jailbreaking
• Your phone is more open to attack- change the root password
“alpine” to your desired password by SSH.
• Your battery life could suffer- Unknown apps and Process use drain
battery.
• Your phone could become less stable and secure
• Apple and your warranty- Forget to go to apple store.
• Updates and jailbreaks- No Further OTA Update from apple.
It’s simple to uninstall a jailbreak too – you just restore your device in
iTunes. You can also access iTunes, the App Store and all your apps and
backups like normal.
Types Of Jailbreak
•Tethered: With a tethered jailbreak, the device to be plugged
into a computer when turned on. if phone is not plugged into
computer and booted with special jailbreak software the device will
not enter in jailbreak state.
• Untethered: An untethered jailbreak is the preferred jailbreak
because it requires no connection to your computer except for the
initial jailbreaking process.
Untethered is always best for jailbreak.
Conclusion
• The more the iOS has been updated, the fewer the jailbreaking
incidences.
• If you do decide to jailbreak your iPhone, iPad or iPod Touch,
be sure to carefully research the apps you want to install,
because you'll be entering a world of no restrictions.
• Apple is always learn from new tweaks from cydia developer
and add that feature to new iOS update.
REFERENCES
http://cydia.saurik.com
http://www.jailbreakme.com
http://blog.iphone-dev.org
http://www.evasi0n.com
http://www.iphonehacks.com

Weitere ähnliche Inhalte

Was ist angesagt?

Blockchain In Industry 4.0
Blockchain In Industry 4.0Blockchain In Industry 4.0
Blockchain In Industry 4.0Stacey Roberts
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemAndino Maseleno
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsDipesh Bhatiya
 
Layer architecture of ios (1)
Layer architecture of ios (1)Layer architecture of ios (1)
Layer architecture of ios (1)dwipalp
 
IOS vs Android presentation by Saikrishna
IOS vs Android presentation by SaikrishnaIOS vs Android presentation by Saikrishna
IOS vs Android presentation by SaikrishnaSaikrishna Tanguturu
 
Presentation on Android operating system
Presentation on Android operating systemPresentation on Android operating system
Presentation on Android operating systemSalma Begum
 
E-commerce project in brief pdf
E-commerce project in brief pdfE-commerce project in brief pdf
E-commerce project in brief pdfkapil sharma
 
Information Systems, Data and MIS
Information Systems, Data and MISInformation Systems, Data and MIS
Information Systems, Data and MISMohit Bansal
 
MIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsMIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsSukanya Ben
 
ios vs android presentation
ios vs android presentationios vs android presentation
ios vs android presentationsahibe alam
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart ManufacturingHarrison Fortier
 

Was ist angesagt? (20)

Blockchain In Industry 4.0
Blockchain In Industry 4.0Blockchain In Industry 4.0
Blockchain In Industry 4.0
 
iCloud
iCloud iCloud
iCloud
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
Layer architecture of ios (1)
Layer architecture of ios (1)Layer architecture of ios (1)
Layer architecture of ios (1)
 
IOS vs Android presentation by Saikrishna
IOS vs Android presentation by SaikrishnaIOS vs Android presentation by Saikrishna
IOS vs Android presentation by Saikrishna
 
IOS security
IOS securityIOS security
IOS security
 
Presentation on Android operating system
Presentation on Android operating systemPresentation on Android operating system
Presentation on Android operating system
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
E-commerce project in brief pdf
E-commerce project in brief pdfE-commerce project in brief pdf
E-commerce project in brief pdf
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
ios vs android.ppt
ios vs android.pptios vs android.ppt
ios vs android.ppt
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Information Systems, Data and MIS
Information Systems, Data and MISInformation Systems, Data and MIS
Information Systems, Data and MIS
 
MIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsMIS-CH15: Managing Global Systems
MIS-CH15: Managing Global Systems
 
ios vs android presentation
ios vs android presentationios vs android presentation
ios vs android presentation
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart Manufacturing
 
Android Data Persistence
Android Data PersistenceAndroid Data Persistence
Android Data Persistence
 

Ähnlich wie Jailbreaking iOS

CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSSam Bowne
 
GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!Monika Davis
 
iPhone Jailbreaking
iPhone JailbreakingiPhone Jailbreaking
iPhone Jailbreakingclarktr2
 
How to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhoneHow to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhoneRobin
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
 
unlock iphone 4 reviews
unlock iphone 4 reviewsunlock iphone 4 reviews
unlock iphone 4 reviewsheadeachhix
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
How to speed up iPhone 4
How to speed up iPhone 4How to speed up iPhone 4
How to speed up iPhone 4Ricky Shah
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applicationseightbit
 
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step TutorialHOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step TutorialVAST ONLINE TRAFFIC™
 
Speed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and FreezingSpeed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and FreezingLillyRoberts1
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testingeightbit
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testingeightbit
 
Toorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatToorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatEric Monti
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS ConsolidatedKarter Rohrer
 

Ähnlich wie Jailbreaking iOS (20)

128-ch3.pptx
128-ch3.pptx128-ch3.pptx
128-ch3.pptx
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!GaETC: iPads, iPods, and iPhones...Oh MY!
GaETC: iPads, iPods, and iPhones...Oh MY!
 
Jail breaking
Jail breakingJail breaking
Jail breaking
 
iOS Jail break
iOS Jail breakiOS Jail break
iOS Jail break
 
iPhone Jailbreaking
iPhone JailbreakingiPhone Jailbreaking
iPhone Jailbreaking
 
iOS Basics
iOS BasicsiOS Basics
iOS Basics
 
How to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhoneHow to retrieve data from dropped broken iPhone
How to retrieve data from dropped broken iPhone
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
unlock iphone 4 reviews
unlock iphone 4 reviewsunlock iphone 4 reviews
unlock iphone 4 reviews
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
How to speed up iPhone 4
How to speed up iPhone 4How to speed up iPhone 4
How to speed up iPhone 4
 
Discovering the i pad
Discovering the i padDiscovering the i pad
Discovering the i pad
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
 
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step TutorialHOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
HOW TO UNLOCK YOUR IPHONE - iUnlock Solution Step-by-Step Tutorial
 
Speed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and FreezingSpeed up iPhone: How to Fix iPhone Lagging and Freezing
Speed up iPhone: How to Fix iPhone Lagging and Freezing
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
 
Toorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatToorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for That
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Jailbreaking iOS

  • 1. Jailbreaking the iPhone We Control Own iDevices. Presented By: Mihir Patel
  • 2. • Jailbreaking allows iOS users to gain root access to the operating system and file system. • Jailbreaking removes certain security mechanism to allow installation and distribution of untrusted third party applications e.g, with Cydia, an alternate apps manager for iOS devices. • Jailbreaking is to expand the feature set limited by Apple and its App Store. • Jailbreaking - which can be accomplished using various tools including JailbreakMe.com,redsn0w,evasi0n. • Jailbreaking void your warranty, but are not illegal. Jailbreaking the iPhone
  • 3. Jailbreaking the iPhone Some of the things you can do with jailbroken devices include: • Change the interface of your iOS device • Remove built-in apps that come with the iOS • Install apps not authorized by Apple or available through the App Store • Get and install paid apps for free (however, this is theft and illegal) • Download music, videos, ebooks, and other content for free (in some cases, this is theft) • Get tethering without additional fees • Access the iOS filesystem
  • 4. How to Jailbreak the iPhone Step 1: Firstly, it’s always best to make a backup of your device and restore it. You can do both of these in iTunes. Step 2: Go to http://evasi0n.com/ and download either the Windows or OSX depending on whether you own a Mac or PC. Step 3: Open or save the file. Click save download. Step 4: Connect your device via USB to your computer and click on the evasi0n icon. Step 5: The program will eventually require you to find and click on the new evasi0n icon amongst your other apps. Step 6: Device may restart but eventually the program will announce it’s complete and your device will be jailbroken. Step 7: Now, Cydia has found its way onto your device. Click on it, allow it to update, click on ‘user’ when it asks you what kind of person you are and you’re done.
  • 5. Pros of Jailbreaking • Customizations- customize the iPhone’s interface in ways not allowed by Apple. • Ability to modify any part of the OS to your like • Tethering- Connect your device as a broadband modem to connect your laptop to the Internet. • Access to forbidden apps and services • Set Default apps • Themes • Tweaks • Use Wi-Fi Only Apps Over 3G network • Set any song as Ringtone • Password Protect an app or folder • Overseas use with different carrier
  • 6. Cons of Jailbreaking • Your phone is more open to attack- change the root password “alpine” to your desired password by SSH. • Your battery life could suffer- Unknown apps and Process use drain battery. • Your phone could become less stable and secure • Apple and your warranty- Forget to go to apple store. • Updates and jailbreaks- No Further OTA Update from apple. It’s simple to uninstall a jailbreak too – you just restore your device in iTunes. You can also access iTunes, the App Store and all your apps and backups like normal.
  • 7. Types Of Jailbreak •Tethered: With a tethered jailbreak, the device to be plugged into a computer when turned on. if phone is not plugged into computer and booted with special jailbreak software the device will not enter in jailbreak state. • Untethered: An untethered jailbreak is the preferred jailbreak because it requires no connection to your computer except for the initial jailbreaking process. Untethered is always best for jailbreak.
  • 8. Conclusion • The more the iOS has been updated, the fewer the jailbreaking incidences. • If you do decide to jailbreak your iPhone, iPad or iPod Touch, be sure to carefully research the apps you want to install, because you'll be entering a world of no restrictions. • Apple is always learn from new tweaks from cydia developer and add that feature to new iOS update.