Timeline – the iphone wiki electricity generation by source by country


• 18 June — iPhone Dev Team releases a new version of redsn0w (0.9.14b1), adding the capability to downgrade iPhone 3G/ 3GS Baseband from the 06.15.00 iPad baseband to the latest unlockable iPhone baseband ( 05.13.04). This allows 3G/3GS users that had upgraded to the iPad baseband, thus losing the GPS function and the ability to restore to stock firmware, to get back to an iPhone baseband, making their devices behave as intended again, as well as being unlockable by ultrasn0w.

• 14 June — iPhone Dev Team releases a developer version of redsn0w (0.9.13dev1), which jailbreaks limera1n susceptible devices running iOS 6.0 beta. This version doesn’t hacktivate nor install Cydia, as it hasn’t been ported to iOS 6 just yet. This jailbreak, however, installs afc2 and SSH, enabling developers to fix and prepare their apps to the next iOS version.

• 25 May — The Chronic Dev Team releases Absinthe 2.0, providing an untethered jailbreak for all devices except the Apple TVs and iPad 2 (iPad2,4). ( Seas0nPass was also updated to include Absinthe’s untether for the Apple TV (2nd generation).)

• 31 October — The Dev Team releases redsn0w 0.9.6b2 which jailbreaks iOS 4.1, 4.2 and 3.2.2 on every device available at the time of release (except for iPod touch (2nd generation) MC). It also includes "DFU" button allowing to flash custom IPSW from Windows (see blog post).

• 12 October — Chronic Dev Team releases greenpois0n after switching its exploit from SHAtter to limera1n, in the hope that SHAtter remains for 5th generation devices. (The exploit limera1n uses was fixed in the iBoot revision found in iOS 4.2 beta 2, which means Apple knows about the vulnerability and the next bootrom revision may have it patched.)

• 10 October — Following the first limera1n beta release, geohot released multiple versions, each fixing bugs affecting previous releases. Chronic Dev Team officialy anounces that, in order to keep SHAtter undisclosed and possibly preserve it for 5th generation devices, greenpois0n would be delayed in order to incorporate this new exploit limera1n uses.

• 8 October — Geohot comes back to the scene with a new bootrom exploit believed to work on all devices, as shown on the resurrected limera1n web site. He prompts Chronic Dev Team to use his exploit instead of SHAtter, but, since greenpois0n is already scheduled to October 10, it may be not possible. Geohot ETA’d his limera1n release to October 11, if greenpois0n can’t be changed to use this new exploit. This decision, however, would burn 2 bootrom exploits: SHAtter itself and the one used by limera1n, which is unpatchable by firmware updates.

• 12 August — Saurik releases the first version of PDF Patcher, which installs Apple’s patch for the FreeType vulnerability (used in conjunction with other exploits by Star). It works on firmwares as far back as 2.x, and renders iOS 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.

• 21 June — iPhone Dev Team releases redsn0w 0.9.5 to jailbreak 4.0 on iPhone 3G and iPhone touch (2nd generation) ( old bootrom), iPhone Dev Team releases ultrasn0w 0.93, an unlock for baseband firmwares 04.26.08, 05.11.07, 05.12.01, and 05.13.04 and Apple releases iOS 4.0

• 11 October — geohot releases blackra1n RC1, a 30 second software jailbreak for all devices, including a tethered jailbreak for the iPod touch (3rd generation), and iPhone 3GS and iPod touch (2nd generation) units with newer bootrom revisions.

• 9 September — The iPod touch (3rd generation) with S5L8922 processor is released. iPod touch (2nd generation) and iPhone 3GS units continue shipping, but with a new bootrom ( 240.5.1 and 359.3.2 respectively) that is no longer vulnerable to the 0x24000 Segment Overflow.

• 10 March — Information about the 0x24000 Segment Overflow exploit used for the iPod touch (2nd generation) untethered jailbreak is released thanks to the combined work of chronic, CPICH, posixninja, pod2g, ius, planetbeing, MuscleNerd, and co. after being leaked and sold by NitroKey. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.

• 31 January — The iPhone Dev Team released redsn0w Lite, a tethered iPod touch (2nd generation) jailbreak. It combines the ARM7 Go vulnerability with the well-established pwnage flow for other Apple mobile devices. It was bundled in a way that allowed usage on iPhone OS 2.2.1 by uploading iBoot from iPhone OS 2.1.1, which is vulnerable to ARM7 Go, to the device while in DFU Mode.

• 25 January — 0wnboot is released to chronicdev google code page, thanks to AriX, chronic, CPICH, westbaer, ius, pod2g, the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, AriX and the Chronic Dev Team got a ramdisk booting for a tethered jailbreak.