<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://diff.wiki/index.php?action=history&amp;feed=atom&amp;title=Differences_between_Tethered_Jailbreak_and_Untethered_Jailbreak</id>
	<title>Differences between Tethered Jailbreak and Untethered Jailbreak - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://diff.wiki/index.php?action=history&amp;feed=atom&amp;title=Differences_between_Tethered_Jailbreak_and_Untethered_Jailbreak"/>
	<link rel="alternate" type="text/html" href="https://diff.wiki/index.php?title=Differences_between_Tethered_Jailbreak_and_Untethered_Jailbreak&amp;action=history"/>
	<updated>2026-04-07T19:24:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.34.1</generator>
	<entry>
		<id>https://diff.wiki/index.php?title=Differences_between_Tethered_Jailbreak_and_Untethered_Jailbreak&amp;diff=3451&amp;oldid=prev</id>
		<title>Dwg: Article written and Venn diagram created.</title>
		<link rel="alternate" type="text/html" href="https://diff.wiki/index.php?title=Differences_between_Tethered_Jailbreak_and_Untethered_Jailbreak&amp;diff=3451&amp;oldid=prev"/>
		<updated>2026-02-23T09:04:51Z</updated>

		<summary type="html">&lt;p&gt;Article written and Venn diagram created.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Comparison Article ==&lt;br /&gt;
Jailbreaking is the process of removing software restrictions imposed by Apple on devices running the iOS, iPadOS, tvOS, and watchOS operating systems. This privilege escalation allows root access to the file system, enabling the installation of applications, themes, and tweaks unavailable through the official App Store. The primary distinction between jailbreak types is the method required to reboot the device and whether the jailbroken state persists after a power cycle.&lt;br /&gt;
&lt;br /&gt;
== Comparison of tethered and untethered jailbreaks ==&lt;br /&gt;
&lt;br /&gt;
Jailbreaks are categorized by their persistence and the requirements for the initial boot sequence. A tethered jailbreak relies on a connection to an external computer to complete the boot process. An untethered jailbreak allows the device to boot into a jailbroken state independently.&lt;br /&gt;
&lt;br /&gt;
=== Tethered jailbreak ===&lt;br /&gt;
&lt;br /&gt;
A tethered jailbreak requires a USB connection to a computer every time the device is powered on. A desktop utility must &amp;quot;push&amp;quot; the necessary patches to the device to allow it to boot past the Apple logo. If the device restarts or the battery dies without a computer nearby, it remains in a non-functional state or enters recovery mode.&lt;br /&gt;
&lt;br /&gt;
These jailbreaks often utilize hardware vulnerabilities in the BootROM (Boot Read-Only Memory). Because the BootROM is hardware-based, the vulnerability cannot be patched by Apple through software updates. An example of this is the &amp;quot;checkm8&amp;quot; exploit, which affects devices with A5 through A11 chips.&lt;br /&gt;
&lt;br /&gt;
=== Untethered jailbreak ===&lt;br /&gt;
&lt;br /&gt;
An untethered jailbreak is the most convenient for the user. Once the device is jailbroken, it can be rebooted at any time without external hardware. The exploit chain is designed to run automatically during the boot sequence.&lt;br /&gt;
&lt;br /&gt;
Developing an untethered jailbreak is complex because it requires multiple vulnerabilities to bypass various layers of the iOS security stack, including Kernel Patch Protection (KPP) or Kernel PAC (Pointer Authentication Code). Untethered jailbreaks have become increasingly rare on modern iOS versions as Apple has hardened the boot chain.&lt;br /&gt;
&lt;br /&gt;
=== Comparison table ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Feature !! Tethered Jailbreak !! Untethered Jailbreak&lt;br /&gt;
|-&lt;br /&gt;
| Persistence | Lost upon reboot | Permanent until restored&lt;br /&gt;
|-&lt;br /&gt;
| Booting requirement | Connection to computer via USB | No external hardware needed&lt;br /&gt;
|-&lt;br /&gt;
| Hardware access | Often uses BootROM exploits | Usually uses software-level kernel exploits&lt;br /&gt;
|-&lt;br /&gt;
| User convenience | Low; device is unusable if it reboots | High; functions like a stock device&lt;br /&gt;
|-&lt;br /&gt;
| Patchability | Often unpatchable via software | Patchable via iOS updates&lt;br /&gt;
|-&lt;br /&gt;
| Modern availability | Limited to older hardware | Very rare for current iOS versions&lt;br /&gt;
|-&lt;br /&gt;
| Implementation | Uses DFU mode for patching | Installed via app or web browser&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[File:Venn_diagram_Differences_between_Tethered_Jailbreak_versus_Untethered_Jailbreak_comparison.png|thumb|center|800px|alt=Venn diagram for Differences between Tethered Jailbreak and Untethered Jailbreak|Venn diagram comparing Differences between Tethered Jailbreak and Untethered Jailbreak]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Related variants ===&lt;br /&gt;
&lt;br /&gt;
While tethered and untethered were the primary categories in early iOS history, two intermediate types emerged as security increased:&lt;br /&gt;
&lt;br /&gt;
* **Semi-tethered**: The device can boot without a computer, but jailbreak features (like Cydia) do not work. A computer is required to re-enable the jailbreak.&lt;br /&gt;
* **Semi-untethered**: The device boots normally into a stock state. The jailbreak is re-enabled by running an application on the device itself, such as Unc0ver or Odyssey, rather than using a computer.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ForbesCheckm8&amp;quot;&amp;gt;Greenberg, Andy. (2019). &amp;quot;A &amp;#039;Permanent&amp;#039; iPhone Jailbreak Exploit Is Now Public.&amp;quot; &amp;#039;&amp;#039;Wired&amp;#039;&amp;#039;.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ArsTechnicaJailbreak&amp;quot;&amp;gt;Goodin, Dan. (2014). &amp;quot;New untethered jailbreak for iOS 7.1.1 is released by Chinese team.&amp;quot; &amp;#039;&amp;#039;Ars Technica&amp;#039;&amp;#039;.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ZDNetSecurity&amp;quot;&amp;gt;Whittaker, Zack. (2013). &amp;quot;How the &amp;#039;Evasi0n&amp;#039; jailbreak works.&amp;quot; &amp;#039;&amp;#039;ZDNet&amp;#039;&amp;#039;.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;VergeExploit&amp;quot;&amp;gt;Zelenko, Michael. (2019). &amp;quot;A new exploit could lead to a permanent jailbreak for 10 generations of iPhone.&amp;quot; &amp;#039;&amp;#039;The Verge&amp;#039;&amp;#039;.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Comparisons]]&lt;/div&gt;</summary>
		<author><name>Dwg</name></author>
		
	</entry>
</feed>