Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Privilege escalation
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Jailbreaking=== {{For|jailbreaking iOS systems|iOS jailbreaking}} In computer security, '''jailbreaking''' is defined as the act of removing limitations that a vendor attempted to hard-code into its software or services.<ref>{{Cite web |title=Definition of JAILBREAK |url=https://www.merriam-webster.com/dictionary/jailbreak |website=www.merriam-webster.com |access-date=24 December 2022 |language=en |archive-date=24 December 2022 |archive-url=https://web.archive.org/web/20221224032452/https://www.merriam-webster.com/dictionary/jailbreak |url-status=live }}</ref> A common example is the use of toolsets to break out of a [[chroot]] or [[FreeBSD jail|jail]] in [[UNIX-like]] operating systems<ref>{{Cite book|author1=Cyrus Peikari|author2=Anton Chuvakin|title=Security Warrior: Know Your Enemy|url=https://archive.org/details/securitywarrior0000peik|url-access=registration|year=2004|publisher="O'Reilly Media, Inc."|isbn=978-0-596-55239-8|page=[https://archive.org/details/securitywarrior0000peik/page/304 304]}}</ref> or bypassing [[digital rights management]] (DRM). In the former case, it allows the user to see files outside of the [[filesystem]] that the administrator intends to make available to the application or user in question. In the context of DRM, this allows the user to run arbitrarily defined code on devices with DRM as well as break out of chroot-like restrictions. The term originated with the [[iPhone]]/[[iOS]] jailbreaking community and has also been used as a term for [[PlayStation Portable]] hacking; these devices have repeatedly been subject to jailbreaks, allowing the execution of arbitrary code, and sometimes have had those jailbreaks disabled by vendor updates. [[iOS]] systems including the [[iPhone]], [[iPad]], and [[iPod Touch]] have been subject to [[iOS jailbreaking]] efforts since they were released, and continuing with each firmware update.<ref>{{Citation|url=http://paidcontent.org/article/419-apples-disagreement-with-orange-iphone-hackers/|archive-url=https://archive.today/20120729201507/http://paidcontent.org/article/419-apples-disagreement-with-orange-iphone-hackers/|url-status=dead|archive-date=2012-07-29|title=Apple's Disagreement With Orange, IPhone Hackers|publisher=paidContent.org|author=James Quintana Pearce|date=2007-09-27|access-date=2011-11-25}}</ref><ref>{{Cite web |url=http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyId=11&articleId=9054719&intsrc=hm_topic |title=Reports: Next iPhone update will break third-party apps, bust unlocks] |website=[[Computerworld]] on v1.1.3 |access-date=2008-01-01 |archive-date=2008-01-04 |archive-url=https://web.archive.org/web/20080104084911/http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyId=11&articleId=9054719&intsrc=hm_topic |url-status=dead }}</ref> iOS jailbreaking tools include the option to install package frontends such as [[Cydia]] and [[Installer.app]], third-party alternatives to the [[App Store (iOS)|App Store]], as a way to find and install system tweaks and binaries. To prevent iOS jailbreaking, Apple has made the device [[boot ROM]] execute checks for [[SHSH blob]]s in order to disallow uploads of custom kernels and prevent software downgrades to earlier, jailbreakable firmware. In an "untethered" jailbreak, the iBoot environment is changed to execute a boot ROM exploit and allow submission of a patched low level bootloader or hack the kernel to submit the jailbroken kernel after the SHSH check. A similar method of jailbreaking exists for [[S60 Platform]] [[smartphones]], where utilities such as HelloOX allow the execution of unsigned code and full access to system files.<ref>{{Cite web |url=http://dailymobile.se/forum/index.php?topic=1165.0 |title=Announcement: Forum down for maintaining |author=Phat^Trance |date=Feb 16, 2010 |website=dailymobile.se |access-date=August 30, 2016 |quote=Just wanted to let you guys know that the forum is down for maintaining. It will be back online in a day or so (i kinda messed up the config files and need to restore one day old backup, so i thought why not update the entire server platform) |url-status=dead |archive-url=https://web.archive.org/web/20090303164625/http://dailymobile.se/forum/index.php?topic=1165.0 |archive-date=March 3, 2009 }}</ref><ref>{{Cite web |url=http://symbianism.blogspot.com/2009/02/helloox-103-one-step-hack-for-symbian.html |title=HelloOX 1.03: one step hack for Symbian S60 3rd ed. phones, and for Nokia 5800 XpressMusic too |access-date=2009-07-06 |archive-date=2020-08-07 |archive-url=https://web.archive.org/web/20200807174842/http://symbianism.blogspot.com/2009/02/helloox-103-one-step-hack-for-symbian.html |url-status=live }}</ref> or edited firmware (similar to the M33 hacked firmware used for the [[PlayStation Portable]])<ref>{{Cite web |url=http://thinkabdul.com/2007/10/29/tutorial-bypass-symbian-signed-install-unsigned-sisxj2me-midlets-on-nokia-s60-v3-with-full-system-permissions/ |title=Bypass Symbian Signed & Install UnSigned SISX/J2ME Midlets on Nokia S60 v3 with Full System Permissions |access-date=2009-07-06 |archive-date=2016-09-11 |archive-url=https://web.archive.org/web/20160911140221/http://thinkabdul.com/2007/10/29/tutorial-bypass-symbian-signed-install-unsigned-sisxj2me-midlets-on-nokia-s60-v3-with-full-system-permissions/ |url-status=live }}</ref> to circumvent restrictions on [[unsigned code]]. [[Nokia]] has since issued updates to curb unauthorized jailbreaking, in a manner similar to Apple. In the case of gaming consoles, jailbreaking is often used to execute [[Homebrew (video games)|homebrew games]]. In 2011, [[Sony]], with assistance from law firm [[Kilpatrick Stockton]], sued 21-year-old [[George Hotz]] and associates of the group fail0verflow for jailbreaking the [[PlayStation 3]] (see ''[[Sony Computer Entertainment America v. George Hotz]]'' and [[PlayStation Jailbreak]]). Jailbreaking can also occur in systems and software that use generative artificial intelligence models, such as [[ChatGPT]]. In jailbreaking attacks on [[artificial intelligence]] systems, users are able to manipulate the model to behave differently than it was programmed, making it possible to reveal information about how the model was instructed and induce it to respond in an anomalous or harmful way.<ref>{{Cite web |url=https://www.techopedia.com/what-is-jailbreaking-in-ai-models-like-chatgpt |title=What is Jailbreaking in A.I. models like ChatGPT? |access-date=2023-11-01 |archive-date=2023-12-01 |archive-url=https://web.archive.org/web/20231201033428/https://www.techopedia.com/what-is-jailbreaking-in-ai-models-like-chatgpt |url-status=live }}</ref><ref>{{Cite web |url=https://www.cnbc.com/2023/02/06/chatgpt-jailbreak-forces-it-to-break-its-own-rules.html |title=ChatGPT’s ‘jailbreak’ tries to make the A.I. break its own rules, or die |access-date=2023-11-01 |archive-date=2023-03-02 |archive-url=https://web.archive.org/web/20230302105502/https://www.cnbc.com/2023/02/06/chatgpt-jailbreak-forces-it-to-break-its-own-rules.html |url-status=live }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)