The upgrade method is:
1. Download the corresponding device's ios firmware, which can be downloaded from Weifeng;
2. Open your computer's iTunes and connect your device through USB cable;
3. Hold down shift in iTunes, click the "Update" button, select the firmware just downloaded, and click OK.
Then you can wait for your device to turn on.
If jailbreak is aimed at some Apple devices, it is aimed at cracking the Apple operating system (IOS system) that restricts users' storage and reading rights. The jailbroken iPhone has read and write access to the bottom of the system, allowing Apple (iPhone) mobile phones to use cracked App Store software programs for free (equivalent to piracy).
Apple's iPhone, iPad and iPod touch all use the IOS system. As of March 20 18 and 10, the latest system is the fourth beta version of IOs1.3 (15e5201e).
On February 28th, 20 18 Beijing time, the foreign jailbreak team recently released the perfect jailbreak tool Electra for iOS 1 1.x, which supports all iOS devices (including iPhone, iPad and iPod) and iOS11.0-IOS65433.
The first step to crack an iOS device (iPhone, iPad or iPod touch) is to install a plug-in and unlock it after jailbreaking. Jailbreak enables third-party management tools to fully access all directories of iOS devices (iPhone, iPad or iPod touch) and install plug-ins and pirated software that change system functions.
More specifically, jailbreaking refers to taking advantage of some loopholes in the iOS system, obtaining the root rights of iOS through instructions, and then changing some programs to strengthen the functions of devices and break through the closed environment.
IOS devices (iPhone, iPad or iPod touch) were turned off when they were first bought. As ordinary users, we can't get the root right of iPhoneOS, and we can't install some software into the mobile phone.
We can only buy software through the iTunes Store in iTunes (of course, most commonly used software is free, and now some software can be directly pirated without jailbreaking), and then through Apple-approved methods (this process enables Apple to ensure that the applications installed by users on devices are signed by developers and have not been tampered with.
In this way, Apple ensures the security of user information), and copies the software we legally get to the mobile phone. But in this way, our users are firmly bound to Apple's jurisdiction. However, some useful software may not be in Apple's interest. Or in Apple's view, they may have violated consumers' information security, so they can't enter the iTunes Store.