< Back
Page 5 of 5
Like this article? We recommend
Next Steps
Next Steps
At this point you should have a pretty good handle on how to ensure the safety of your iDevice user data. We covered the distinction between synchronization and backup, and you picked up some arcane and immensely valuable knowledge concerning SHSH blobs. We will cover the actual jailbreaking process in part 3 of this series; at that time we will also provide directions for restoring your iDevice to its pre-jailbreak condition.
< Back
Page 5 of 5