I've seen a lot of questions floating around and I want to try to help clear some of that up. Please Register or Log in to view images The new 3.0 firmware brought some changes on the backside of things. First of all, the img3 files (iboot, custom logos, etc) aren't encrypted anymore. That's a big bonus. However, the root file system (rootfs, it's the 200MB dmg file in the firmware) is encrypted with new keys and IVs. Each firmware previous to 3.0 had an identical ASR (Apple Software Restore) which is a file that contained all the keys and ivs of the files in plain text. This file was used by iTunes when you went to restore/update to a firmware, and the dev team used it to get the keys and ivs. Now in 3.0, Apple has decided to get all sneaky on us and basically encode those keys and ivs in the ASR. iTunes 8.1 was updated with the ability to decode this new ASR and retrieve the keys and ivs when you restore. The dev team must find a way to decode the ASR (most likely by reversing the ARM) so they can obtain the keys and ivs. Once the keys and ivs are found for the rootfs, then the jailbreak is simple, and no different than any other firmware.