There’s a nice piece of reporting from Ian Shapira in today’s Washington Post entitled, “Once the Hobby of Tech Geeks, iPhone Jailbreaking Now a Lucrative Industry.” In the article, Shapira documents the rise of independent, unauthorized Apple apps (especially tethering apps) and points out that what was once a small black market has now turned into a booming, maturing business sector in its own right. In fact, Sharpia notes, there are already “market leaders” in the field:
At the top of the jailbreaking hierarchy sits Jay Freeman, 29, the founder and operator of Cydia, the biggest unofficial iPhone app store, which offers about 700 paid designs and other modifications out of about 30,000 others that are free. Based out of an office near Santa Barbara, Calif., Freeman said Cydia, launched in 2008, now earns about $250,000 after taxes in profit annually. He just hired his first full-time employee from Delicious, the Yahoo-owned bookmarking site, to improve Cydia’s design. “The whole point is to fight against the corporate overlord,” Freeman said. “This is grass-roots movement, and that’s what makes Cydia so interesting. Apple is this ivory tower, a controlled experience, and the thing that really bought people into jailbreaking is that it makes the experience theirs.”
In another sign this black market is now going mainstream, advertisers are apparently flocking to it:
In what might be the ultimate sign that the jailbreak industry is losing its anti-establishment character, Toyota recently offered a free program on Cydia’s store, promoting the company’s Scion sedan. Once installed, the car is displayed on the background of the iPhone home screen, and the iPhone icons are re-fashioned to look like the emblem on the front grill.
Interestingly, however, some people now complain that Cydia is getting too big for its britches and has come to be “as domineering as Apple is in the non-jailbreak world.” What delicious irony! Yet, I do not for one minute believe that Cydia has any sort of “lock” on the “unlocking” marketplace. This is an insanely dynamic sector that is subject to near-constant fits of disruptive technological change.
Anyway, I feel a bit vindicated when I read articles like Shapira’s since I have spent the last few years pushing back against the theories set forth by various scholars, such as Jonathan Zittrain and Tim Wu, who claim that online openness or “generativity” are dying. They often cite Apple as the big, bad boogeyman of closed code and claim that Steve Jobs is hellbent on destroying digital generativity and the open Internet as we know it.
Of course, it is certainly true that Jobs and Apple prefer a more “closed” model that grants them more control over their products, such as the iPhone and iPad. And they make some good arguments why a certain amount of control is a good thing. It helps to have a more standardized platform for developers, for example, by avoiding fragmentation. A certain degree of control can also help to crack down on malicious apps in the App Store. And without a certain amount of control it becomes hard to honor warranties when phones or apps break.
Despite those excuses, Apple is still just a bit too domineering for some of us. I don’t own any of their products. Never have; never will. If it’s not tinker-friendly right out of the box, it’s just not for me. I cannot even begin to count how many times I have rooted and installed new ROMs on my Droid OG. (Thank You CyanogenMod!) And I bricked my last Windows Mobile 6 phone after repeated hacking.
And, yet, Apple is still wildly successful and has millions of extremely happy customers who — for reasons that still boggle my mind — are willing to line up in the wee hours of the cold morning around the block in front Apple Stores to get their hands on the latest goodies the company has to offer. (Seriously, what is wrong with you people!)
But this gets back to the point I have reiterated in my debates with Zittrain, Wu, and the other “openness evangelicals”: Even if I share their general love of more “open” and “generative” platforms or devices, there’s no reason to be nearly as worried as they are about them “dying.” And there’s certainly no need for drastic action, especially of a regulatory nature, to work this out. The market for openness is working marvelously. Innovation continues to unfold rapidly in both directions along the “open” vs. “closed” continuum. Moreover, there certainly isn’t any shortage of digital “generativity” taking place on both open and closed platforms today. Again, even though Jobs and Apple try to control their platform and App Store, some amazingly generative things are happening there every day and consumers absolutely adore their Apple devices.
Anyway, I discussed all these issues in much greater detail in my chapter on “The Case for Internet Optimism, Part 2 – Saving the Net From Its Supporters,” which was included in the book, The Next Digital Decade: Essays on the Future of the Internet (2011). Simply stated, things are getting more open all the time and there’s just no putting the generativity genie back in the bottle. Here’s a short section that appears on page 149 of the book related to the issues discussed here:
Things Are Getting More Open All the Time Anyway
Most corporate attempts to bottle up information or close off their platforms end badly. The walled gardens of the past failed miserably. In critiquing Zittrain’s book, Ann Bartow has noted that “if Zittrain is correct that CompuServe and America Online (AOL) exemplify the evils of tethering, it’s pretty clear the market punished those entities pretty harshly without Internet governance-style interventions.” Indeed, let’s not forget that AOL was the big, bad corporate boogeyman of Lessig’s Code and yet, just a decade later, it has been relegated to an also-ran in the Internet ecosystem.
There are few reasons to believe that today’s efforts to build such walled gardens would end much differently. Indeed, increasingly when companies or coders erect walls of any sort, holes form quickly. For example, it usually doesn’t take long for a determined group of hackers to find ways around copy/security protections and “root” or “jailbreak” phones and other devices. Once hacked, users are usually then able to configure their devices or applications however they wish, effectively thumbing their noses at the developers. This process tends to unfold in a matter of just days, even hours, after the release of a new device or operating system.
Number of Days Before New Devices Were “Rooted” or “Jailbroken”
|original iPhone||10 days|
|original iPod Touch||35 days|
|iPhone 3G||8 days|
|iPhone 3GS||1 day|
|iPhone 4||38 days|
|T-Mobile G1 (first Android phone)||13 days|
|Palm Pre||8 days|
Of course, not every user will make the effort—or take the risk—to hack their devices in this fashion, even once instructions are widely available for doing so. Nonetheless, even if copyright law might sometimes seek to restrict it, the hacking option still exists for those who wish to exercise it. Moreover, because many manufacturers know their devices are likely to be hacked, they are increasingly willing to make them more “open” right out of the gates or offer more functionality/flexibility to make users happy
 Bartow, supra note 17 at 1088, www.michiganlawreview.org/assets/pdfs/108/6/bartow.pdf
 “In living proof that as long as there’s a thriving geek fan culture for a device, it will never be long for the new version to be jailbroken: behold iOS 4.1. Most people are perfectly willing to let their devices do the talking for them, accept what’s given, and just run sanctioned software. But there are those intrepid few—who actually make up a fairly notable portion of the market—who want more out of their devices and find ways around the handicaps built into them by the manufacturers.” Kit Dotson, New iOS for Apple TV Firmware Released, Promptly Decrypted, SiliconAngle, Sept. 28, 2010, http://siliconangle.com/blog/2010/09/28/new-ios-for-apple-tv-firmware-released-promptly-decrypted
 Original research conducted by author and Adam Marcus based on news reports.
 Rooting or jailbreaking a smartphone creates the risk of “bricking” the device—rendering it completely inoperable (and thus no more useful than a brick). Additionally, hacking devices in this fashion typically voids any manufacturer warranty.