Tada! The ruling just came down saying its legal to modify the software on a device. The big part of the ruling that I was looking to see more details on letting a user unlock there phone (a separate step after jailbreaking) to allow the user to run an other networks.
From NBC: Another exemption will allow owners of used cell phones to break access controls on their phones in order to switch wireless carriers.
So now that jailbreaking legal, can we look for Google Voice to come back to the iphone?? Maybe??
Now I would not expect any major changes. Apple still controls its store and can decided what will or will not be allowed in the store, so in practical terms, nothing major will change short of Apple now having a harder time saying jailbreaking and unlocking will violate your terms of service or your warranty.
Now this ruling does not say that its NOT a violation of your agreement explicitly, and thus Apple COULD still hassle you for jailbreak at the Apple store if you brick it (although I have never seen this happen) .
I will update this post as I get more information.
From NBC: Owners of the iPhone will be able to break electronic locks on their devices in order to download applications that have not been approved by Apple. The government is making that legal under new rules announced Monday.
The office looks at copyright law every three years in order to make revisions or exemptions. The six “classes” now exempt from prosecution under the DMCA are:
1. Defeating a lawfully obtained DVD’s encryption for the sole purpose of short, fair use in an educational setting or for criticism
(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
(3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
4. Circumventing video game encryption (DRM) for the purposes of legitimate security testing or investigation
5. Cracking computer programs protected by dongles when the dongles become obsolete or are no longer being manufactured
6. Having an ebook be read aloud (is for the blind) even if that book has controls built into it to prevent that sort of thing.