The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "X-Gold 608 Unlock"
ChronicDev (talk | contribs) (→Class 2) |
WEsTbAeR-- (talk | contribs) (25c3 not 25cc nub) |
||
Line 13: | Line 13: | ||
* Read about the [[X-Gold 608]] |
* Read about the [[X-Gold 608]] |
||
* Read geohot's [http://iphonejtag.blogspot.com/2008/07/infineon-we-have-problem.html blog post] |
* Read geohot's [http://iphonejtag.blogspot.com/2008/07/infineon-we-have-problem.html blog post] |
||
− | * |
+ | * 25C3 presentation [http://events.ccc.de/congress/2008/Fahrplan/events/2976.en.html "Hacking the iPhone"] video [http://vimeo.com/2646755?pg=embed&sec=2646755 here] |
Revision as of 20:33, 1 January 2009
Currently, the 3G (software) unlock which is not baseband-dependent is the biggest missing piece of the iPhone community. It is more difficult than the previous unlocks due to the fact that the baseband bootloader is signature checked. The dev team has successfully unlocked all baseband versions, by a somehow patching the baseband on-the-fly (in RAM), therefore at boot the baseband bootrom can validate the bootloader, the bootloader can validate the baseband, and not until after the boot up will it be patched. The unlock (called yellowsn0w) was released on 01/01/09. [1]
Possible Methods
Class 1
- Find an exploit in the bootrom to break the chain of trust
- Improve by several orders of magnitude the NCK brute forcer, and find a way to extract the CHIPID and NORID
- Find the theorized algorithm of NCK generation
Class 2
- Use a SIM hack such as the TurboSIM Unlock
- Find a way to patch running memory to "unlock" the phone on every bootup. The dev team has accomplished this for bb version 02.28.00 with yellowsn0w
Resources
- Read about the X-Gold 608
- Read geohot's blog post
- 25C3 presentation "Hacking the iPhone" video here