The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "05.08.01"
(reverting vandalism) |
|||
Line 1: | Line 1: | ||
+ | This baseband makes [[ultrasn0w]] useless in its current form because it closes the [[AT+XLOG Vulnerability]]. Apple also tightened the security in this baseband by removing about 120 AT commands, probably in the fear of new holes to be found. |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
||
− | Hacked by Chroniccommand |
Revision as of 20:22, 6 November 2009
This baseband makes ultrasn0w useless in its current form because it closes the AT+XLOG Vulnerability. Apple also tightened the security in this baseband by removing about 120 AT commands, probably in the fear of new holes to be found.