The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "X-Gold 608 Unlock"
(→Class 1) |
(→Resources) |
||
Line 20: | Line 20: | ||
* Read about the [[X-Gold 608]] |
* Read about the [[X-Gold 608]] |
||
* Read geohot's [http://iphonejtag.blogspot.com/2008/07/infineon-we-have-problem.html blog post] |
* Read geohot's [http://iphonejtag.blogspot.com/2008/07/infineon-we-have-problem.html blog post] |
||
+ | * Read dogbert's [http://dogber1.blogspot.com/2010/06/how-to-protect-better-apple-iphone.html blog post] |
||
* 25C3 presentation [http://events.ccc.de/congress/2008/Fahrplan/events/2976.en.html "Hacking the iPhone"] video [http://vimeo.com/2646755?pg=embed&sec=2646755 here] |
* 25C3 presentation [http://events.ccc.de/congress/2008/Fahrplan/events/2976.en.html "Hacking the iPhone"] video [http://vimeo.com/2646755?pg=embed&sec=2646755 here] |
||
Revision as of 05:30, 12 July 2010
Until recently, the 3G software unlock was the biggest missing piece of the iPhone community. It proved more difficult than the previous unlocks due to the fact that the baseband bootloader is signature checked by the bootrom. The dev team has successfully unlocked baseband 04.26.08, by overriding carrier locks on-the-fly in RAM, therefore at boot the baseband bootrom can validate the bootloader, and the bootloader can validate the baseband. The unlock, code-name ultrasn0w, was released to the public on 23 June 2009 for baseband 04.26.08 only [1].
A new unlock named blacksn0w, was released by geohot on 3 November 2009 for baseband 05.11.07.
After the public release of iOS 4.0, an updated release of ultrasn0w was released, providing an unlock for all the baseband versions found in OTB 3.0 through 4.0 OS releases.
Possible Methods
Class 1
- Find an exploit in the bootrom to break the chain of trust. The Dev-Team successfully dumped the bootrom, but they won't release it as it's copyrighted code.
- Improve by several orders of magnitude the NCK brute forcer, and find a way to extract the CHIPID and NORID
- Find the theorized algorithm of NCK generation
- Factorize the RSA keys used for signing
Class 2
- Use a SIM hack such as the TurboSIM Unlock
- Find a way to patch running memory to "unlock" the phone on every bootup. This is how ultrasn0w works.
- Find an exploit in the Baseband Bootloader so you can downgrade the baseband, then use ultrasn0w. Geohot and the iPhone Dev Team found (independently) an exploit in bootloader 5.8, but it isn't useful enough as only very-early (week<30) iPhone 3G units have bootloader 5.8.
Resources
- Read about the X-Gold 608
- Read geohot's blog post
- Read dogbert's blog post
- 25C3 presentation "Hacking the iPhone" video here