The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Talk:WildcardTicket"
Line 18: | Line 18: | ||
:i thought NKC was only for the iPhone 2G? 0.o [[User:Leobruh|Leobruh]] 14:47, 21 August 2010 (UTC)! |
:i thought NKC was only for the iPhone 2G? 0.o [[User:Leobruh|Leobruh]] 14:47, 21 August 2010 (UTC)! |
||
+ | ::NCK or Network Code Key is on any cellular device that gets locked to a carrier --[[User:Lilstevie|Lilstevie]] 14:52, 19 September 2010 (UTC) |
Revision as of 14:52, 19 September 2010
Theoretically, can't we just edit the .plist? and make it into the factory unlocked IMSI Mask? -- --The preceding unsigned comment was added by Leobruh (talk) 5:32, 19 August 2010 (UTC). Please consult this page for more info on how to sign pages, and how to fix this.
- The activation plist is signed, so to do this you require a jailbreak anyway. --Lilstevie 09:45, 20 August 2010 (UTC)- lilstevie
i realize that. but wouldnt this result in a permanent unlock? Leobruh 07:37, 19 August 2010 (UTC)!
I'm guessing the ticket is handled by the baseband, which requires an exploit to get unsigned code running in the first place? Iemit737 07:41, 19 August 2010 (UTC)
The wildcard ticket is also signed - simple edits break the signature and the ticket gets rejected then. rtfm cryptography 101. dogbert 16:02, 19 August 2010 (UTC)
kay but unsigned code already runs when the phone is jailbroken and has access to the filesystem. wouldnt editing the .plist be okay since the sig checks arent needed. again this is all theoretical. im jw Leobruh 18:33, 19 August 2010 (UTC)!
The baseband processor checks the signature, not the application processor. dogbert 18:36, 19 August 2010 (UTC)
ahh got ya! but would my theory work though through an exploit such as AT+XAPP? instead of a payload it just changes the .plist? Leobruh 00:15, 20 August 2010 (UTC)!
- you would still require the valid NCK for it to process the unlock in that method, the current way the payloads work for exploits in the baseband processor are adequate --Lilstevie 09:44, 20 August 2010 (UTC)