Feeds

iPhone hack project aims to open up device

Unlocked and loaded

Internet Security Threat Report 2014

Efforts to open up the functionality of Apple's iPhone to users disinclined to sign up to expensive two year contracts with AT&T are growing.

Following the publication of a technique to get the iPod and Wi-Fi features of the device working without signing up to AT&T by reverse engineer DVD Jon, a new group has picked up the baton.

The iPhone Development Project claims to have developed software to activate the device without an AT&T account, or to re-activate the kit after an AT&T account has been cancelled.

The project has set out a list of further goals including the ability to unlock the phone, run third party applications on the device, and eventually enable disk mode. These aims go well beyond what's already been achieved. Further objectives may be added as the project progresses.

Last year, the US copyright office ruled that it was legal for consumers to unlock their mobile phones in order to use them with other carriers, a decision AT&T and Apple may seek to contest, but one which gives hackers some leeway in opening up the functionality of the iPhone. That's not to say fiddling around with the software on the iPhone is without its risk, most notably invalidating any guarantees, as the hackers behind the iPhone Development Project note.

"This website is dedicated to finding additional uses for the iPhone by (legitimately) enabling its potential capabilities, and is a place for the community to share ideas, discoveries, and solutions. It is for informational purposes only. The iPhone Dev Wiki is not responsible if you void your warranty or damage your device," it said. ®

Intelligent flash storage arrays

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?