Feeds

Hackers saw through iPhone AT&T shackles

But global roaming still some way off

The essential guide to IT transformation

Hackers have succeeded in (partially) unlocking the iPhone so Apple's much-hyped device can be used on at least one network other than AT&T.

Although the iPhone Development Project team has broken the shackles tying the device and AT&T directly, there are still limitations that mean customers can use pre-paid SIMs from Cingular, for example, but not yet use any SIM of their choice.

A tool called iASign will unlock the iPhone allowing it to be used with any Cingular or AT&T SIM with FULL functionality of the iPhone, avoiding the need to use the iPhone-specific SIM that comes with the device. Virtual network operator pre-paid SIMs also work, providing these operators piggy-back on AT&T's network.

Using alternative SIMs provides several advantages. In the case of a Cingular SIM, there's no need to sign up to a new two-year contract. Those whose businesses subscribe to Cingular can use company SIMs on personally-bought iPhones. Finally, those not wishing to tie themselves to a contract can use pre-paid SIMs.

Hackers have been hard at work trying to unlock the functionality of the iPhone since the devices were released in the US earlier this month. Reverse engineer Jon Lech Johansen (DVD Jon) discovered a way to get iPod and Wi-Fi - though not the phone - features of the device working without signing up to AT&T within three days of its release.

The iPhone Development Project has taken the work further with an ambitious programme of goals, including the ability to unlock the phone (partially achieved with the development of IASign) and run third party applications on the device.

Last year, the US copyright office ruled that it was legal for consumers to unlock their mobile phones in order to use them with other carriers, a decision AT&T and Apple may seek to contest, but one which gives hackers (and commercial firms) some leeway.

Unconfirmed reports suggest an unnamed UK punter succeeded in getting an iPhone bought from eBay working on Vodafone's network, again using the iASign tool.

SIM numbers are network specific and users who've tried a similar trick in Germany and Canada have failed, so we're a bit skeptical that this is a genuine runner. ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?