Feeds

T-Mobile iPhones unlocked post-purchase by iTunes

Easy way to SIM-independence for everyone else?

Secure remote control for conventional and virtual desktops

What's the difference between the locked Apple iPhone sold by T-Mobile Germany and the much more expensive unlocked version sold by the same carrier? Not a jot, it seems: the process of unlocking the handset is handled post-purchase by iTunes.

So claims local website MacNotesDe, which detailed the process. Buy an iPhone and pay the €600 'unlocking fee' - the unlocked version's €999 price minus the €399 T-Mobile wants for the locked model. T-Mobile records your handset's IMEI, which it then submits to Apple. Some 24 hours later, you activate your iPhone in the usual way using iTunes, but this time the handset is unlocked.

Some MacNotesDe correspondents report that the whole activation process takes place in seconds.

All of which suggests the iPhone checks with Apple what SIMs it's allowed to use, presumably by comparing its IMEI with Apple's master database of IMEIs and associated networks. Presumably the iPhone doesn't do this on a regular basis, only upon activation, so if clever hackers can figure out which bit of the handset's memory is set to enable to phone to accept or block certain SIMs, they'll have a simple way of unlocking the phones in future.

Past attempts at unlocking have involved all sorts of adjustements being made to the iPhone's radio software - aka the Baseband. Some even adjusted a handset's IMEI, which may have worked by assigned it a new number set as default to allow all SIMs by Apple's master IMEI database.

We shall see. In the meantime, the official unlocking process leaves the handset with firmware version 1.1.2. The quick activation process suggests Apple isn't re-patching unlocked handset's radio software.

Choosing a cloud hosting partner with confidence

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.