Feeds

T-Mobile iPhones unlocked post-purchase by iTunes

Easy way to SIM-independence for everyone else?

Secure remote control for conventional and virtual desktops

What's the difference between the locked Apple iPhone sold by T-Mobile Germany and the much more expensive unlocked version sold by the same carrier? Not a jot, it seems: the process of unlocking the handset is handled post-purchase by iTunes.

So claims local website MacNotesDe, which detailed the process. Buy an iPhone and pay the €600 'unlocking fee' - the unlocked version's €999 price minus the €399 T-Mobile wants for the locked model. T-Mobile records your handset's IMEI, which it then submits to Apple. Some 24 hours later, you activate your iPhone in the usual way using iTunes, but this time the handset is unlocked.

Some MacNotesDe correspondents report that the whole activation process takes place in seconds.

All of which suggests the iPhone checks with Apple what SIMs it's allowed to use, presumably by comparing its IMEI with Apple's master database of IMEIs and associated networks. Presumably the iPhone doesn't do this on a regular basis, only upon activation, so if clever hackers can figure out which bit of the handset's memory is set to enable to phone to accept or block certain SIMs, they'll have a simple way of unlocking the phones in future.

Past attempts at unlocking have involved all sorts of adjustements being made to the iPhone's radio software - aka the Baseband. Some even adjusted a handset's IMEI, which may have worked by assigned it a new number set as default to allow all SIMs by Apple's master IMEI database.

We shall see. In the meantime, the official unlocking process leaves the handset with firmware version 1.1.2. The quick activation process suggests Apple isn't re-patching unlocked handset's radio software.

Providing a secure and efficient Helpdesk

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
iPAD-FONDLING fanboi sparks SECURITY ALERT at Sydney airport
Breaches screening rules cos Apple SCREEN ROOLZ, ok?
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
The British Museum plonks digital bricks on world of Minecraft
Institution confirms it's cool with joining the blocky universe
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.