Feeds

iPhone 2.0 unlock tool released, tested

Handset hacked

Secure remote control for conventional and virtual desktops

PwnageTool may also ask you for Bootloader code. It didn't ask me, possibly because I'd already placed the files on my desktop.

PwnageTool

Options for advanced users

I waited about five to ten minutes while the utility did its stuff, only to have PwnageTool tell me my iPhone wasn't in DFU mode. I went through this process a couple more times before I spotted a note on the iPhone Dev website that if you see a 'failure to prepare x12220000_4_Recovery.ipsw' error, you need to add a folder called Device Support into the iTunes folder within the Library folder that's part of your Home folder.

I opened PwnageTool's log drawer and, sure enough, that was the message I was getting at the end of the process.

Moral: read forum posts thoroughly before proceeding, and make sure you click PwnageTool's Log button so you can monitor what's going on.

PwnageTool

Expert mode continued

I created the missing folder and had one more go. This time it worked as anticipated - PwnageTool told me to turn off the iPhone then guided me through starting it again in DFU mode, so I probably didn't need to do this first.

Once again, iTunes told me the iPhone was in recovery mode, and this time, after clicking OK, I clicked on the Restore button while holding down the Alt key. This lets you manually select the firmware restoration file - I chose the one on the desktop put there by PwnageTool.

PwnageTool

Here goes...

iTunes copies across the tweaked firmware, verifies it and installs it. The handset restarts, and runs BootNeuter 2.0, which adjusts the phone's start-up code and its baseband software. When it told me it had done so, it immediately rebooted the handset.

Once it had started, the iPhone immediately connected to my network. Rather than restore the phone's contents from a back-up, I chose to treat it as a new device and sync over data, music and movies afresh.

So far, for me, it's all held up, and I've even downloaded a couple of freebies from the App Store, all without a hiccup. Still, using PwnageTool isn't as easy a process as ZiPhone made unlocking the old iPhone. And some users have had problems getting the app to run at all. If you choose to proceed, do so with caution.

Related Review
Apple iPhone 3G

Providing a secure and efficient Helpdesk

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
iPAD-FONDLING fanboi sparks SECURITY ALERT at Sydney airport
Breaches screening rules cos Apple SCREEN ROOLZ, ok?
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
A moment of brilliance? UPnP for Internet of Stuff lightbulbs
Thus doth tech of future illuminate present, etc
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.