Feeds

iPhone 2.0 unlock tool released, tested

Handset hacked

The Essential Guide to IT Transformation

PwnageTool may also ask you for Bootloader code. It didn't ask me, possibly because I'd already placed the files on my desktop.

PwnageTool

Options for advanced users

I waited about five to ten minutes while the utility did its stuff, only to have PwnageTool tell me my iPhone wasn't in DFU mode. I went through this process a couple more times before I spotted a note on the iPhone Dev website that if you see a 'failure to prepare x12220000_4_Recovery.ipsw' error, you need to add a folder called Device Support into the iTunes folder within the Library folder that's part of your Home folder.

I opened PwnageTool's log drawer and, sure enough, that was the message I was getting at the end of the process.

Moral: read forum posts thoroughly before proceeding, and make sure you click PwnageTool's Log button so you can monitor what's going on.

PwnageTool

Expert mode continued

I created the missing folder and had one more go. This time it worked as anticipated - PwnageTool told me to turn off the iPhone then guided me through starting it again in DFU mode, so I probably didn't need to do this first.

Once again, iTunes told me the iPhone was in recovery mode, and this time, after clicking OK, I clicked on the Restore button while holding down the Alt key. This lets you manually select the firmware restoration file - I chose the one on the desktop put there by PwnageTool.

PwnageTool

Here goes...

iTunes copies across the tweaked firmware, verifies it and installs it. The handset restarts, and runs BootNeuter 2.0, which adjusts the phone's start-up code and its baseband software. When it told me it had done so, it immediately rebooted the handset.

Once it had started, the iPhone immediately connected to my network. Rather than restore the phone's contents from a back-up, I chose to treat it as a new device and sync over data, music and movies afresh.

So far, for me, it's all held up, and I've even downloaded a couple of freebies from the App Store, all without a hiccup. Still, using PwnageTool isn't as easy a process as ZiPhone made unlocking the old iPhone. And some users have had problems getting the app to run at all. If you choose to proceed, do so with caution.

Related Review
Apple iPhone 3G

Build a business case: developing custom apps

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.