Feeds

iPhone 3G S unlock path discovered

Liberation from O2, AT&T etc coming soon?

Build a business case: developing custom apps

Hardware hackers the iPhone Dev Team claim to have discovered a way to both unlock and jailbreak the new iPhone 3G S.

The group said that the so-called '24Kpwn' exploit – originally identified on the iPhone 2G – “is still applicable to the boot Rom of the iPhone 3G S”.

The team thinks the exploit is the result of Apple signing off on the 3G S’ boot Rom back in August 2008 – before the 24Kpwn exploit was exposed.

Thanks to this discovery, the group claimed that the latest iPhone model can be jailbroken and unlocked using a similar technique to that used by the team’s famous redsn0w tool to free earlier iPhone models from O2’s clutches.

The iPhone Dev Team hasn’t said how long it’ll take to update redsn0w, its tool for unlocking the iPhone 3G, so sit tight. ®

Build a business case: developing custom apps

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
Apple to build WORLD'S BIGGEST iStore in Dubai
It's not the size of your shiny-shiny...
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.