Feeds

iPhone hackers update jailbreak, unlock tools for 3GS

Quick, before Apple updates its code...

Choosing a cloud hosting partner with confidence

The iPhone Dev Team has formally announced that it has posted versions of its unlocking and jailbreaking tools that work with the iPhone 3GS.

The group of handset hackers had been holding off such a release, fearing it would force Apple's coders to clog the hole the jailbreaking utility, redsn0w, uses.

However, last week erstwhile Team member George Hotz released his own jailbreaking tool, purlera1n, which uses the same vulnerability to open up the handset to allow apps not blessed by Apple to be installed on it.

The new redsn0w release allows 3GS owners to install and run ultrasn0w, the Dev Team's unlocking utility.

For now, at least. The question is, how quickly will Apple move to patch the hole that allows the Team's code to get into the handset?

For that reason, the Team cautioned would-be 3GS owners that what works with handsets already in punters' hands may not work with freshly purchased iPhones.

Hotz said last week that if Apple does block the hole, he's confident he can find another.

The Team also warned against applying future official OS updates using iTunes in case Apple changes the 3GS' modem firmware to disable the current generation of unlocking tools. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.