Feeds

Hacker springs latest iPhone OS from Jobsian jail

Mac users need not apply

Seven Steps to Software Security

One of the world's foremost iPhone hackers has just released software for jailbreaking the latest firmware released for the Apple smartphone.

Geohot's Blackra1n lets Windows users jailbreak iPhone OS 3.1.2 on all iPhone and iPod Touch models regardless of their hardware generation. The tool, which in 30 seconds allows handset users to run software not authorized by Apple, doesn't work on Macs. Those users will have to continue using an older version of the firmware.

This weekend's release by Geohot, the hacker whose real name is George Hotz, continues the race among iPhone users providing ways to get around the artificial restrictions Apple places on the popular smartphone. The other leading contender has been the Pwnage Tool, designed by the iPhone Dev Team. At time of writing, that group was still warning iPhone users to hold off installing the latest iPhone OS.

But unlike the Pwnage Tool, Blackra1n can't be used to unlock iPhones so they work on unauthorized cellular networks. If you've already unlocked your phone, don't use Blackra1n on it. If you do, your device will be jailbroken but won't work with unauthorized carriers.

Unofficial reports from iPhone users suggest Blackra1n works as advertised. For successful results, users will have to upgrade to the latest version of iTunes. From there, plug the iPhone or iPod Touch using the standard USB cable and follow the directions and the device should be sprung from the Apple-imposed lock-down in about half a minute.

Geohot was the first hacker to jailbreak the iPhone shortly after its official debut in mid 2007. He was also among the first to jailbreak the iPhone GS model. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.