Jailbreak tool for iPhone 4, 3GS, 3G on iOS 4/4.0.1 and iPad on iOS 3.2.1 released

 

by Jeremy Sikora, Sunday, Aug 1, 2010, 158 Comments

For those of you who were patiently waiting to jailbreak your iPhone running either iOS 4 or 4.0.1, your wait is finally over as iPhone hacker Comex has released a tool to get the job done. It is a web based jailbreak so simply point your mobile safari browser towww.jailbreakme.com and your wait will be over. Heck, you can even use this tool to jailbreak your iPad running 3.2.1.

The servers seemed to be overwhelmed currently but keep checking the link above and let us know how it goes for you! If you have questions and want to learn more about jailbreaking be sure to visit our forum dedicated to the topic here.

WoW ! Feds say mobile-phone jailbreaking is OK

All I can say is that it is about time we are ALLOWED to purchase a product and USE it the way we want. However, I will say, that I can understand Apple and others position as far as customer service problems go that might arise from the jailbreaking of an iPhone  or rooting of Android phones. If you are going to (and I have already rooted my HTC Droid Incredible) then you should no longer depend on Apple, HTC, Google,AT&T, Verizon, or whatever vendor you purchased or expect support from. They can only support products that conform to what they developed and sold you. When you jailbreak or root the phone, they have lost control over the software and hardware, thus the support for it, too.

Besides, if you jailbroke or rooted your phone, then you probably went to a forum or website to get the info on how to do it and the guys that “crack” the code are very knowledgeable and in most cases will be more than glad to help you with your “hacked” phone. In other words, there is plenty of support forums out there  with guys who are MORE knowledgeable that the big guys support call centers who are normally reading from a script anyway. So, do your own support if you are having a problem and enjoy your “new” hacked phone with more features and options now and not have to worry about any ridiculous copyright laws.

Below, is an excellent article by Declan McCullagh about the new decision by the U.S. Copyright Office.

 

Jailbreaking your iPhone or other mobile device will no longer violate federal copyright law, the U.S. Copyright Office ruled Monday.

The decision, part of a process that takes place every three years, said that bypassing a manufacturer’s protection mechanisms to allow "handsets to execute software applications" is permissible.

The Copyright Office also allowed bypassing the anticopying technology used in DVDs, but only for "documentary filmmaking," noncommercial videos, and educational uses–a ruling that stopped short of allowing Americans to legally make a backup copy for their own use, in case the original DVD gets damaged. It also doesn’t apply to making backup copies of videogame discs or Blu-Ray discs.

Apple, the maker of the iPhone, had objected to the exemption for jailbreaking phones. A letter that the company sent to the Copyright Office argued that allowing jailbreaking would result "in copyright infringement, potential damage to the device and other potential harmful physical effects, adverse effects on the functioning of the device, and breach of contract."

Apple’s support department already receives "literally millions of reported instances of problems flowing from jailbroken phones," the company said, and legitimizing the practice of jailbreaking would result in more malware being delivered outside of the App Store, other security problems, and even physical damage to the iPhone.

Monday’s announcement certainly counts as a political victory for jailbreaking enthusiasts and critics of the anti-circumvention portions the 1998 Digital Millennium Copyright Act, but it may not have much of a practical effect.

Apple has never sued any of its customers on grounds that their jailbreaking violates the DMCA, even though a February 2009 estimate suggested that over 400,000 U.S. iPhone owners have done so. Nor has it filed any breach-of-contract lawsuits claiming that the software license agreement was violated.

Section 2(c) of the Apple iPhone Software License Agreement (PDF) bans any attempt to "modify" the iPhone software or to reverse-engineer it.

The Electronic Frontier Foundation, the San Francisco-based civil liberties group, had requested that the Copyright Office expand the number of exceptions in the DMCA, which has been a focus of controversy among programmers, hackers, and security researchers for over a decade. The DMCA broadly restricts, but does not flatly ban, bypassing copy protection technology.

"The Copyright Office and Librarian of Congress have taken three important steps today to mitigate some of the harms caused by the DMCA," Jennifer Granick, EFF’s civil-liberties director, said in a statement Monday. "We are thrilled to have helped free jailbreakers, unlockers, and vidders from this law’s overbroad reach."

KB971003 – Do Not Install This Update (unless?)

WARNING!!!

For Windows 7 Users

windows_7_vienna_logo-1

Microsoft came out last week with an update KB971003 that tries to validate Windows 7 upon install and if you don’t have a legitimate validated version, then it will change your wallpaper to black and start shutting you down if you can’t provide it with a legitimate validated key. It checks for several cracks that get around the validation and tries to remove them. If it prompts to restart, then it has probably already done it. All this is done in the background. What makes it worse is that it will keep checking your validation about every 90 days.

Windows Activation Technologies check your systems file and tell you whether the Windows you are using is Genuine Or not. Windows Activation Technologies protect against the risks of counterfeit . Windows Activation Technologies in Windows 7 consists of activation and validation components that contain anti-piracy features.

  • Activation is an anti-piracy technology that verifies the key for the copy of Windows 7 that is running on your computer. The product key is a 25-character code that is on the Certificate of Authenticity label or on the proof of license label. These labels are included with each genuine copy of Windows. A genuine product key can only be used on the number of computers that are specified in a software license.
  • Validation is an process that enables you to verify that the copy of Windows 7 that is running on your computer is activated correctly and is genuine.

Microsoft is well known for it’s constant tricks to make sure you are running a legitimate (according to them) copy of Windows. There have been numerous problems in the past with legitimate copies failing their validation process for numerous reasons that are well documented elsewhere. This is another one with the exception that this one will reside on your system running in the background and checking about every 90 days to make sure you copy is still “Genuine” (according to them).

The Fix

Just don’t install the update. Due to people really getting upset about them putting things on like this, they are making it an optional update so just check your updates and make sure you haven’t already installed it. Hopefully, you probably wouldn’t have if you pay any attention to what updates you get. They will probably be putting it out throughout the month or else their servers would probably go crazy with all the validation checks. Hopefully, you don’t have it yet. If you already do have it but everything still seems fine, then it just hasn’t activated yet and you should still be about to remove it from add/remove programs.

This update applies on Windows 7 Enterprise,Windows 7 Home Basic,Windows 7 Home Premium,Windows 7 Professional,Windows 7 Ultimate

However

If you do want to validate your install and risk being told that the Windows 7 software you spent over $100 for is not Genuine, then this update package is available through Windows Update and Microsoft Download Center.You may use following link to download it:-

Download link for 32 bit (x86)

Download link for 64 bit (x64)

Do NOT Download Unless You Do Want To Validate Your Copy

1024-bit RSA Encryption Cracked Using 81 p4’s

ANN ARBOR, Mich.—The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.

Since 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device’s power supply. By fluctuating the voltage to the CPU such that it generated a single hardware error per clock cycle, they found that they could cause the server to flip single bits of the private key at a time, allowing them to slowly piece together the password. With a small cluster of 81 Pentium 4 chips and 104 hours of processing time, they were able to successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system, without damaging the computer, leaving a single trace or ending human life as we know it. That’s why they’re presenting a paper at the Design, Automation and Test conference this week in Europe, and that’s why — until RSA hopefully fixes the flaw — you should keep a close eye on your server room’s power supply.

The RSA algorithm gives security under the assumption that as long as the private key is private, you can’t break in unless you guess it. We’ve shown that that’s not true," said Valeria Bertacco, an associate professor in the Department of Electrical Engineering and Computer Science.
These private keys contain more than 1,000 digits of binary code. To guess a number that large would take longer than the age of the universe, Pellegrini said. Using their voltage tweaking scheme, the University of Michagan researchers were able to extract the private key in approximately 100 hours.

sourceUniversity of Michigan

links for 2007-10-28

Check out these links to various web cams found with Google.

Anti-Piracy Organization Domain IFPI.com Now Owned by The Pirate Bay

Written by Ernesto on October 12, 2007

IFPI.com, the domain that used to belong to The International Federation of the Phonographic Industry or (IFPI) – an infamous anti-piracy organization – is mysteriously transferred to The Pirate Bay. The Pirate Bay team says it will use the domain to host the newly founded International Federation of Pirate Interests.

It’s beginning to look like the IFPI will be the next MediaDefender. Earlier this week we already posted about leaked email correspondence between a lawyer and the IFPI, in which they discussed requesting confidential information from the Swedish police on an ongoing police investigation involving The Pirate Bay.

Apparently they had plans to use this information to take on the popular BitTorrent site, but it seems that plans like that always backfire.

The main domain of the IFPI – ifpi.org – is still working, but when people try to access ifpi.com they are redirected to a Pirate Bay server, showing the text: “International Federation of Pirate Interests.”

We contacted Brokep, one of the administrators of The Pirate Bay, and he told TorrentFreak: “International Federation of Pirate Interests (IFPI) is the new international federation we’re starting in order to get the word of piracy spread.”

The WHOIS info clearly shows that ifpi.com – the domain that used to be registered to the IFPI – is now registered to Brokep. We asked him if The Pirate Bay is responsible for the domain hack, and he told us: “It’s not a hack, someone just gave us the domain name. We have no idea how they got it, but it’s ours and we’re keeping it.”

I’m sure most people will agree that the domain will be in better hands with the The Pirate Bay team. Stay tuned for more IFPI news!

Screenshot of the ifpi.com WHOIS entry, compare this to the old one.

IFPI.com Hacked, Domain Redirects to The Pirate Bay

“iPhone Dev Team” issues statement

This statement from the “iPhone Dev Team” ( the team that was 1st to unlock the iPhone) was issued in response to Apple’s statement about unlocking your iPhone. Apple said that the next available firmware update for the iPhone ” may make your phones a useless brick “. Was that a scare tactic to try to keep everyone from making their iPhones better and more useful phones, that can run 3rd party apps, and work around the world with providers other than AT&T? I think they are just trying to scare the masses, however, most people that unlock their iPhones probably know better.

I don’t have an iPhone, but I do have an unlocked Verizon xv6700 Pocket PC phone that was manufactured by HTC (the leading smartphone company) but feature blocked by Verizon. It now works like a smartphone should without any of Verizon’s restrictions.

Here is what the iPhone Dev Team had to say about Apple’s update:

 A spokesman for the iPhone Dev Team, the group that developed the iPhone unlock has issued a statement condemning Apple and promising a tool in the next week which will restore your iPhone to a factory-fresh state. The unlock, he writes, made the iPhone free and useful world-wide, not just in certain countries. The text of the statement, with modifications for grammar and spelling, follows after the break.

9/25 Statement from the iPhone unlockers

Based on download numbers, the iPhone Dev Team believes that, worldwide, several hundred thousand people have unlocked their iPhones. That number continues growing every day. The removal of the lock, a bug, was a major step forward in the iPhone development. It made the iPhone free and useful to anyone, not only to those in certain countries.

Apple now announces that the next firmware update, expected later this week, will possibly break the handset of all of us free users in the World. It speaks of “damage” done to the firmware and “unauthorized access” to our own property, The removal of those firmware problems, which were built in in favor for AT&T, does not cause “damage” as they want to make us believe.

We will provide you with a tool in the next week which will be able to recover your nck counter and seczones and even enables you to restore your phone to a Factory-like state.

In the meantime we advise you not to update your free iPhone with the upcoming firmware. Wait for the next version to be fixed to work properly with your carrier and not break your phone.

Oh Look, T-Mobile Unlocking iPhones!

Posted September 22, 2007 10:48 PM by Tanner Godarzi

T-Mobile Authorized Reseller in Kiosk form sporting this sign every so boldly near the realm of Apple:

“We unlock iPhones!”

image

This was at the Fashion Island Apple Store in Newport Beach, CA (Apple Link) and if you’ve ever ventured there you’ll know that in addition to the regular brick and mortar stores, there’s a lot of kiosks in the open areas that resemble covered wagons on the oregon trail more than anything that generates money. I walked by the T-Mobile authorized reseller and noticed this little gem above but I didn’t get a chance to ask what method this dude was using. Also accessories were available, nothing special though.

(AP) Teen ‘Unlocks’ iPhone From AT&T Network

[August 28, 2007, 9:45 am]

   

By PETER SVENSSON
AP Technology Writer
NEW YORK
0824t_iPhone_Hacker


Armed with a soldering iron and a large supply of energy drinks, a slight, curly haired teenager has developed a way to make the iPhone, arguably the gadget of the year, available to a much wider audience.

George Hotz of Glen Rock, N.J., spent his last summer before college figuring out how to “unlock” the iPhone, freeing it from being restricted to a single carrier, AT&T Inc.

The procedure, which the 17-year-old posted on his blog Thursday, raises the possibility of a cottage industry springing up to buy iPhones, unlocking them and then selling them to people who don’t want AT&T service or can’t get it, particularly overseas.

The phone, which combines an innovative touch-screen interface with the media-playing abilities of the iPod, is currently sold only in the U.S.

An AP reporter was able to verify that an iPhone Hotz brought to the AP’s headquarters on Friday was unlocked. Hotz placed the reporter’s T-Mobile SIM card, a small chip that identifies a phone to the network, in the iPhone. It then connected to T-Mobile’s network and placed calls using the reporter’s account.

T-Mobile is the only major U.S. carrier apart from AT&T that is compatible with the iPhone’s cellular technology, but smaller carriers also use the technology, known as GSM. In Europe and Asia, GSM is the dominant network technology.

The hack is complicated and requires skill with both soldering and software, and missteps may result in the iPhone becoming useless, so few people will be able to follow the instructions.

“But that’s the simplest I could make them,” Hotz said.

Technology blog Engadget on Friday reported successfully unlocking an iPhone using a different method that required no tinkering with the hardware. The software was supplied by an anonymous group of hackers that apparently plans to charge for it.

AT&T spokesman Mark Siegel and Apple spokeswoman Jennifer Bowcock said their companies had no comment on Hotz’ exploit. Hotz said the companies had not been in touch with him.

Apple shares rose $4.23, or 3.2 percent, to close at $135.30 on Friday. AT&T shares gained 26 cents, or 0.7 percent, to close at $40.36.

The iPhone has already been made to work onoverseas networks using another method, which involves copying information from the SIM chip, or Subscriber Identity Module.

The SIM-chip method does not involve any soldering, but does require special equipment, and it doesn’t unlock the phone _ each new SIM chip has to be reprogrammed for use on a particular iPhone.

Both hacks leave intact the iPhone’s many functions, including a built-in camera and the ability to access Wi-Fi networks. The only thing that won’t work is the “visual voicemail” feature, which lists voice messages as if they were incoming e-mail.

Since the details of both hacks are public, Apple may be able to modify the iPhone production line to make new phones invulnerable.

Analysts said it’s unlikely Apple would overhaul the iPhone’s wiring to thwart the new hack because the difficulty of the procedure is likely to keep it confined to hardcore hobbyists.

“I’m having a hard time figuring out where the real pain is going to come from in this,” said David Chamberlain, principal analyst with market researcher In-Stat who follows mobile devices and services. “Just selling the piece of hardware, they’ve made a niceprofit off that.”

Apple has said it plans to introduce the phone in Europe this year, but it hasn’t set a date or identified carriers.

There is apparently no U.S. law against unlocking cell phones. Last year, the Library of Congress specifically excluded cell-phone unlocking from coverage under the Digital Millennium Copyright Act. Among other things, the law has been used to prosecute people who modify game consoles to play a wider variety of games.

Hotz collaborated online with a large number of people to develop the unlocking process. Of smaller core group, two were in Russia.

“Then there are two guys who I think are somewhere U.S.-side,” Hotz said. He knows them only by their online handles.

Hotz himself spent about 500 hours on the project since the iPhone went on sale. On Thursday, he put the unlocked iPhone up for sale on eBay, where the high bid was at $12,600 late Friday. The model, with 4 gigabytes of memory, sells for $499 new.

“Some of my friends think I wasted my summer but I think it was worth it,” he told The Record of Bergen County, which reported Hotz’s hack Friday.

Hotz heads for college onSaturday. He plans to major in neuroscience _ or “hacking the brain” as he puts it _ at the Rochester Institute of Technology.

___

Associated Press Writer Jordan Robertson in San Francisco contributed to this story.

___

On the Net:

Hotz’ blog: http://iphonejtag.blogspot.com/

Apple iPhone: http://www.apple.com/iphone

Copyright 2007 by the Associated Press. All Rights Reserved.