Featured Articles

Intel refreshes CPU roadmap

Intel refreshes CPU roadmap

Intel has revealed an update to its CPU roadmap and some things have changed in 2015 and beyond. Let’s start with the…

More...
Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 17 March 2008 10:24

iPhone 2 hacked before release

Written by Nick Farell

Image

Give up, Steve Jobs


Toymaker
Apple's attempts to lock in iPhone users with its new iPhone 2.0 have already been defeated. The iPhone Dev Team has worked out how to hack into the iPhone's bootloader.

The hack takes advantage of the way the iPhone authorizes code that can be written to memory. This means that it will be possible to allow any applications that haven't been authorized by Apple to run on the iPhone.

According to News.com, the hacking community believes this jailbreaking method, which will also let you unlock your iPhone, can't be fixed by Apple in a production version of the 2.0 software. Many are wondering why Apple is trying to keep up its control freak, one-carrier, one-country only applications blessed by Steve Jobs's policy.

It seems to be wasting a lot of time and resources, while hackers just undo its work days afterward.

More here.
Last modified on Monday, 17 March 2008 14:18
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments