iPhone Dev Team announces working jailbreak for iPhone 4S, iPad 2

Posted by:
Date: Friday, January 20th, 2012, 05:16
Category: Hack, News, Software

It’s not quite as much of a back-and-forth arms race between Apple and the hackers as it used to be, but it’s still interesting if you want to use an unlocked or jailbroken iOS device.

Per Electronista, the iPhone Dev Team have announced that they are close to releasing the Corona A5 jailbreak for the iPhone 4S and iPad 2. The team says that it has overcome the technical hurdles associated with the underlying technique and that all that remains is bug fixes before a general release is made available. The release will work on iPhone 4S’ running iOS 5.0 (9A334), 5.0.1 (9A405) and 5.0.1 (9A406), as well as the iPad 2 running iOS 5.01 (9A405).

The Dev Team have also promised that the GUI will remain streamlined and that they will give users access to command-line interface so that they can run their own scripts and further customize their devices. Ultimately, the Dev Team expects that the Corona jailbreak will be integrated into redsn0w, although there will be some changes to the way it has worked in the past.

The Dev Team have warned users ahead of installing the Corona release that if they are looking to achieve an eventual software-based carrier unlock, that they should stay at iOS 5.0. They also warn that as the Corona jailbreak has never been done before, that as such, users should back up all their content before attempting the install when it becomes available.

Stay tuned for additional details as they become available.

Developers unveil demo of MobileX hack, allow Apple TV units to run full-screen iOS apps

Posted by:
Date: Monday, January 2nd, 2012, 05:19
Category: Apple TV, Hack, News

This could prove really nifty.

Per AppleInsider, hackers have developed a workaround that enables full-screen versions of iOS apps for the iPad to run on a jailbroken Apple TV device.

Steve Troughton-Smith and a developer known as “TheMudkip” published over the weekend photos and video of the hack, dubbed MobileX, for Apple’s set-top box.

“MobileX is a window manager for iOS that replaces springboard with the added bonus of letting iPhone and iPad apps run on the Apple TV,” Troughton-Smith said in the video, adding that “any apps just run and scale up to the 720p resolution adequately.”

The hack appears to be in its early stages and has yet to be released to the public. In order to run the utility, the developers first performed the “Seas0nPass” jailbreak on the Apple TV. Apple has warned in the past that the jailbreak process, which allows users to run unauthorized code and apps on iOS, may void a device’s warranty.

Given that the Apple TV doesn’t include a full-featured input method such as a touchscreen, the pair used a combination of Virtual Network Computing (VNC), Secure Shell (SSH) and the Apple Remote to control the device. According to them, MobileX features a built-in menu that allows users to “quit apps, launch Safari, connect to Wi-Fi or show multiple apps side by side” from the Apple Remote.

Troughton-Smith demoed the iPad version of the FaceBook app and claimed that any of Apple’s own apps, such as Safari, Maps and YouTube also work well. VNC did, however, cause some sluggishness in some of the apps, though Troughton-Smith noted that a direct input method such as a remote or a mouse or keyboard would make performance “much smoother.”

Rumors of an AppleTV model that would allow access to the App Store have swirled for years, but developers appear to have taken matters into their own hands.

“If Apple isn’t going to give us a way to make real AppleTV apps, then I guess we’ll have to make one ourselves,” Troughton-Smith wrote in the video’s description on YouTube.

Apple released the latest version of the Apple TV in September 2010. The $99 set-top box runs on the company’s A4 processor and is a fourth the size of the first generation Apple TV.

The hack comes even as speculation on an upcoming Apple television set has heightened considerably. The release of late co-founder Steve Jobs’ biography set off a flurry of rumors after revealing that Jobs believed he had “cracked” the secret for a connected TV interface. Since then, reports have suggested that an Apple television will run on custom-built chips similar to those powering the iPhone and iPad and may come in three sizes.

Take a gander at the video and please let us know what you think in the comments:



Spire hack allows Siri to operate on jailbroken iPhones, requires proxy server

Posted by:
Date: Tuesday, December 27th, 2011, 10:38
Category: Hack, iPhone

One day, Siri will run on everything (the toaster included).

Per The Mac Observer, pre-iPhone 4S owners that like to jailbreak can add Siri to their combo smartphone and iPod thanks to a new tool called Spire from chpwn. The hack apparently works around copyright concerns by letting users install the Siri files from Apple’s own servers instead of copying them from an iPhone 4S.

While Spire may side step some copyright issues, it doesn’t necessarily make it easy to keep Siri running on your jailbroken iPhone.

“Spire is not a complete solution. Apple still requires authorization to use Siri, so information from an iPhone 4S is still required,” chpwn said on his blog. “To insert this information, Spire allows you to enter your own proxy server address.”

The trick to keeping Siri running on a jailbroken iPhone is to set up a proxy server, and then to connect an iPhone 4S to it on a regular basis since the needed authentication keys change often.

Spire isn’t a perfect solution for hackers wanting to try Siri on an older iPhone, but it tends to be easier than previous methods. For now, however, this looks like an option for more tech savvy iPhone owners.

Spire is available as a free download through the Cydia app only on jailbroken iPhones.

If you’ve tried the Spire hack and have any feedback about the process or its results, please let us know what’s on your mind in the comments.

Perhaps the Greatest Thing Ever

Posted by:
Date: Thursday, December 1st, 2011, 07:44
Category: Fun, Hack, Hardware

It’s unassailably cool, a perfect combination of cats, programmable Arduino circuitry, LEDs, Twitter and the shell from your old eMac. Per creator Samuel Cox, you too can develop an eSleeper, which turned a hollowed-out eMac into a bed for his feline. Inside the shell is an Arduino Ethernet connected to an IR sensor, some LEDs and a sound shield. When the cat breaks the infrared beam it triggers the iconic Mac chime and turns on a series color-shifting LEDs for a little mood lighting. From there the clock starts ticking.



When your gate decides it’s had enough napping and leaves the white plastic cocoon, tripping the IR sensor again, a random phrase is tweeted, along with the length of the cat’s siesta. Check out the video after the break to see the eSleeper in all its adorable DIY glory.

Check the link for full instructions as to how to build your own.

And you should, as it’ll give your cat one less reason to murder you for its own amusement.

Hacker cracks iPod nano, finds support for slew of additional supported features

Posted by:
Date: Wednesday, December 29th, 2010, 05:22
Category: Hack, iPod Nano

Irish hacker James Whelton announced Monday that he has successfully hacked Apple’s current iPod nano using a springboard hack. That process allowed him to create a “blank space” on the device by removing an app, and Mr. Whelton said that he hopes to be able to use this process to allow further modification to the device. Per The Mac Observer, Whelton stated that he also discovered support for movies, games, and more in the device.

“The springboard hack is just the removal of a app and creation of a blank space,” Mr. Whelton wrote at his site, Nanohack.me. “Not that amazing, but what’s important is the bypass of nano’s cache comparison, which compares any modded SB file and reverts it if it doesn’t like it, this opens up the possibility of hacking and modding, while not adding bootloaders or any of that fun stuff.

He was able to then root around in the devices files, and discovered a list of supported features in the nano’s preference plist file, including Movies, TV Shows, Apps, Games, vCards, Calender events.

“With the bypass I figured out,” he wrote, “I hope to enable these pretty soon.”

Mr. Whelton has opened up the process of hacking the device to other people, posting progress reports at Nanohack.me, as well as through his Twitter account. He also posted the following movie below to YouTube to demonstrate that the springboard hack was real:



As always, let us know what you think in the comments.

How to make your notebook bag smack of “Tron”-based awesomeness

Posted by:
Date: Monday, December 27th, 2010, 07:00
Category: Hack, News

Right, this is the nerdiest thing we’ve posted in a while, but it IS “Tron”-related and smacks of the awesome…

The cool cats at lifehacker have thrown together a full guide as to how to take your standard notebook bag and transform it into a cool, “Tron”-esque thing with more than just a little sewing and soldering required.

The cool glowing effect is made possible due to the use of electro-luminescent (EL) wire and a tucked-away small battery pack. If you’re not familiar with EL wire, it’s a relatively cheap, flexible product that glows when a current passes through it. Thankfully, the end result looks pretty neat, meaning you won’t look like this guy.

The videos below show working examples from Ladyada and Alan Yates, who have made a Tron-inspired laptop-bag and backpack respectively.

Give the guide a gander, see what you can do with it and if you get a cool result, please let us know so we can make you famous.

Older MacBook hacked into touch screen-equipped tablet

Posted by:
Date: Tuesday, October 5th, 2010, 04:32
Category: Hack, MacBook

It’s been done before via Axiotron’s Modbook, but it’s being done cheaper.

Per PC World, older MacBook owner Matt of Enigma Penguin took it upon himself to convert the MacBook into a touch-based tablet with interesting results.

After taking the MacBook apart and removing non-functional hardware, Matt ordered a third party touch screen. Once it arrived, he removed the MacBook’s original display and cut the lid to accommodate the touch screen. After fiddling with drivers and other finalities, he’s got thing thing up and running (as mentioned in his blog). The device also uses Ink, the Mac OS X input alternative.

Since a picture’s worth a thousand words, take a gander at the video:



As always, feel free to hurl in your comments and let us know what you make of this.

Modder attempts to turn disassembled MacBook Air into keyboard PC

Posted by:
Date: Tuesday, August 17th, 2010, 05:54
Category: Hack, MacBook Air, News

mba2

This is strange but you might like it.

Per MacStories, modder Bart Reardon has disassembled a perfectly functional MacBook Air in an attempt to make his own keyboard/mouse combo. While he’s not quite finished yet, he has managed to get all the main components to fit under an Apple keyboard and Magic Trackpad, and he’s apparently almost ready to replace all the tape holding it together with something more permanent.

A full step by step of the effort can be found on the blog and we’ll have to see where this goes and what happens…

iPhone Dev Team releases web-based hack for iPhone 4 handset

Posted by:
Date: Monday, August 2nd, 2010, 04:22
Category: Hack, iPhone, News

The iPhone Dev Team raised their hand on Sunday, releasing the first “jailbreak” for the iPhone 4, a browser-based exploit that allows users to run unauthorized code. However, some reported that the modification results in broken MMS and FaceTime functionality.

According to AppleInsider, “comex,” a member of the iPhone Dev Team, released the hack through a website, jailbreakme.com. Users can visit the site in their iPhone browser to begin the jailbreaking process.

The software modification is the first release for Apple’s latest handset hardware, the iPhone 4. Some users reported that the jailbreak managed to break FaceTime and MMS functionality on the device.

Comex announced via a Twitter post that he was able to reproduce the issues, and is working on a fix. The latest jailbreak does not work with iPads running iOS 3.2.1.

Unlike previous jailbreaks, which required users to run software on their Mac or PC and tether their iPhone to their computer, the latest hack is done entirely within the Safari browser. Users simply visit the URL to begin the process, which modifies the iOS mobile operating system found on the iPhone, iPod touch and iPad.

The iPhone 4 jailbreak comes less than a week after the U.S. Library of Congress officially made it legal for users to jailbreak their iPhone to run unauthorized software. The government approved the measure as an exemption to a federal law which prevents the circumvention of technical measures that keep users from accessing and modifying copyrighted works.

The jailbreak process, which also voids Apple’s warranty of the handset allows users to run software not approved by Apple, which has no plans to allow users to install third-party applications downloaded from outside its sanctioned App Store. Hackers have created their own custom applications (many free, and some for purchase) from an alternative storefront known as Cydia.

Jailbreaking can also be used to unlock a phone, allowing it to be used on carriers that do not have access to the iPhone.

In addition to allowing access to legitimate third-party software, both free and paid, through services like Cydia, jailbreaking can also be used to pirate App Store software, one major reason why Apple has fought the practice.

Stay tuned for additional details as they become available and if you decide to jailbreak your iPhone 4, please let us know how it goes.

AT&T web site hacked, iPad 3G user emails leaked

Posted by:
Date: Thursday, June 10th, 2010, 04:23
Category: Hack, iPad, iPhone, News

attlogo

A good hack can be seen in one of two ways:

1. It keeps a company on its toes and aware of what might come at it.

2. It’s less-than-wonderful news that makes you wonder how your information was exploited and makes a lot of people slam their heads against their desks in frustration.

Per Gawker, a group of black hat hackers have exploited a security flaw on AT&T’s web servers which enabled them to obtain email addresses from the SIM card addresses of iPad 3G users.

The breach described the event as “another embarrassment” for Apple and outlined a variety of high profile individuals whose email addresses were obtained by automated script attacks on AT&T’s web server based on their iPad 3G SIM addresses (ICC ID).

The publication claimed that the identifying information meant that thousands of iPad 3G users “could be vulnerable to spam marketing and malicious hacking,” while also pointing out that many users have actually already published their iPad ICC ID numbers in Flickr photos. Presumably, many of them also have public email addresses and therefore already receive spam like the rest of us.

The attack on AT&T’s web servers resulted in at least 114,000 iPad 3G users’ emails being leaked to the hackers, who were coy as to whether they were planning to enable others to access the data. The security leak, which returned a user’s email address when their ICC-ID was entered via a specially formatted HTTP request, has since been patched.

The group automated requests of the email address information for a wide swath of ICC-ID serial numbers using a script. No other information was discovered.

The report suggested that having known ICC IDs would leave iPad 3G users vulnerable to remote attacks, citing the attackers involved in the security breach as claiming that “recent holes discovered in the GSM cell phone standard mean that it might be possible to spoof a device on the network or even intercept traffic using the ICC ID.”

In its report, Gawker cited telephony security experts who disputed that the ICC ID email breach was a serious issue. “Vulnerabilities in GSM crypto discovered over the years, none of them involve the ICC ID […] as far as I know, there are no vulnerability or exploit methods involving the ICC ID, ” said Emmanuel Gadaix, a mobile security consultant.

The report also noted that Karsten Nohl, a “white hat GSM hacker and University of Virginia computer science PhD,” informed them “that while text-message and voice security in mobile phones is weak,” the “data connections are typically well encrypted […] the disclosure of the ICC-ID has no direct security consequences.”

At the same time, Nohl described AT&T’s lapse in publishing the email information as grossly incompetent, saying, “it’s horrendous how customer data, specifically e-mail addresses, are negligently leaked by a large telco provider.”

On Wednesday, AT&T issued the following statement regarding the breach:
“This issue was escalated to the highest levels of the company and was corrected by Tuesday. We are continuing to investigate and will inform all customers whose e-mail addresses… may have been obtained.”

Either way, be careful out there, beware the spam and the phishing efforts that never seem to let up and if an e-mail is offering something that seems too good to be true, it probably is.