Thursday, January 31, 2008

Wednesday, January 30, 2008

Tuesday, January 29, 2008

SEDA-GIVE ?!?!?!

I wonder how rumors run quickly and I am very disappointed

by Erica Sadun of TUAW for telling people this was

a key related to SDK or the "Application Key".

Well.. i never said it. And, frankly, it's NOT :)

I posted this only because I hate disinformation.

Regards,

Zibri.

Sunday, January 27, 2008

Thursday, January 24, 2008

Thanks to the work of an entire team of great minds, it's done! It's aliiiive !
As a personal note, nobody in the team agreed that Nate True would release it under his name
thanking the "others".
The release was due for today or tomorrow.
But he preferred release it by himself.
You're free to judge his behaviour.
By the way, about this JB, i wish to thank BGM personally.
The key to the system disk is: 11070c11d93b9be5069b643204451ed95aad37df7b332d10e48fd3d23c62fca517055816
These are the actual members of the team:
asap18, bgm, Bugout, bushing, chris_, davidc__, dinopio, drudge, Fred_, ghost_000, gray, MuscleNerd, NerveGas, netkas, np101137, planetbeing, pr3d4k4t, pr3d4t0r, pumpkin, roxfan, Turbo, Whiterat, Zibri, Zf

Phew !


Finally all encryption on the 113 update package has been broken.


md5 of the 'update' ramdisk edddac4e30bc43851e10505efe243935
(Sorry, Steve!)

Wednesday, January 23, 2008

Gotcha !


md5 of the system disk key: b49e01904f35b3d5076f51d872c55ddd

Some last minute problems...

Tuesday, January 22, 2008

It can be done !

One of my favourite movies :)

Sunday, January 20, 2008

About Jailbreak

The reason we are delaying the release of the jailbreak is that we don't want (you know who) to know how we did it.We can't and we won't release a full decrypted image of 113 because that would constitute a copyright infringement and we DO NOT support piracy.
So, concentrate on the 1.1.3 ramdisks. Get them by hardware, bruteforcing or whatever method you come up with.
We'd like to keep the vulnerability open so that whatever the current version is at the time the SDK is released will be breakable.

I hope you understand.

Saturday, January 19, 2008

:)





Complete file list of 1.1.3 Firmware

Too long for this blog...

You can look at it here: [REMOVED]

For the record...

This is the md5 of the decrypted dmg of ipod firmware 1.1.3: d5e201ea19b73ffc2649600c64f1ac25



md5 of the iphone 1.1.3 main partition will follow briefly..

and here you have it:

eb5b3f58542736f65e52148f4f94593d

This is the md5 of the unencrypted iPhone 1.1.3 system disk.

1.1.3 Jailbroken !

As I always thought, the whole is greater than the sum of the parts.

iPhone-elite and the best crew of the first dev-team joined forces (from 1 month).

And results are finally coming out of our rotten brains :)

1.1.3 Firmware has been Jailbroken !

Details will follow when the procedure will be trimmed down.
At the moment is not something anyone can do.

Further proof...

As a further proof we already got the secpack to work BEFORE the firmware was released to the public, have a look at this dinopio pastebin:

http://dinopio.pastebin.com/m63fec03a

You will see the date (at the top) says 12 of January (even if it was 11th of january by the way).

Friday, January 18, 2008

Thoughts to geohot.

You are a big lamer as always.
Now many people will brick their phones with "your" method.
Lol."your method".
You didn't do ANYTHING.
You just put together things done by others.
And thanks you for releasing the secpack.
We all (devs) had it from 1 month!We didn't release it because we didn't want to give apple new weapons and people new ways to brick their phones.
Do you want a prove ?
Look at the first message of this blog.
That number is the md5 of the secpack.
I posted that on 15th of january 2008 but we had it from a month.
And by the way, dinopio was the one bringing the attack to get the secpack under gray directions.

Tuesday, January 15, 2008

Test in progress...

890a14d39763e180b3a2a06874e4fa9c

Remember this.