CLICK HERE WITH YOUR IPHONE
Saturday, July 26, 2008
Crash :)
CLICK HERE WITH YOUR IPHONE
Wednesday, July 23, 2008
Credits..
I wonder why I am the one accused of stealing
and then NOBODY gives me the credit for what I have done.
The only 2 things I did in the iPhone scene
were to DUMP THE 837 KEY and booting from an unsigned ramdisk.
(nobody even understood what it was when
I posted it on my blog).
Now the so called "dev team" released their tool
and I see no mention of that.
George Hotz wrote a code based on dev team tool
to "execute unsigned code at dfu level"...
Look at the start of the code:
const unsigned char key837[]={0x18,0x84,0x58,0xA6,0xD1,0x50,0x34,0xDF,0xE3,0x86,0xF2,0x3B,0x61,0xD4,0x37,0x74};
That is the key I dumped.
Without it NO TOOL could ever be possible.
That's why I called it a "major breakthru" at that time.
That key also made it possible to decrypt the ramdisk and
create a custom one.
Now if you remember I have always credited people
(george hotz for his unlock based on gray's work and
many members of iphone-elite that now are calling
themselves "dev team").
Now I won't say anyone stole anything.
But these are the FACTS.
Dev team did an impressive team work this time
and even if I don't personally like the tool I see
no other way to do things on 2.0.
(If I'll see one I'll tell you) :)
The same people accusing me
of "stealing" didn't EVER credit me for what
I've done.
And I repeat for who wasn't
reading at that time:
no ZiPhone (iLiberty/iPlus) could
ever be existed without the ramdisk
exploit I found and
no "pwns" without the 837 key.
Zibri.