<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=DecoDe</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=DecoDe"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/DecoDe"/>
	<updated>2026-05-01T19:14:30Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=25C3_presentation_%22Hacking_the_iPhone%22&amp;diff=6956</id>
		<title>25C3 presentation &quot;Hacking the iPhone&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=25C3_presentation_%22Hacking_the_iPhone%22&amp;diff=6956"/>
		<updated>2010-07-14T17:49:09Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This was a presentation held on the 27 December 2008 at the [http://events.ccc.de/congress/2008/wiki/Main_Page/ 25th Chaos Communication Congress (25C3)] in Berlin. Speakers were [[User:MuscleNerd|MuscleNerd]], [[planetbeing]] and [[pytey]].&lt;br /&gt;
&lt;br /&gt;
Short event description of the presentation: [http://events.ccc.de/congress/2008/Fahrplan/events/2976.en.html &amp;quot;Hacking the iPhone&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
[http://vimeo.com/2646755?pg=embed&amp;amp;sec=2646755 presentation video on Vimeo]&lt;br /&gt;
&lt;br /&gt;
During the presentation [[User:MuscleNerd|MuscleNerd]] wanted to show the [http://qik.com/video/729275 video of a live demo of the unlock] with ([[yellowsn0w]]), but skipped it because of the missing time. This video was actually released [[Timeline#December|some days before]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To MuscleNerd: can you make the presentation file available? Can't read the slides in the Vimeo video. Thanks *DecoDe&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:X-Gold_608_Unlock&amp;diff=2325</id>
		<title>Talk:X-Gold 608 Unlock</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:X-Gold_608_Unlock&amp;diff=2325"/>
		<updated>2008-11-10T13:23:57Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: /* Find the theorized algorithm of NCK generation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== current 3G unlock status?? ==&lt;br /&gt;
&lt;br /&gt;
just citing:&lt;br /&gt;
&lt;br /&gt;
:'''Q:''' You can take 1.45.00 (or at least 1.43.00), patch it somewhere, flash this file and it's run? Yes or no?&lt;br /&gt;
&lt;br /&gt;
:'''A:''' No(t yet as easy as that, but be sure we're on it) :p Zf&lt;br /&gt;
&lt;br /&gt;
So, that's very good news :) -caique2001-&lt;br /&gt;
&lt;br /&gt;
To speak more technical... The X-Gold 608 has TPM features. So normally one would expect it only to run signed code. This in turn means, it doesn't matter if the code is interchangeable, because only original Apple code can be run. The crucial hack needed is the hack to run ''unsigned'' code, say patched code (as Apple's private key to sign is not known of course).&lt;br /&gt;
&lt;br /&gt;
TPM doesn't come into play here.   We're running unsigned code, and convincing s-gold3 bootrom we deserve a downgrade.  It happily complies.&lt;br /&gt;
&lt;br /&gt;
Wow! Even more good news :-) Where do we have to send the beer to :-) ?? If it should not go to much into detail, could you shortly explain what issue you are currently working on? The fact you have the possibility to run patched unsigned code, does it imply you are currently working on a patch that actually does the unlock? And does TPM come into play here or are there other issues to be solved? caique2001&lt;br /&gt;
&lt;br /&gt;
I would assume that with unsigned code, you could patch the 3G equivalant of Simple Unlock. IIRC, geohot has already found the bits. we just need a way to patch them. About bypassing TPM...it would be interesting to see how this is done. Perhaps a malformed sig like with pwnage 2.0 and DFU mode? guess we will just have to wait and see :P [[User:ChronicDev|ChronicDev]]&lt;br /&gt;
&lt;br /&gt;
== opensource baseband? ==&lt;br /&gt;
Is to make one? With 3G support? or modify the 4.6 baseband to have have 3g support?&lt;br /&gt;
&lt;br /&gt;
4.6 is on different platform, you cannot modify that for 3G.&lt;br /&gt;
&lt;br /&gt;
== get unlocked bootloader ?? ==&lt;br /&gt;
&lt;br /&gt;
as in countrys like belgium, the 3g is sold without any carrier lock. (belgium law)&lt;br /&gt;
&lt;br /&gt;
wouldnt it be possible to get the bootloader from such an iphone and transfer it to any other device ??&lt;br /&gt;
&lt;br /&gt;
/harald&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Bootloader&amp;quot; has NOTHING todo with official unlock (or unlock). Official Unlock is IMHO done by IMEI and NCK.  ~wEsTbAeR--&lt;br /&gt;
&lt;br /&gt;
== Find the theorized algorithm of NCK generation  ==&lt;br /&gt;
&lt;br /&gt;
Isn't this what the thousands of keygens for PC apps do? Why is it so much harder to do it for the iPhone? Is it because you would normally decompile the software that does the validation, and this is run on apple servers and so is inaccessible? Sorry, just thinking out loud...&lt;br /&gt;
&lt;br /&gt;
Reply: In softwares we can (after a good amount of work) see the routine that is used to verify the numbers you input. In the iPhone it's not that simple. We know the routine but we don't know what the iPhone starts with (or even if it's generated of the iPhone's serial or just a number in a database)&lt;br /&gt;
&lt;br /&gt;
Example: In a software, you input your name and a serial number. The software gets your name, translates it to numbers and does some math like (FirstLetter)*(SecondLetter)/(ThirdLetter + FourthLetter)&lt;br /&gt;
&lt;br /&gt;
So by knowing those rules, we run the same routine in a software and find out what the original software will expect when you input a name such as &amp;quot;funny&amp;quot;. Then you use &amp;quot;funny&amp;quot; and 129837987239187 as serial and it works.&lt;br /&gt;
&lt;br /&gt;
On the iPhone we don't know what the &amp;quot;name&amp;quot; is. We know your iphone will do something like TEA(RSA(token+&amp;quot;name&amp;quot;)) and will compare the response of that with what is has stored in it.&lt;br /&gt;
&lt;br /&gt;
Some people believe the NCK (aka &amp;quot;name&amp;quot; in the above example) doesn't have any relation to the numbers on the phone, such as the serial, IMEI, etc. Some people believe Apple has a big table of numbers relating one NCK for each SERIAL but the NCK isn't formed from the serial.&lt;br /&gt;
&lt;br /&gt;
I don't believe so...I think it's a number generated by the IMEI,Serial and any other unique numbers. Either with all of them, or parts of each. I started coding a program that would do a different search than Geohot's NCKBruteForcer. He was trying all the combinations and would eventually find the correct answer for each iPhone but it would take a million years with the computing power we have. I thought of it in a different way. I would assume that the NCK is made by a rule out of the combination of the following &amp;quot;items&amp;quot; [-, +, /, *, ^, Log, Ln, Log(2), exp, mod, imei, serial] and then code something to  search for all the rules inside that space such as imei*serial/log(serial)+imei for instance. Another idea was that they could use only a couple digits of each, so something like this would be possible: (3 digits of imei)*(first digit of serial)^(4 last digits of imei) mod (2 last digits of serial) .. and so on. This would be a smaller search than Geohots but would not work if Apple has a table with all the NCKs.&lt;br /&gt;
&lt;br /&gt;
I was coding this for the 1.1.4 OOTB when Geohot found the exploit and unlocked it. So I gave up..but maybe it's time to look at it again. ~ Deco&lt;br /&gt;
&lt;br /&gt;
== Unlock by changing model and serial number ==&lt;br /&gt;
&lt;br /&gt;
Chinese grey-market importers are reportedly unlocking the iPhone 3G by changing the model and serial numbers stored in the phone to match the Hong Kong version. Can someone please test if this method works?&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IDA_Pro_Setup&amp;diff=1818</id>
		<title>IDA Pro Setup</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IDA_Pro_Setup&amp;diff=1818"/>
		<updated>2008-08-17T14:32:59Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: /* How to set up IDA pro to reverse the 3G baseband */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==How to set up IDA pro to reverse the 3G baseband==&lt;br /&gt;
&lt;br /&gt;
The [[X-Gold 608]] has a memory map, as seen in it's page.&lt;br /&gt;
&lt;br /&gt;
The [[Secpack 2.0]] takes up the first 0xCF8 of the .fls file.&lt;br /&gt;
&lt;br /&gt;
So to load the 3G .fls file into IDA pro, the file offset is 0xCF8(for the secpack), and the CODE starts at the ROM start address of 0x20040000(since it's the main firmware)&lt;br /&gt;
&lt;br /&gt;
For real noobs:&lt;br /&gt;
 1. Drag the fls file into IDA&lt;br /&gt;
 2. Select ARM&lt;br /&gt;
 3. Change ROM start address to 0x20040000&lt;br /&gt;
 4. Change Loading address to 0x20040000&lt;br /&gt;
 5. Change File offset to 0xCF8&lt;br /&gt;
 6. Copy Loading size into ROM size&lt;br /&gt;
 7. Press OK&lt;br /&gt;
 8. The entry point is the address at 0x20040408&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 9. Go to 20100004 and Press &amp;quot;C&amp;quot; to start. ~Deco&lt;br /&gt;
 10. Read the instructions so you can find other places where you can press &amp;quot;C&amp;quot; to get more code. ~Deco&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IDA_Pro_Setup&amp;diff=1817</id>
		<title>IDA Pro Setup</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IDA_Pro_Setup&amp;diff=1817"/>
		<updated>2008-08-17T14:32:47Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: /* How to set up IDA pro to reverse the 3G baseband */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==How to set up IDA pro to reverse the 3G baseband==&lt;br /&gt;
&lt;br /&gt;
The [[X-Gold 608]] has a memory map, as seen in it's page.&lt;br /&gt;
&lt;br /&gt;
The [[Secpack 2.0]] takes up the first 0xCF8 of the .fls file.&lt;br /&gt;
&lt;br /&gt;
So to load the 3G .fls file into IDA pro, the file offset is 0xCF8(for the secpack), and the CODE starts at the ROM start address of 0x20040000(since it's the main firmware)&lt;br /&gt;
&lt;br /&gt;
For real noobs:&lt;br /&gt;
 1. Drag the fls file into IDA&lt;br /&gt;
 2. Select ARM&lt;br /&gt;
 3. Change ROM start address to 0x20040000&lt;br /&gt;
 4. Change Loading address to 0x20040000&lt;br /&gt;
 5. Change File offset to 0xCF8&lt;br /&gt;
 6. Copy Loading size into ROM size&lt;br /&gt;
 7. Press OK&lt;br /&gt;
 8. The entry point is the address at 0x20040408&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 9. Go to 20100004 and Press &amp;quot;C&amp;quot; to start. ~Deco&lt;br /&gt;
10. Read the instructions so you can find other places where you can press &amp;quot;C&amp;quot; to get more code. ~Deco&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=1815</id>
		<title>Talk:NCK Brute Force</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=1815"/>
		<updated>2008-08-17T12:07:17Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: /* Time? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is this method usable to permanently unlock the iPhone (like IPSF) aka upgrade resistant and not needing a software like signal.app (and being able to use SIM PIN Code)?&lt;br /&gt;
This would allowed to have the &amp;quot;official&amp;quot; unlock (except activation)?&lt;br /&gt;
&lt;br /&gt;
== Time? ==&lt;br /&gt;
&lt;br /&gt;
How long would it take to search the 15 digit one?&lt;br /&gt;
&lt;br /&gt;
Geohots NCKBF program could do around 100,000 keys/second which would produce a hit in many years. &lt;br /&gt;
&lt;br /&gt;
To get to a point where this is actually doable we would need many orders of magnitude of improvement. Even if you use a PSP3 or special hardware (within 1,000 US$ range) you will only get an improvement of 20-100 times.. which doesn't help much. - Deco&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:IDA_Pro_Setup&amp;diff=1793</id>
		<title>Talk:IDA Pro Setup</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:IDA_Pro_Setup&amp;diff=1793"/>
		<updated>2008-08-16T16:53:50Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: /* re: into ida */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;prereqs.: IDA Pro Advanced, baseband files&lt;br /&gt;
&lt;br /&gt;
wanted: Howto load these files correctly into IDA&lt;br /&gt;
&lt;br /&gt;
'''Anybody to give this information here?''' TIA -caique2001-&lt;br /&gt;
&lt;br /&gt;
== into ida ==&lt;br /&gt;
I suggest you look more into IDA Pro, see how things work. you may not be ready for a baseband yet.&lt;br /&gt;
&lt;br /&gt;
the most important thing you need is the address. for example, i knew the iBoot was at 0x18000000 because at the beginning there is a routine to look if it is there and relocate it if not. also it has many references to 0x1800000 throughout the file.&lt;br /&gt;
&lt;br /&gt;
Here are some key combinations to use:&lt;br /&gt;
c = turn the 'gibberish' into code&lt;br /&gt;
d = turn the 'gibberish' into data&lt;br /&gt;
a = turn the 'gibberish' into a string&lt;br /&gt;
u = undefine what you just may have done, i usually use this since there is no real edit+undo in IDA so this is the next best thing&lt;br /&gt;
Alt+G = change the 0 to a 1 to switch to thumb mode when needed&lt;br /&gt;
&lt;br /&gt;
really i feel that you should do some more research on ARM and IDA Pro because a wiki article would not be enough to fully explain it&lt;br /&gt;
&lt;br /&gt;
== re: into ida ==&lt;br /&gt;
I roughly know how ida works and what the keys are. I think there are some people that have already setup the right values for reversing the baseband. So what I want to see here is just a quick intro to set up the project (segments, fileoffsets, changed options, entry points and so on), not how to use ida. This should almost fit into your article above, just counting words ;-)&lt;br /&gt;
&lt;br /&gt;
Yea, but if you don't understand how to get those numbers, you'll be pretty useless as a reverser. Not to discourage, but the numbers really aren't that hard to get. Look at the memory map I posted. All the information you need is here. ~geohot&lt;br /&gt;
&lt;br /&gt;
Probably I missed something in the constitution, just to cite: &amp;quot;Let's document this device better than anyone at apple knows it.&amp;quot; Fact is, you and some other people know how to set up the IDA project. If now, someother people, including me (btw. my first reversing was a CP/M in 1986), don't know how to set up it, one thing is clear: It's not documented. So if you guys reply to my request &amp;quot;this isn't hard to get&amp;quot;, this actually means &amp;quot;it isn't hard to get for us&amp;quot; (1st) and &amp;quot;we _don't_want_ to document it&amp;quot; (2nd). This is against the constitution set up by yourselves! Should we change the constitution? My (tongue in cheek) proposal: &amp;quot;This pseudo wiki is intended for &amp;lt;fill in names here&amp;gt; to absorb knowledge. Everybody is invited to give us knowledge...&amp;quot; - The world could be that easy: Just give those people that lack some knowlegde a chance!!! And don't mistake knowledge with qualification. -caique2001-&lt;br /&gt;
&lt;br /&gt;
geohot's claim that you are &amp;quot;useless&amp;quot; as a reverser unless you can figure out the loading offsets from the .fls files is certainly untrue. -- MuscleNerd&lt;br /&gt;
&lt;br /&gt;
Maybe you can share some info with us MuscleNerd? -- Deco&lt;br /&gt;
&lt;br /&gt;
== offsets ==&lt;br /&gt;
For example, if you look into ICE2_01.45 using a hex editor, you will see starting 0x634 there contains the memory maps. It started at 0x20000000 and ends at 0x21000000 with sections in between doing its own thing. The code/data in the .fls starts at 0xCF8 indicated by location 0xCF4. The length of the code is indicated by the location at 0xCEC which amounts to 0x5E9E18.&lt;br /&gt;
&lt;br /&gt;
So, you may want to load the data in the .fls file from 0xCF8 to 0X5EAB0F at offset 0x20000000 in IDA pro.&lt;br /&gt;
&lt;br /&gt;
-- CPICH&lt;br /&gt;
&lt;br /&gt;
Hey, you speak my language :-) Thanks -caique2001-&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=177</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=177"/>
		<updated>2008-07-27T23:01:50Z</updated>

		<summary type="html">&lt;p&gt;DecoDe: Creating Tutorial Topic&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=1 width=100%&amp;gt;&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=#64ff64 width=50%&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[[PwnageTool|Jailbreak]]&amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=#ff6464 width=50%&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[[Unlock 2.0|Unlock]]&amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Welcome to the iPhone wiki. This is a conglomerate work of everything done by everyone on the iPhone. Anyone can post here, just create an account. This is needed to avoid spam.&lt;br /&gt;
&lt;br /&gt;
Read the [[constitution]] to understand why this wiki was created. &lt;br /&gt;
&lt;br /&gt;
Read [[Up to speed|this]] to get up to speed in the iPhone community.&lt;br /&gt;
&lt;br /&gt;
==Hardware==&lt;br /&gt;
* [[m68ap|iPhone(m68ap)]]&lt;br /&gt;
* [[n82ap|iPhone 3G(n82ap)]]&lt;br /&gt;
&lt;br /&gt;
==App Processor(Jailbreak)==&lt;br /&gt;
* [[S5L8900]]&lt;br /&gt;
&lt;br /&gt;
===Exploits===&lt;br /&gt;
* [[restore mode]]&lt;br /&gt;
* [[jailbreakme]]&lt;br /&gt;
* [[symlinks]]&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
* [[pwnage]]&lt;br /&gt;
* [[diags]]&lt;br /&gt;
* [[pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
===Boot Chain===&lt;br /&gt;
[[VROM]]-&amp;gt;[[iBoot]]-&amp;gt;[[Kernel]]-&amp;gt;[[System|System Software]]&lt;br /&gt;
&lt;br /&gt;
===Upgrade Process===&lt;br /&gt;
[[VROM]]-&amp;gt;[[DFU]]-&amp;gt;[[WTF]]-&amp;gt;[[iBoot]]-&amp;gt;[[Kernel]]-&amp;gt;[[Ramdisk]]-&amp;gt;[[Restore]]&lt;br /&gt;
&lt;br /&gt;
==Baseband(Unlock)==&lt;br /&gt;
* [[S-Gold 2]]&lt;br /&gt;
* [[X-Gold 608]]&lt;br /&gt;
&lt;br /&gt;
===Exploits===&lt;br /&gt;
* [[SIM hacks]]&lt;br /&gt;
* [[Fakeblank|Hardware Fakeblank]]&lt;br /&gt;
* [[IPSF]]&lt;br /&gt;
* [[Minus 0x400]]&lt;br /&gt;
* [[Jerrysim]]&lt;br /&gt;
* [[Minus 0x20000 with Back Extend Erase]]&lt;br /&gt;
&lt;br /&gt;
===Theoretical Attacks===&lt;br /&gt;
* [[NCK Brute Force]]&lt;br /&gt;
* [[Baseband JTAG]]&lt;br /&gt;
&lt;br /&gt;
===Boot Chain===&lt;br /&gt;
[[Baseband Bootrom|bootrom]]-&amp;gt;[[Baseband Bootloader|bootloader]]-&amp;gt;[[Baseband Firmware|firmware]]&lt;br /&gt;
&lt;br /&gt;
==File formats==&lt;br /&gt;
* [[8900 File Format]]&lt;br /&gt;
* [[IMG2 File Format]]&lt;br /&gt;
* [[IMG3 File Format]]&lt;br /&gt;
* [[secpack]]&lt;br /&gt;
* [[secpack 2.0]]&lt;br /&gt;
* [[seczone]]&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
* [[Recovery Mode 0x1280]]&lt;br /&gt;
* [[Recovery Mode 0x1281]]&lt;br /&gt;
* [[DFU 0x1222]]&lt;br /&gt;
* [[WTF 0x1227]]&lt;br /&gt;
* [[Normal Mode 0x1290]]&lt;br /&gt;
* [[Restore Mode]]&lt;br /&gt;
* [[Baseband Bootrom Protocol]]&lt;br /&gt;
* [[Interactive Mode|Baseband Bootloader Protocol]]&lt;br /&gt;
&lt;br /&gt;
==Keys==&lt;br /&gt;
* [[AES Keys]]&lt;br /&gt;
* [[Apple Certificate]]&lt;br /&gt;
* [[Baseband RSA Keys]]&lt;br /&gt;
* [[Baseband TEA Keys]]&lt;br /&gt;
&lt;br /&gt;
==Application Development==&lt;br /&gt;
* [[Toolchain]]&lt;br /&gt;
* [[Frameworks]]&lt;br /&gt;
* [[Apple Certification Process]]&lt;br /&gt;
* [[Distribution Methods]]&lt;br /&gt;
&lt;br /&gt;
==Tutorials==&lt;br /&gt;
* [[Toolchain]]&lt;/div&gt;</summary>
		<author><name>DecoDe</name></author>
		
	</entry>
</feed>