<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=James</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=James"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/James"/>
	<updated>2026-05-01T03:14:20Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:IMG3_File_Format&amp;diff=4509</id>
		<title>Talk:IMG3 File Format</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:IMG3_File_Format&amp;diff=4509"/>
		<updated>2009-07-30T00:33:10Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I don't think every iPhone/iPod touch has an ECID -- Isn't it only a 3GS thing? [[User:Iemit737|Iemit737]] 06:01, 27 July 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Put your iPhone or iPod Touch in Recovery Mode and look at the USB section in the System Profiler (if you're on Mac), then click on the &amp;quot;Apple Mobile Device...&amp;quot;. In the detalis section (below the devices list) you will see a lot of IDs (also incl. the ECID).&lt;br /&gt;
&lt;br /&gt;
But, it's very good question! I think that in spite of the fact that ECID is present on all devices, only on 3GS it is sigchecked on the bootrom. [[User:Rusmac|rusmac]]&lt;br /&gt;
&lt;br /&gt;
When you say it's sigchecked by the bootrom - you mean the DFU mode of it? Not the normal one that's vulnerable to 24kpwn? [[User:Iemit737|Iemit737]] 09:07, 27 July 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
actually the code to check ECID is in ipod2g bootrom as well, but the actual sigchecking depends on where the ECID tag is placed in the img3. But interestingly they don't check the TYPE tag in either ipod2g bootrom or 3gs bootrom. --[[User:Posixninja|posixninja]] 15:24, 29 July 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Can you tell us what the TYPE tag does? (or do you mean the type of tag) [[User:Iemit737|Iemit737]] 21:49, 29 July 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
I believe the TYPE tag is used to verify that you're executing images in the correct manner; as in, you have to use bootx to boot the kernel, etc. --[[User:James|James]] 00:33, 30 July 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=BCM4325&amp;diff=4226</id>
		<title>BCM4325</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=BCM4325&amp;diff=4226"/>
		<updated>2009-07-14T17:53:21Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This chip is in the iPod2,1 (iPod touch 2G) and iPhone2,1 (iPhone 3GS) and combines Bluetooth/Wifi and a secret FM radio, presumably connected and ready to go on a future firmware release by Apple.&lt;br /&gt;
&lt;br /&gt;
== FM Radio ==&lt;br /&gt;
&lt;br /&gt;
The most peculiar thing is the inclusion of an FM radio. There is a product brief available from broadcom on this chip: {put link here} but it serves little purpose apart from the block diagram and interface hardware/software.&lt;br /&gt;
&lt;br /&gt;
Interfacing the FM radio is done in two stages: Control via the bluetooth modules's UART or I2C and digital audio streaming over the module's I2S/PCM hardware.&lt;br /&gt;
&lt;br /&gt;
most notably: the FM radio never physically leaves the sillicon die, except for the antenna (which may be connected directly to the BT/UMTS/everything else [:P lol] antenna) this means that the control/streaming will be an extension to the BT protocols currently implemented.&lt;br /&gt;
&lt;br /&gt;
For control, the HCI over UART (/dev/uart.bluetooth) seems the most logical solution to turn the radio on/tune/search etc. but the vendor specific HCI commands will need to be *obtained* (or reversed, which could prove hard). A broadcom datasheet would have this information, but unfortunately you have to sign an NDA to obtain one.&lt;br /&gt;
&lt;br /&gt;
For streaming, the i2s bus sounds good... interfacing this could be hard but playing on the stereo bluetooth profile of iphone OS 3 we could piggy back, at least to start with. however we do need the radio ON first...&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bluetooth&amp;diff=4225</id>
		<title>Bluetooth</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bluetooth&amp;diff=4225"/>
		<updated>2009-07-14T17:53:05Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Bluetooth is a short-range, wireless technology, popular for its Personal Area Networking capability. Bluetooth hardware is provided on all iPhone platforms and the second generation iPod Touch platform. Apple has severely restricted the functions of Bluetooth to the end-user, for seemingly no reason, as the hardware supplied is capable of most if not all current bluetooth 2.0/2.1 functions.&lt;br /&gt;
&lt;br /&gt;
With iPhoneOS 3.0, support for 3G internet bridging (PAN) and A2DP over Bluetooth has been added, however the file sharing OBEX protocol is notably still missing.&lt;br /&gt;
&lt;br /&gt;
== Access ==&lt;br /&gt;
&lt;br /&gt;
Developers have been able to successfully access and interface the Bluetooth hardware to achieve an OBEX solution, however this is still quite underground. The device nodes of relevance here, are &lt;br /&gt;
* /dev/uart.bluetooth&lt;br /&gt;
* /dev/cu.bluetooth&lt;br /&gt;
* /dev/tty.bluetooth&lt;br /&gt;
&lt;br /&gt;
== iPhone/iPods with Bluetooth ==&lt;br /&gt;
&lt;br /&gt;
* iPhone (iPhone1,1) (m68ap) - Bluetooth (r) 2.0 + EDR&lt;br /&gt;
* iPhone 3G (iPhone1,2) (n82ap) - Bluetooth (r) 2.0 + EDR - chip specific link [[Bluetooth iPhone2,1]]&lt;br /&gt;
* iPhone 3GS (iPhone2,1) (n88ap) - Bluetooth (r) 2.1 + EDR&lt;br /&gt;
&lt;br /&gt;
* iPod Touch 2G (iPod2,1) (n72ap) - Bluetooth (r) 2.1 + EDR&lt;br /&gt;
* iPod Touch 3G (unreleased) - Bluetooth (r) 2.1 + EDR forcasted&lt;br /&gt;
&lt;br /&gt;
== Unreleased iPod3,1 ==&lt;br /&gt;
&lt;br /&gt;
As of iPhoneOS 3.0 an iPod3,1 is mentioned, with a BCM4329 WiFi/Bluetooth/FM wireless solution chip... this is strong evidence for a new iPod model in the near future&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kirkwood_7A341_(iPhone2,1)&amp;diff=3999</id>
		<title>Kirkwood 7A341 (iPhone2,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kirkwood_7A341_(iPhone2,1)&amp;diff=3999"/>
		<updated>2009-06-28T00:50:41Z</updated>

		<summary type="html">&lt;p&gt;James: Added a bunch of decryption keys for various images.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decryption Keys ==&lt;br /&gt;
&lt;br /&gt;
=== Root Filesystem ===&lt;br /&gt;
* '''VFDecrypt''': 7d779fed28961506ca9443de210224f211790192b2a2308b8bc0e7d4a2ca61a68e26200e&lt;br /&gt;
&lt;br /&gt;
=== LLB ===&lt;br /&gt;
* '''Key''': 783970ed70d151e65cdd0f52019f026cbc0ece5c604603117d677b6a85ea4d95&lt;br /&gt;
* '''IV''': fc4efef9fd245dc038ecb26f25f795c7&lt;br /&gt;
&lt;br /&gt;
=== iBoot ===&lt;br /&gt;
* '''Key''': c160ff26cf0cdb1c0b5d821e4102cab8a3e62687f39ab8c456907694e3c4834e&lt;br /&gt;
* '''IV''': 948a3d82419c9d4dde404cb4a788da70&lt;br /&gt;
&lt;br /&gt;
=== DeviceTree ===&lt;br /&gt;
* '''Key''': 14370497f039b5caf3583cfa89cfd626147df4c37c63ab3a3fc110765d3d0585&lt;br /&gt;
* '''IV''': c6f3b155a71d2a61d14f78f6230bb20e&lt;br /&gt;
&lt;br /&gt;
=== Kernel ===&lt;br /&gt;
* '''Key''': f49e50a630397ed72592f5c9874b33ca1e0e5a499d2a6a0f2746c8e7f1dbf470&lt;br /&gt;
* '''IV ''': cd41286890df601bfcd87f8a09b009c8&lt;br /&gt;
&lt;br /&gt;
=== Logo ===&lt;br /&gt;
* '''Key''': d4598b90b842817d34f4eb2e741bfb965d73986ac0c1ec99f9d73c67fef787e3&lt;br /&gt;
* '''IV''': 02a124ab2522762fdb0e2dceebd69c4e&lt;br /&gt;
&lt;br /&gt;
=== Recovery Logo ===&lt;br /&gt;
* '''Key''': da2324a7f8341c26b550a674a0d8566a9ebc9eda9c22cf37b1fc7d702ee6aab5&lt;br /&gt;
* '''IV''': 2e314503ca4f2bd03ac17c8b8eecf072&lt;br /&gt;
&lt;br /&gt;
=== iBEC ===&lt;br /&gt;
* '''Key''': 711ffd7e4cc4ea56150749e085d065f6efe83bc40c506eb17648c3e68ac4ed6c&lt;br /&gt;
* '''IV''': 414cd466c85886181881880d66b9535a&lt;br /&gt;
&lt;br /&gt;
=== iBEC ===&lt;br /&gt;
* '''Key''': ebc56070f923799c06fc696fe5b8335517eb2fc13d1e8fcdb16be784db6b4a36&lt;br /&gt;
* '''IV''': d7815d19a90b84677fc757aa4abf9343&lt;br /&gt;
&lt;br /&gt;
=== Update Ramdisk - 018-5304-002.dmg ===&lt;br /&gt;
* '''Key''': 8ffbef98cc28b4aa14d18783faa6a8c95c94b1a4536fbfb7485f0d54cdec358b&lt;br /&gt;
* '''IV''': d9b8d8f798cd50ba72d434b271d2f181&lt;br /&gt;
&lt;br /&gt;
=== Restore Ramdisk - 018-5306-002.dmg ===&lt;br /&gt;
* '''Key''': 44514633ce2aead62bcfa8836cda4a3c7bde483f8b1e9f19d22f9d8fdf753e02&lt;br /&gt;
* '''IV''': e345e23bb266fcc2ba23a2e0be77a3bf&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=S5L8900&amp;diff=3994</id>
		<title>S5L8900</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=S5L8900&amp;diff=3994"/>
		<updated>2009-06-26T20:00:16Z</updated>

		<summary type="html">&lt;p&gt;James: Added note since this processor is not used by any current device.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the Application Processor shared between the [[iPhone]], [[N45ap|iPod touch]], and the [[iPhone 3G]]. Not much is known about it through official sources. This processor is not used in any of the current devices, being replaced by the [[S5L8720]] and [[S5L8920]].&lt;br /&gt;
&lt;br /&gt;
==Firmware File Formats==&lt;br /&gt;
See [[S5L File Formats|this page]] for more information on the types of firmware files it interprets&lt;br /&gt;
&lt;br /&gt;
==Exploits==&lt;br /&gt;
===Userland===&lt;br /&gt;
* [[Restore Mode]] - Firmware v1.0.2 and below&lt;br /&gt;
* [[symlinks|Symlinks]] - Firmware v1.1.1 and below&lt;br /&gt;
* [[LibTiff|LibTIFF]] - Firmware v1.1.1 and below&lt;br /&gt;
* [[Mknod]] - Firmware v1.1.2 and below&lt;br /&gt;
* [[Dual Boot Exploit]] - Firmware 1.1.4 / v2.0b3 and below&lt;br /&gt;
&lt;br /&gt;
===[[iBoot]] / [[Kernel]]===&lt;br /&gt;
* [[Ramdisk Hack|Ramdisk Exploit]] - Firmware v1.1.4 / v2.0b3 and below&lt;br /&gt;
* [[diags|Diags Exploit]] - Firmware v1.1.4 / v2.0b5 and below&lt;br /&gt;
&lt;br /&gt;
===[[VROM (S5L8900)|Bootrom]]===&lt;br /&gt;
* [[pwnage|Pwnage 1.0 (Ramdisk + AppleImage2NORAccess)]]&lt;br /&gt;
* [[pwnage 2.0|Pwnage 2.0 (DFU + Malformed Certificate)]]&lt;br /&gt;
&lt;br /&gt;
==Boot Chain==&lt;br /&gt;
[[VROM]]-&amp;gt;[[LLB]]-&amp;gt;[[iBoot]]-&amp;gt;[[Kernel]]-&amp;gt;[[System|System Software]]&lt;br /&gt;
&lt;br /&gt;
One of the [[iPhoneLinux]] goals are to replace that Boot Chain after iBoot :&amp;lt;br&amp;gt;&lt;br /&gt;
[[VROM]]-&amp;gt;OpeniBoot-&amp;gt;Linux Kernel-&amp;gt;X Server-&amp;gt;Window Manager&lt;br /&gt;
&lt;br /&gt;
==Upgrade Process==&lt;br /&gt;
&lt;br /&gt;
=== Restore mode ===&lt;br /&gt;
The common upgrade process chain is [[VROM]]-&amp;gt;[[DFU]]-&amp;gt;[[WTF]]-&amp;gt;[[iBoot]]-&amp;gt;[[Kernel]]-&amp;gt;[[Ramdisk]]-&amp;gt;[[Restore Mode|Restore]], also called [[Restore Mode|restore mode]].&lt;br /&gt;
&lt;br /&gt;
== DFU mode ==&lt;br /&gt;
See full article [[DFU|here]]. To flash an older version of the iPhone software you have to let your phone reside in [[DFU]]. In iTunes you have to press the Alt-Key (Mac) or the shift-key (Windows) when pressing 'Restore' to be able to manually chose an update file (ipsw file).&lt;br /&gt;
&lt;br /&gt;
=== Boot Chain ===&lt;br /&gt;
[[VROM]]--&amp;gt;[[DFU]]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=3993</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=3993"/>
		<updated>2009-06-26T19:58:05Z</updated>

		<summary type="html">&lt;p&gt;James: Added 3GS to jailbreak section and mentioned 8920. Didn't know how to word it really, a bit awkward. Also cleaned up 3G S to 3GS.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- Logo by iHassan --&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Iptwiki.jpg‎]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;!-- Added a split column information box- computid --&amp;gt;&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
&amp;lt;table border=1 width=100%&amp;gt;&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:yellow; text-align:center; width:25%;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[[Jailbreak iPhone2,1|Break Chain of Trust (S5L8920x)]]&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:orange; text-align:center; width:25%;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[[Unlock 2.0|Break Chain of Trust (X-Gold 608)]]&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Disclaimer]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Software==&lt;br /&gt;
* [[Filesystem]]&lt;br /&gt;
* [[Firmware]]&lt;br /&gt;
* [[Keys]]&lt;br /&gt;
* [[Protocols]]&lt;br /&gt;
* [[System Log]]&lt;br /&gt;
&lt;br /&gt;
==Hardware==&lt;br /&gt;
=== iPhone ===&lt;br /&gt;
* [[m68ap|iPhone (m68ap)]]&lt;br /&gt;
* [[n82ap|iPhone 3G (n82ap)]]&lt;br /&gt;
* [[N88AP|iPhone 3GS (n88ap)]]&lt;br /&gt;
&lt;br /&gt;
=== iPod touch ===&lt;br /&gt;
* [[n45ap|iPod touch (n45ap)]]&lt;br /&gt;
* [[n72ap|iPod touch 2nd Generation (n72ap)]]&lt;br /&gt;
&lt;br /&gt;
==App Processor ([[Jailbreak]])==&lt;br /&gt;
The [[iPhone]], [[iPod touch]], and [[iPhone 3G]] makes use of the [[S5L8900]] platform as application processor. Current models, such as the [[iPod touch 2G]] and the [[N88AP|iPhone 3GS]], use newer processors. The [[S5L8720]] and [[S5L8920]] are used, respectively. Here is where the [[Jailbreak|jailbreak]] applies.&lt;br /&gt;
&lt;br /&gt;
==Baseband ([[Unlock]])==&lt;br /&gt;
The [[Baseband Device]] is where the [[unlock]] applies.&lt;br /&gt;
&lt;br /&gt;
==Application Development==&lt;br /&gt;
* [[Toolchain]] (Includes tutorials)&lt;br /&gt;
* [[Toolchain 2.0]] (Includes tutorials)&lt;br /&gt;
* [[Frameworks]]&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [[Apple Certification Process]]&lt;br /&gt;
* [[Bypassing iPhone Code Signatures]]&lt;br /&gt;
* [[Distribution Methods]]&lt;br /&gt;
&lt;br /&gt;
==Application Copy Protection==&lt;br /&gt;
* [[Copy Protection Overview]]&lt;br /&gt;
* [[Application Structure and Signatures]]&lt;br /&gt;
* [[Mach-O Loading Process]]&lt;br /&gt;
* [[Bugging Debuggers]]&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
* [[Jailbreak]]&lt;br /&gt;
* [[Activation]]&lt;br /&gt;
* [[Unlock]]&lt;br /&gt;
* [[Baseband Device|Baseband]]&lt;br /&gt;
* [[Baseband Bootloader|Bootloader]]&lt;br /&gt;
* [[DFU]]&lt;br /&gt;
* [[iBoot]]&lt;br /&gt;
* [[iBEC]]&lt;br /&gt;
* [[iBSS]]&lt;br /&gt;
* [[NORID]]&lt;br /&gt;
* [[CHIPID]]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
* [[Bluetooth]]&lt;br /&gt;
* [[Glossary]]&lt;br /&gt;
* [[Tutorials]]&lt;br /&gt;
* [[Useful Links]]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=3956</id>
		<title>Jailbreak (S5L8920+)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=3956"/>
		<updated>2009-06-25T23:08:35Z</updated>

		<summary type="html">&lt;p&gt;James: Edited geohot exploit section. Wording was terrible and didn't make sense.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Because of the date the [[0x24000 Segment Overflow]] was leaked by [[NitroKey]], Apple may or may not have had the time to fix the bug in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. If not, the following needs to be done:&lt;br /&gt;
* '''Find a new iBoot exploit''' - This will allow us to decrypt the platform iBoot and other firmware files in it's IPSW, as well as dump the bootrom to examine.&lt;br /&gt;
* '''Find a new bootrom exploit''' - After we have the bootrom dumped, we must look for a way to make SecureROM run our patched [[LLB]].&lt;br /&gt;
&lt;br /&gt;
==ECID==&lt;br /&gt;
Apple added a new tag to the img3 format called ECID. The ECID is ''unique'' to each phone, and is being sigchecked. So no downgrades unless you have a dump of your unique old firmware's img3. Therefore, iBoot exploits won't be so useful for tethered JBs, because such exploits will be closed in new FWs. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html]&lt;br /&gt;
&lt;br /&gt;
==Geohot's iBoot Exploit==&lt;br /&gt;
An undisclosed exploit has been discovered by geohot in the 7A341 firmware. [http://iphonejtag.blogspot.com/2009/06/no-sn0w-in-summer.html] With the help of this exploit, the hardware AES engine has been used to decrypt the the KBAG sections of each of the iPhone2,1 7A341 images. The exploit has also been used to dump the [[S5L8920 (Bootrom)|S5L8920 Bootrom]].&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Kirkwood_7A341_(iPhone2,1)&amp;diff=3953</id>
		<title>Talk:Kirkwood 7A341 (iPhone2,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Kirkwood_7A341_(iPhone2,1)&amp;diff=3953"/>
		<updated>2009-06-25T21:16:59Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every time I try and vfdecrypt the 3GS file system, it always works but the resulted dmg is unmountable.  Any help?  Thanks!!&lt;br /&gt;
:If you're on Windows, I find that there is an extra step required to open the image. After decrypting the image with vfdecrypt, run the decrypted image through XPwn's dmg utility. I use &amp;quot;dmg extract decrypted.dmg out.dmg&amp;quot;. The resulting disk image should be readable by most Windows programs. If you're on a Mac, I don't know what would help. I believe OS X ignores the junk that's left after decrypting the image, so it's most likely user fault. The key is correct though, as I've been able to decrypt the image. --[[User:James|James]] 18:01, 25 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== iBoot decryption ==&lt;br /&gt;
&lt;br /&gt;
Is it just me, or does iBoot appear to decrypt incorrectly using the keys given? --[[User:Cool name|Cool name]] 20:15, 25 June 2009 (UTC)&lt;br /&gt;
:It appears to decrypt incorrectly for me too using xpwntool. Every other image decrypts correctly using it, so I assume it's a bad key. --[[User:James|James]] 21:16, 25 June 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Kirkwood_7A341_(iPhone2,1)&amp;diff=3948</id>
		<title>Talk:Kirkwood 7A341 (iPhone2,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Kirkwood_7A341_(iPhone2,1)&amp;diff=3948"/>
		<updated>2009-06-25T18:01:51Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every time I try and vfdecrypt the 3GS file system, it always works but the resulted dmg is unmountable.  Any help?  Thanks!!&lt;br /&gt;
:If you're on Windows, I find that there is an extra step required to open the image. After decrypting the image with vfdecrypt, run the decrypted image through XPwn's dmg utility. I use &amp;quot;dmg extract decrypted.dmg out.dmg&amp;quot;. The resulting disk image should be readable by most Windows programs. If you're on a Mac, I don't know what would help. I believe OS X ignores the junk that's left after decrypting the image, so it's most likely user fault. The key is correct though, as I've been able to decrypt the image. --[[User:James|James]] 18:01, 25 June 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:S5PC100&amp;diff=3821</id>
		<title>Talk:S5PC100</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:S5PC100&amp;diff=3821"/>
		<updated>2009-06-16T00:35:20Z</updated>

		<summary type="html">&lt;p&gt;James: Proposed move to new page S5L8920x.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Should be moved to S5L8920x, since we have clear evidence that this is not the processor used in the 3G S.&lt;br /&gt;
I don't get why this page was made in the first place, since the article that this particular model was taken from didn't even flat out say it would be used.&lt;br /&gt;
It clearly said under the picture that a ''derivative'' would be used. --[[User:James|James]] 00:35, 16 June 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=3820</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=3820"/>
		<updated>2009-06-16T00:29:37Z</updated>

		<summary type="html">&lt;p&gt;James: Changed S5PC100 reference to 8920x.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- Logo by iHassan --&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Iptwiki.jpg‎]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;!-- Added a split column information box- computid --&amp;gt;&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
&amp;lt;table border=1 width=100%&amp;gt;&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:orange; text-align:center; width:25%;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[[Jailbreak iPhone2,1|Break Chain of Trust (S5L8920x)]]&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:orange; text-align:center; width:25%;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[[Unlock 2.0|Break Chain of Trust (X-Gold 608)]]&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Disclaimer]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Software==&lt;br /&gt;
* [[Filesystem]]&lt;br /&gt;
* [[Firmware]]&lt;br /&gt;
* [[Keys]]&lt;br /&gt;
* [[Protocols]]&lt;br /&gt;
* [[System Log]]&lt;br /&gt;
&lt;br /&gt;
==Hardware==&lt;br /&gt;
=== iPhone ===&lt;br /&gt;
* [[m68ap|iPhone (m68ap)]]&lt;br /&gt;
* [[n82ap|iPhone 3G (n82ap)]]&lt;br /&gt;
* [[N88AP|iPhone 3G S (n88ap)]]&lt;br /&gt;
&lt;br /&gt;
=== iPod touch ===&lt;br /&gt;
* [[n45ap|iPod touch (n45ap)]]&lt;br /&gt;
* [[n72ap|iPod touch 2nd Generation (n72ap)]]&lt;br /&gt;
&lt;br /&gt;
==App Processor ([[Jailbreak]])==&lt;br /&gt;
The [[iPhone]], [[iPod touch]], and [[iPhone 3G]] makes use of the [[S5L8900]] platform as application processor, while the [[iPod touch 2G]] uses the [[S5L8720]]. Here is where the [[Jailbreak|jailbreak]] applies.&lt;br /&gt;
&lt;br /&gt;
==Baseband ([[Unlock]])==&lt;br /&gt;
The [[Baseband Device]] is where the [[unlock]] applies.&lt;br /&gt;
&lt;br /&gt;
==Application Development==&lt;br /&gt;
* [[Toolchain]] (Includes tutorials)&lt;br /&gt;
* [[Toolchain 2.0]] (Includes tutorials)&lt;br /&gt;
* [[Frameworks]]&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [[Apple Certification Process]]&lt;br /&gt;
* [[Bypassing iPhone Code Signatures]]&lt;br /&gt;
* [[Distribution Methods]]&lt;br /&gt;
&lt;br /&gt;
==Application Copy Protection==&lt;br /&gt;
* [[Copy Protection Overview]]&lt;br /&gt;
* [[Application Structure and Signatures]]&lt;br /&gt;
* [[Mach-O Loading Process]]&lt;br /&gt;
* [[Bugging Debuggers]]&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
* [[Jailbreak]]&lt;br /&gt;
* [[Activation]]&lt;br /&gt;
* [[Unlock]]&lt;br /&gt;
* [[Baseband Device|Baseband]]&lt;br /&gt;
* [[Baseband Bootloader|Bootloader]]&lt;br /&gt;
* [[DFU]]&lt;br /&gt;
* [[iBoot]]&lt;br /&gt;
* [[iBEC]]&lt;br /&gt;
* [[iBSS]]&lt;br /&gt;
* [[NORID]]&lt;br /&gt;
* [[CHIPID]]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
* [[Bluetooth]]&lt;br /&gt;
* [[Glossary]]&lt;br /&gt;
* [[Tutorials]]&lt;br /&gt;
* [[Useful Links]]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=N88AP&amp;diff=3819</id>
		<title>N88AP</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=N88AP&amp;diff=3819"/>
		<updated>2009-06-16T00:23:07Z</updated>

		<summary type="html">&lt;p&gt;James: The 2,1_3.0 IPSW refers to 8920 all over with no sign of S5PC100 anywhere.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:IPhone3GS.jpg|right|thumb|iPhone 3G S, back and front.]]&lt;br /&gt;
&lt;br /&gt;
This is the iPhone 3G S. It will be released on June 19, 2009 with a price tag of $199 for the 16GB model and $299 for the 32GB model, in the U.S., Canada and major European countries. Price varies depending on the operator selling it. It features the same design as the [[iPhone 3G]], but has also new features such as video recording, voice control, digital compass, faster CPU, increased RAM etc.&lt;br /&gt;
&lt;br /&gt;
== Baseband ==&lt;br /&gt;
The iPhone 3G S uses the [[X-Gold 608]] baseband chip, same as in the iPhone 3G.&lt;br /&gt;
&lt;br /&gt;
== Application Processor ==&lt;br /&gt;
It makes use of the [[S5L8920x]] application processor.&lt;br /&gt;
&lt;br /&gt;
== Specifications ==&lt;br /&gt;
'''Color''': Black or white &amp;lt;br&amp;gt;&lt;br /&gt;
'''Size''': 4.5 inches (115.5 mm) (h) × 2.4 inches (62.1 mm) (w) × 0.48 inch (12.3 mm) (d) &amp;lt;br&amp;gt;&lt;br /&gt;
'''Weight''': 135 g (4.8 oz) &amp;lt;br&amp;gt;&lt;br /&gt;
'''Battery''': Up to 12 hours of 2G talk, 5 hours of 3G talk, 5 (3G) or 9 (Wi-Fi) hours of Internet use, 10 hours of video playback, and up to 30 hours of audio playback, lasting over 300 hours on standby. &amp;lt;br&amp;gt;&lt;br /&gt;
'''3G''': Broadband data speeds, supporting 7.2Mbps HSDPA &amp;lt;br&amp;gt;&lt;br /&gt;
'''Camera''': 3.15MP with Autofocus and manual focus (''Tap to focus''), supporting VGA video recording @ 30FPS&lt;br /&gt;
&lt;br /&gt;
More specifications available in [http://www.gsmarena.com/apple_iphone_3g_s-2826.php GSMArena].&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Jailbreak iPhone2,1]]&lt;br /&gt;
* [[X-Gold 608 Unlock]]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.anandtech.com/gadgets/showdoc.aspx?i=3579 AnandTech: The iPhone 3GS Hardware Exposed &amp;amp; Analyzed]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Toolchain_2.0&amp;diff=3621</id>
		<title>Toolchain 2.0</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Toolchain_2.0&amp;diff=3621"/>
		<updated>2009-04-18T12:59:28Z</updated>

		<summary type="html">&lt;p&gt;James: Didn't notice this was already covered below, reverted.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article explains how to build a tool chain for iPhone OS 2.0. &lt;br /&gt;
&lt;br /&gt;
'''Please note that this section is under development.'''&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Mac OS X ==&lt;br /&gt;
Until a valid iPhone ARM toolchain installer can be legally distributed throughout the public (grr NDA), the alternative is simple. Install the Apple iPhone SDK, and use it's compiler, and specify the correct architecture, like so:&lt;br /&gt;
&lt;br /&gt;
/Developer/Platforms/iPhoneOS.platform/Developer/usr/bin/gcc -arch armv6 -isysroot /Developer/Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS2.1.sdk&lt;br /&gt;
&lt;br /&gt;
For extra headers that you have either obtained from an external source, or dumped from the iphone or iphone simulator frameworks yourself, place them in a custom include directory and pass the -I option through the compiler like so:&lt;br /&gt;
&lt;br /&gt;
..../gcc -I &amp;quot;YOUR INCLUDE DIRECTORY&amp;quot;.......&lt;br /&gt;
&lt;br /&gt;
Use saurik's codesign tool (ldid) to sign the binary like so:&lt;br /&gt;
&lt;br /&gt;
ldid -S &amp;lt;binary&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More on this coming soon.&lt;br /&gt;
&lt;br /&gt;
== Windows XP ==&lt;br /&gt;
&lt;br /&gt;
=== Extraction of iPhone OS 2.0 SDK ===&lt;br /&gt;
''Please Note: As of 7-Zip 4.59 Beta, support is available for .DMG and XAR-format archives. 7-Zip is now capable of completely extracting iPhone 2.0 SDK Package.''&lt;br /&gt;
* Download the iPhone OS 2.0 SDK from [http://developer.apple.com/iphone/index.action Apple iPhone Dev Center].&lt;br /&gt;
* Download and install ''HFSExplorer'' from [http://hem.bredband.net/catacombae/hfsx.html catacombae software].&lt;br /&gt;
* Start ''HFSExplorer'' and choose the menu ''File&amp;amp;rarr;Open UDIF Disk Image (.dmg)...''&lt;br /&gt;
* Select the iPhone 2.0 SDK disk image ''iphone_sdk_final.dmg'' and press ''Open''&lt;br /&gt;
* When the tool asks ''Which partition to read'' leave it at ''&amp;quot;Mac_OS_X&amp;quot; (Apple_HFS)'' and press ''OK''&lt;br /&gt;
* Go to ''Packages'' and select the package you want to extract, e.g. ''iPhoneSDKHeadersAndLibs.pkg'' for the iPhone OS 2.0 header files.&lt;br /&gt;
* With right mouse button choose ''Extract data'' to extract an installation package.&lt;br /&gt;
* Please note that in order to extract this .pkg file on Windows, you must compile xar using Cygwin.  Make sure you have libxml2, libxml2-devel, openssl and openssl-devel.  You can then follow the instructions below.&lt;br /&gt;
&lt;br /&gt;
== Linux ==&lt;br /&gt;
Currently we can only describe how to get the headers from the iPhone OS 2.0 SDK.&lt;br /&gt;
&lt;br /&gt;
=== Extraction of iPhone OS 2.0 Installation Packages (.pkg) ===&lt;br /&gt;
* Extract &amp;lt;tt&amp;gt;iPhoneSDKHeadersAndLibs.pkg&amp;lt;/tt&amp;gt; from iPhone OS 2.0 SDK:&lt;br /&gt;
 mount -t hfs -o loop /path/to/iphone_sdk_final.dmg /somepath/somedir&lt;br /&gt;
:Copy &amp;lt;tt&amp;gt;iPhoneSDKHeadersAndLibs.pkg&amp;lt;/tt&amp;gt; from &amp;lt;tt&amp;gt;/somepath/somedir&amp;lt;/tt&amp;gt;&lt;br /&gt;
* Use the ''[http://code.google.com/p/xar/ eXtensible ARchiver]'' &amp;lt;tt&amp;gt;xar&amp;lt;/tt&amp;gt; to extract the file &amp;lt;tt&amp;gt;Payload&amp;lt;/tt&amp;gt; file containing the actual header files:&lt;br /&gt;
 xar -xf iPhoneSDKHeadersAndLibs.pkg Payload&lt;br /&gt;
*Extract the contents of the resulting &amp;lt;tt&amp;gt;Payload&amp;lt;/tt&amp;gt; file&lt;br /&gt;
 zcat Payload | cpio -id&lt;br /&gt;
or&lt;br /&gt;
 zcat Payload | cpio -id '*.h'&lt;br /&gt;
to extract only all header files included in the package.&lt;br /&gt;
&lt;br /&gt;
=== Framework Headers ===&lt;br /&gt;
This section assumes that&lt;br /&gt;
 zcat Payload | cpio -id '*.h'&lt;br /&gt;
got used in previous section.&lt;br /&gt;
&lt;br /&gt;
If you want to move all Framework headers into an ''include'' directory continue&lt;br /&gt;
as follows:&lt;br /&gt;
&lt;br /&gt;
* Remove the project XCode templates since they will not be required anymore:&lt;br /&gt;
 rm -rf Platforms/iPhoneOS.platform/Developer/Library&lt;br /&gt;
&lt;br /&gt;
* Create your target ''include'' directory:&lt;br /&gt;
 mkdir include&lt;br /&gt;
&lt;br /&gt;
* Get just the ''System'' and ''usr'' directories from the iPhone Os 2.0 SDK and remove the empty ''Platforms'' directory hierarchy:&lt;br /&gt;
 mv Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS2.0.sdk/* .&lt;br /&gt;
 rmdir -p Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS2.0.sdk/&lt;br /&gt;
&lt;br /&gt;
* Move the Framework headers to current directory and clean-up empty directory hierarchy:&lt;br /&gt;
 mv System/Library/Frameworks/* .&lt;br /&gt;
 rmdir -p System/Library/Frameworks/&lt;br /&gt;
&lt;br /&gt;
* Rename/move all Framework header directories into ''include'' directory and cleanup&lt;br /&gt;
 mv AddressBook.framework/Headers include/AddressBook&lt;br /&gt;
 mv AddressBookUI.framework/Headers include/AddressBookUI&lt;br /&gt;
 mv AudioToolbox.framework/Headers include/AudioToolbox&lt;br /&gt;
 mv AudioUnit.framework/Headers include/AudioUnit&lt;br /&gt;
 mv CFNetwork.framework/Headers include/CFNetwork&lt;br /&gt;
 mv CoreAudio.framework/Headers include/CoreAudio&lt;br /&gt;
 mv CoreFoundation.framework/Headers include/CoreFoundation&lt;br /&gt;
 mv CoreGraphics.framework/Headers include/CoreGraphics&lt;br /&gt;
 mv CoreLocation.framework/Headers include/CoreLocation&lt;br /&gt;
 mv Foundation.framework/Headers include/Foundation&lt;br /&gt;
 mv MediaPlayer.framework/Headers include/MediaPlayer&lt;br /&gt;
 mv OpenAL.framework/Headers include/OpenAL&lt;br /&gt;
 mv OpenGLES.framework/Headers include/OpenGLES&lt;br /&gt;
 mv QuartzCore.framework/Headers include/QuartzCore&lt;br /&gt;
 mv Security.framework/Headers include/Security&lt;br /&gt;
 mv SystemConfiguration.framework/Headers include/SystemConfiguration&lt;br /&gt;
 mv UIKit.framework/Headers include/UIKit&lt;br /&gt;
 rmdir -p *.framework&lt;br /&gt;
&lt;br /&gt;
* The above commands can also be simplified (and can be applied to other versions of SDKs, for example, iPhone SDK 2.2) using a bash shell command:&lt;br /&gt;
 for a in *.framework; do mv $a/Headers include/${a%.*}; done&lt;br /&gt;
 rmdir -p *.framework&lt;br /&gt;
&lt;br /&gt;
* The remaining directories are ''include'' with all Framework headers and ''usr'' with all system related headers.&lt;br /&gt;
&lt;br /&gt;
* Move the ''usr/include'' headers also into new ''include'' directory, remove ''usr/lib'' since gcc includes will not be needed (at least not on iPhone toolchain), and clean up:&lt;br /&gt;
 mv usr/include/* include/&lt;br /&gt;
 rm -rf usr/lib&lt;br /&gt;
 rmdir -p usr/include/&lt;br /&gt;
&lt;br /&gt;
* You may still remove the ''Payload'' file since we don't need it anymore:&lt;br /&gt;
 rm Payload&lt;br /&gt;
&lt;br /&gt;
* Create a tar file so that you can directly transfer to your iPhone:&lt;br /&gt;
 tar --group 0 --owner 0 -cvf include.tar include&lt;br /&gt;
&lt;br /&gt;
* You are done.&lt;br /&gt;
&lt;br /&gt;
* Now you may transfer the ''include.tar'' to your iPhone (as user root), login to your iPhone via ssh and execute following commands to extract the header files (on your iPhone):&lt;br /&gt;
 cd /var&lt;br /&gt;
 tar xf /private/var/root/include.tar&lt;br /&gt;
&lt;br /&gt;
== iPhone/iPod Touch ==&lt;br /&gt;
There is a tool chain available after jailbreak from the [[Cydia|Cydia installer]]. You just need to install&lt;br /&gt;
the '''GNU C Compiler''' from Cydia to get the development environment on your iPhone&lt;br /&gt;
or iPod Touch. BigBoss has some comments on this Toolchain on his&lt;br /&gt;
webpage ''[http://thebigboss.org/moreinfo/Toolchain2.php Toolchain 2.0]''.&lt;br /&gt;
&lt;br /&gt;
If you want to use the header files from iPhone OS 2.0, you can obtain them from the&lt;br /&gt;
iPhone OS 2.0 SDK as described in section ''[[#Framework Headers|Framework Headers]]''.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''&lt;br /&gt;
When using iphone-gcc ( the native compiler ) to compile iPhone applications, you must do one of the following:&lt;br /&gt;
# Patch the SDK header files for use with the compiler ( stupid thing doesn't like the new headers! ) or&lt;br /&gt;
# Use the old header files ( which are great, but some things dont work/exist the same anymore! ) or&lt;br /&gt;
# Use the following settings in your Makefile to avoid warnings and errors during compilation and linking:&lt;br /&gt;
 CC=/usr/bin/gcc&lt;br /&gt;
 &lt;br /&gt;
 CFLAGS=-fsigned-char -g -ObjC -fobjc-exceptions \&lt;br /&gt;
   -Wall -Wundeclared-selector -Wreturn-type -Wnested-externs \&lt;br /&gt;
   -Wredundant-decls \&lt;br /&gt;
   -Wbad-function-cast \&lt;br /&gt;
   -Wchar-subscripts \&lt;br /&gt;
   -Winline -Wswitch -Wshadow \&lt;br /&gt;
   -I/var/include \&lt;br /&gt;
   -I/var/include/gcc/darwin/4.0 \&lt;br /&gt;
   -D_CTYPE_H_ \&lt;br /&gt;
   -D_BSD_ARM_SETJMP_H \&lt;br /&gt;
   -D_UNISTD_H_&lt;br /&gt;
 &lt;br /&gt;
 CPPFLAGS=&lt;br /&gt;
 &lt;br /&gt;
 LD=$(CC)&lt;br /&gt;
 &lt;br /&gt;
 LDFLAGS=-lobjc \&lt;br /&gt;
   -F/System/Library/Frameworks \&lt;br /&gt;
   -framework CoreFoundation \&lt;br /&gt;
   -framework Foundation \&lt;br /&gt;
   -framework UIKit \&lt;br /&gt;
   -framework CoreGraphics \&lt;br /&gt;
   -L/usr/lib -lc /usr/lib/libgcc_s.1.dylib \&lt;br /&gt;
   -bind_at_load \&lt;br /&gt;
   -multiply_defined suppress&lt;br /&gt;
&lt;br /&gt;
If you want to test the iPhone 2.0 Toolchain, you may use this [[HelloWorld on iPhone|HelloWorld]] example.&lt;br /&gt;
&lt;br /&gt;
== Misc. Issues ==&lt;br /&gt;
&lt;br /&gt;
For the iPhone 2.2 SDK headers, you might encounter an error about not finding the stdint.h file when compiling natively on the iPhone. In that case, try this:&lt;br /&gt;
  cd /var/include&lt;br /&gt;
  ls stdint.h # make sure it doesn't exist&lt;br /&gt;
  ln -s gcc/darwin/4.0/stdint.h stdint.h&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Toolchain_2.0&amp;diff=3620</id>
		<title>Toolchain 2.0</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Toolchain_2.0&amp;diff=3620"/>
		<updated>2009-04-18T11:37:49Z</updated>

		<summary type="html">&lt;p&gt;James: Added AVFoundation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article explains how to build a tool chain for iPhone OS 2.0. &lt;br /&gt;
&lt;br /&gt;
'''Please note that this section is under development.'''&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Mac OS X ==&lt;br /&gt;
Until a valid iPhone ARM toolchain installer can be legally distributed throughout the public (grr NDA), the alternative is simple. Install the Apple iPhone SDK, and use it's compiler, and specify the correct architecture, like so:&lt;br /&gt;
&lt;br /&gt;
/Developer/Platforms/iPhoneOS.platform/Developer/usr/bin/gcc -arch armv6 -isysroot /Developer/Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS2.1.sdk&lt;br /&gt;
&lt;br /&gt;
For extra headers that you have either obtained from an external source, or dumped from the iphone or iphone simulator frameworks yourself, place them in a custom include directory and pass the -I option through the compiler like so:&lt;br /&gt;
&lt;br /&gt;
..../gcc -I &amp;quot;YOUR INCLUDE DIRECTORY&amp;quot;.......&lt;br /&gt;
&lt;br /&gt;
Use saurik's codesign tool (ldid) to sign the binary like so:&lt;br /&gt;
&lt;br /&gt;
ldid -S &amp;lt;binary&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More on this coming soon.&lt;br /&gt;
&lt;br /&gt;
== Windows XP ==&lt;br /&gt;
&lt;br /&gt;
=== Extraction of iPhone OS 2.0 SDK ===&lt;br /&gt;
''Please Note: As of 7-Zip 4.59 Beta, support is available for .DMG and XAR-format archives. 7-Zip is now capable of completely extracting iPhone 2.0 SDK Package.''&lt;br /&gt;
* Download the iPhone OS 2.0 SDK from [http://developer.apple.com/iphone/index.action Apple iPhone Dev Center].&lt;br /&gt;
* Download and install ''HFSExplorer'' from [http://hem.bredband.net/catacombae/hfsx.html catacombae software].&lt;br /&gt;
* Start ''HFSExplorer'' and choose the menu ''File&amp;amp;rarr;Open UDIF Disk Image (.dmg)...''&lt;br /&gt;
* Select the iPhone 2.0 SDK disk image ''iphone_sdk_final.dmg'' and press ''Open''&lt;br /&gt;
* When the tool asks ''Which partition to read'' leave it at ''&amp;quot;Mac_OS_X&amp;quot; (Apple_HFS)'' and press ''OK''&lt;br /&gt;
* Go to ''Packages'' and select the package you want to extract, e.g. ''iPhoneSDKHeadersAndLibs.pkg'' for the iPhone OS 2.0 header files.&lt;br /&gt;
* With right mouse button choose ''Extract data'' to extract an installation package.&lt;br /&gt;
* Please note that in order to extract this .pkg file on Windows, you must compile xar using Cygwin.  Make sure you have libxml2, libxml2-devel, openssl and openssl-devel.  You can then follow the instructions below.&lt;br /&gt;
&lt;br /&gt;
== Linux ==&lt;br /&gt;
Currently we can only describe how to get the headers from the iPhone OS 2.0 SDK.&lt;br /&gt;
&lt;br /&gt;
=== Extraction of iPhone OS 2.0 Installation Packages (.pkg) ===&lt;br /&gt;
* Extract &amp;lt;tt&amp;gt;iPhoneSDKHeadersAndLibs.pkg&amp;lt;/tt&amp;gt; from iPhone OS 2.0 SDK:&lt;br /&gt;
 mount -t hfs -o loop /path/to/iphone_sdk_final.dmg /somepath/somedir&lt;br /&gt;
:Copy &amp;lt;tt&amp;gt;iPhoneSDKHeadersAndLibs.pkg&amp;lt;/tt&amp;gt; from &amp;lt;tt&amp;gt;/somepath/somedir&amp;lt;/tt&amp;gt;&lt;br /&gt;
* Use the ''[http://code.google.com/p/xar/ eXtensible ARchiver]'' &amp;lt;tt&amp;gt;xar&amp;lt;/tt&amp;gt; to extract the file &amp;lt;tt&amp;gt;Payload&amp;lt;/tt&amp;gt; file containing the actual header files:&lt;br /&gt;
 xar -xf iPhoneSDKHeadersAndLibs.pkg Payload&lt;br /&gt;
*Extract the contents of the resulting &amp;lt;tt&amp;gt;Payload&amp;lt;/tt&amp;gt; file&lt;br /&gt;
 zcat Payload | cpio -id&lt;br /&gt;
or&lt;br /&gt;
 zcat Payload | cpio -id '*.h'&lt;br /&gt;
to extract only all header files included in the package.&lt;br /&gt;
&lt;br /&gt;
=== Framework Headers ===&lt;br /&gt;
This section assumes that&lt;br /&gt;
 zcat Payload | cpio -id '*.h'&lt;br /&gt;
got used in previous section.&lt;br /&gt;
&lt;br /&gt;
If you want to move all Framework headers into an ''include'' directory continue&lt;br /&gt;
as follows:&lt;br /&gt;
&lt;br /&gt;
* Remove the project XCode templates since they will not be required anymore:&lt;br /&gt;
 rm -rf Platforms/iPhoneOS.platform/Developer/Library&lt;br /&gt;
&lt;br /&gt;
* Create your target ''include'' directory:&lt;br /&gt;
 mkdir include&lt;br /&gt;
&lt;br /&gt;
* Get just the ''System'' and ''usr'' directories from the iPhone Os 2.0 SDK and remove the empty ''Platforms'' directory hierarchy:&lt;br /&gt;
 mv Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS2.0.sdk/* .&lt;br /&gt;
 rmdir -p Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS2.0.sdk/&lt;br /&gt;
&lt;br /&gt;
* Move the Framework headers to current directory and clean-up empty directory hierarchy:&lt;br /&gt;
 mv System/Library/Frameworks/* .&lt;br /&gt;
 rmdir -p System/Library/Frameworks/&lt;br /&gt;
&lt;br /&gt;
* Rename/move all Framework header directories into ''include'' directory and cleanup&lt;br /&gt;
 mv AddressBook.framework/Headers include/AddressBook&lt;br /&gt;
 mv AddressBookUI.framework/Headers include/AddressBookUI&lt;br /&gt;
 mv AudioToolbox.framework/Headers include/AudioToolbox&lt;br /&gt;
 mv AudioUnit.framework/Headers include/AudioUnit&lt;br /&gt;
 mv AVFoundation.framework/Headers include/AVFoundation&lt;br /&gt;
 mv CFNetwork.framework/Headers include/CFNetwork&lt;br /&gt;
 mv CoreAudio.framework/Headers include/CoreAudio&lt;br /&gt;
 mv CoreFoundation.framework/Headers include/CoreFoundation&lt;br /&gt;
 mv CoreGraphics.framework/Headers include/CoreGraphics&lt;br /&gt;
 mv CoreLocation.framework/Headers include/CoreLocation&lt;br /&gt;
 mv Foundation.framework/Headers include/Foundation&lt;br /&gt;
 mv MediaPlayer.framework/Headers include/MediaPlayer&lt;br /&gt;
 mv OpenAL.framework/Headers include/OpenAL&lt;br /&gt;
 mv OpenGLES.framework/Headers include/OpenGLES&lt;br /&gt;
 mv QuartzCore.framework/Headers include/QuartzCore&lt;br /&gt;
 mv Security.framework/Headers include/Security&lt;br /&gt;
 mv SystemConfiguration.framework/Headers include/SystemConfiguration&lt;br /&gt;
 mv UIKit.framework/Headers include/UIKit&lt;br /&gt;
 rmdir -p *.framework&lt;br /&gt;
&lt;br /&gt;
* The above commands can also be simplified (and can be applied to other versions of SDKs, for example, iPhone SDK 2.2) using a bash shell command:&lt;br /&gt;
 for a in *.framework; do mv $a/Headers include/${a%.*}; done&lt;br /&gt;
 rmdir -p *.framework&lt;br /&gt;
&lt;br /&gt;
* The remaining directories are ''include'' with all Framework headers and ''usr'' with all system related headers.&lt;br /&gt;
&lt;br /&gt;
* Move the ''usr/include'' headers also into new ''include'' directory, remove ''usr/lib'' since gcc includes will not be needed (at least not on iPhone toolchain), and clean up:&lt;br /&gt;
 mv usr/include/* include/&lt;br /&gt;
 rm -rf usr/lib&lt;br /&gt;
 rmdir -p usr/include/&lt;br /&gt;
&lt;br /&gt;
* You may still remove the ''Payload'' file since we don't need it anymore:&lt;br /&gt;
 rm Payload&lt;br /&gt;
&lt;br /&gt;
* Create a tar file so that you can directly transfer to your iPhone:&lt;br /&gt;
 tar --group 0 --owner 0 -cvf include.tar include&lt;br /&gt;
&lt;br /&gt;
* You are done.&lt;br /&gt;
&lt;br /&gt;
* Now you may transfer the ''include.tar'' to your iPhone (as user root), login to your iPhone via ssh and execute following commands to extract the header files (on your iPhone):&lt;br /&gt;
 cd /var&lt;br /&gt;
 tar xf /private/var/root/include.tar&lt;br /&gt;
&lt;br /&gt;
== iPhone/iPod Touch ==&lt;br /&gt;
There is a tool chain available after jailbreak from the [[Cydia|Cydia installer]]. You just need to install&lt;br /&gt;
the '''GNU C Compiler''' from Cydia to get the development environment on your iPhone&lt;br /&gt;
or iPod Touch. BigBoss has some comments on this Toolchain on his&lt;br /&gt;
webpage ''[http://thebigboss.org/moreinfo/Toolchain2.php Toolchain 2.0]''.&lt;br /&gt;
&lt;br /&gt;
If you want to use the header files from iPhone OS 2.0, you can obtain them from the&lt;br /&gt;
iPhone OS 2.0 SDK as described in section ''[[#Framework Headers|Framework Headers]]''.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''&lt;br /&gt;
When using iphone-gcc ( the native compiler ) to compile iPhone applications, you must do one of the following:&lt;br /&gt;
# Patch the SDK header files for use with the compiler ( stupid thing doesn't like the new headers! ) or&lt;br /&gt;
# Use the old header files ( which are great, but some things dont work/exist the same anymore! ) or&lt;br /&gt;
# Use the following settings in your Makefile to avoid warnings and errors during compilation and linking:&lt;br /&gt;
 CC=/usr/bin/gcc&lt;br /&gt;
 &lt;br /&gt;
 CFLAGS=-fsigned-char -g -ObjC -fobjc-exceptions \&lt;br /&gt;
   -Wall -Wundeclared-selector -Wreturn-type -Wnested-externs \&lt;br /&gt;
   -Wredundant-decls \&lt;br /&gt;
   -Wbad-function-cast \&lt;br /&gt;
   -Wchar-subscripts \&lt;br /&gt;
   -Winline -Wswitch -Wshadow \&lt;br /&gt;
   -I/var/include \&lt;br /&gt;
   -I/var/include/gcc/darwin/4.0 \&lt;br /&gt;
   -D_CTYPE_H_ \&lt;br /&gt;
   -D_BSD_ARM_SETJMP_H \&lt;br /&gt;
   -D_UNISTD_H_&lt;br /&gt;
 &lt;br /&gt;
 CPPFLAGS=&lt;br /&gt;
 &lt;br /&gt;
 LD=$(CC)&lt;br /&gt;
 &lt;br /&gt;
 LDFLAGS=-lobjc \&lt;br /&gt;
   -F/System/Library/Frameworks \&lt;br /&gt;
   -framework CoreFoundation \&lt;br /&gt;
   -framework Foundation \&lt;br /&gt;
   -framework UIKit \&lt;br /&gt;
   -framework CoreGraphics \&lt;br /&gt;
   -L/usr/lib -lc /usr/lib/libgcc_s.1.dylib \&lt;br /&gt;
   -bind_at_load \&lt;br /&gt;
   -multiply_defined suppress&lt;br /&gt;
&lt;br /&gt;
If you want to test the iPhone 2.0 Toolchain, you may use this [[HelloWorld on iPhone|HelloWorld]] example.&lt;br /&gt;
&lt;br /&gt;
== Misc. Issues ==&lt;br /&gt;
&lt;br /&gt;
For the iPhone 2.2 SDK headers, you might encounter an error about not finding the stdint.h file when compiling natively on the iPhone. In that case, try this:&lt;br /&gt;
  cd /var/include&lt;br /&gt;
  ls stdint.h # make sure it doesn't exist&lt;br /&gt;
  ln -s gcc/darwin/4.0/stdint.h stdint.h&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3567</id>
		<title>Talk:GenPass</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3567"/>
		<updated>2009-04-16T01:42:32Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Compilation notes ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
If anyone is trying to compile this using MinGW on Windows, you'll run into some linking problems with libcrypto.&lt;br /&gt;
After searching around for awhile, I found that the problem can be solved by adding -lgdi32 to your linker flags.&lt;br /&gt;
&lt;br /&gt;
I just needed the -lgdi32  What crap that a crypto lib linked to a graphics library&lt;br /&gt;
&lt;br /&gt;
I don't know, it's screwy. I think a lot of OpenSSL is actually hacky on Windows (after reading the posts with corrections for this problem, it seems like their talking about some kind of pre-alpha program that barely works on anything besides Linux).&lt;br /&gt;
Also, I see that compiling works with just gdi, so I removed it from my initial suggestion.&lt;br /&gt;
Must have had ws2_32 first or something..&lt;br /&gt;
&lt;br /&gt;
=== Mac compiling ===&lt;br /&gt;
&lt;br /&gt;
Must have a recent copy of openssl installed. if you don't do this.&lt;br /&gt;
&lt;br /&gt;
* download and extract openssl [http://www.openssl.org/source/openssl-0.9.8h.tar.gz]&lt;br /&gt;
* run './config' and then 'make' to build the lib.&lt;br /&gt;
* copy genpass.c into the openssl directory&lt;br /&gt;
* compile with 'gcc genpass.c libcrypto.a -o genpass -I./include/'&lt;br /&gt;
&lt;br /&gt;
plz correct me if I'm wrong, as I'm no mac expert --[[User:Posixninja|posixninja]] 21:52, 6 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Linux compiling ===&lt;br /&gt;
What do you expect? Works fine with just -lcrypto.&lt;br /&gt;
&lt;br /&gt;
== How to use? ==&lt;br /&gt;
&lt;br /&gt;
Well, I tried to get the key for beta 2 for the 3g, I never could.&lt;br /&gt;
I asked on #iPhone and they told me that&lt;br /&gt;
Platform is s5l8***x (s5l8900x) for the iPhones and ipt1g.&lt;br /&gt;
Ramdisk is the path to a MOUNTED (decrypted) ramdisk file (not mount path). They didn't know wether it was the restore or update or both ramdisk.&lt;br /&gt;
Main is the path to the big dmg file (the rootfs &amp;gt; 100 mb).&lt;br /&gt;
Well this didn't work : I got different keys.&lt;br /&gt;
Please correct what is wrong in the above.  dranfi&lt;br /&gt;
&lt;br /&gt;
:It shouldn't matter which ramdisk you use, however, you cannot use GenPass to extract correct keys from anything &amp;gt;b2 without decompressing the ramdisk first. Apparently, this is a Snow Leopard only feature for now. You could also (in theory) compile GenPass on your device and use iPhone OS' tools to mount the ramdisk (since they must know how to understand them), although I haven't gotten around to try this yet.&lt;br /&gt;
&lt;br /&gt;
::The compression is affecting beta 3 at this point or beta 1 and 2?&lt;br /&gt;
::And, since I have snow leopard beta, how do you decompres it under snow leopard? And is this a new feature of snow leopard (in a recent build or from the begening, just that at the moment I have a slow connection making it hard to upgrade snow leopard)?&lt;br /&gt;
&lt;br /&gt;
:::This compression affects betas 2 &amp;amp; 3, but not beta 1. And unfortunately I do not know how to decompress it under any system :( --[[User:Cool name|Cool name]] 01:12, 16 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I assume that simply mounting a decrypted ramdisk under Snow Leopard would decompress it. --[[User:James|James]] 01:42, 16 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3563</id>
		<title>Talk:GenPass</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3563"/>
		<updated>2009-04-15T20:40:50Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Compilation notes ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
If anyone is trying to compile this using MinGW on Windows, you'll run into some linking problems with libcrypto.&lt;br /&gt;
After searching around for awhile, I found that the problem can be solved by adding -lgdi32 to your linker flags.&lt;br /&gt;
&lt;br /&gt;
I just needed the -lgdi32  What crap that a crypto lib linked to a graphics library&lt;br /&gt;
&lt;br /&gt;
I don't know, it's screwy. I think a lot of OpenSSL is actually hacky on Windows (after reading the posts with corrections for this problem, it seems like their talking about some kind of pre-alpha program that barely works on anything besides Linux).&lt;br /&gt;
Also, I see that compiling works with just gdi, so I removed it from my initial suggestion.&lt;br /&gt;
Must have had ws2_32 first or something..&lt;br /&gt;
&lt;br /&gt;
=== Mac compiling ===&lt;br /&gt;
&lt;br /&gt;
Must have a recent copy of openssl installed. if you don't do this.&lt;br /&gt;
&lt;br /&gt;
* download and extract openssl [http://www.openssl.org/source/openssl-0.9.8h.tar.gz]&lt;br /&gt;
* run './config' and then 'make' to build the lib.&lt;br /&gt;
* copy genpass.c into the openssl directory&lt;br /&gt;
* compile with 'gcc genpass.c libcrypto.a -o genpass -I./include/'&lt;br /&gt;
&lt;br /&gt;
plz correct me if I'm wrong, as I'm no mac expert --[[User:Posixninja|posixninja]] 21:52, 6 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Linux compiling ===&lt;br /&gt;
What do you expect? Works fine with just -lcrypto.&lt;br /&gt;
&lt;br /&gt;
== How to use? ==&lt;br /&gt;
&lt;br /&gt;
Well, I tried to get the key for beta 2 for the 3g, I never could.&lt;br /&gt;
I asked on #iPhone and they told me that&lt;br /&gt;
Platform is s5l8***x (s5l8900x) for the iPhones and ipt1g.&lt;br /&gt;
Ramdisk is the path to a MOUNTED (decrypted) ramdisk file (not mount path). They didn't know wether it was the restore or update or both ramdisk.&lt;br /&gt;
Main is the path to the big dmg file (the rootfs &amp;gt; 100 mb).&lt;br /&gt;
Well this didn't work : I got different keys.&lt;br /&gt;
Please correct what is wrong in the above.  dranfi&lt;br /&gt;
&lt;br /&gt;
::It shouldn't matter which ramdisk you use, however, you cannot use GenPass to extract correct keys from anything &amp;gt;b2 without decompressing the ramdisk first. Apparently, this is a Snow Leopard only feature for now. You could also (in theory) compile GenPass on your device and use iPhone OS' tools to mount the ramdisk (since they must know how to understand them), although I haven't gotten around to try this yet.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3510</id>
		<title>Talk:Research: Pwnage Patches</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3510"/>
		<updated>2009-04-14T03:00:18Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Kernel and ramdisk patches ==&lt;br /&gt;
Anyone care to share what is patched?&lt;br /&gt;
&lt;br /&gt;
== yup ==&lt;br /&gt;
&lt;br /&gt;
'''ramdisk''':&lt;br /&gt;
&lt;br /&gt;
'''asr''' - patch out rootfs SHA1 check&lt;br /&gt;
&lt;br /&gt;
'''restored_external''' - patch wiping routine&lt;br /&gt;
&lt;br /&gt;
'''kernel''':&lt;br /&gt;
&lt;br /&gt;
haven't looked into this, but there are four patches, at least some of them are for codesign and apparently one of them has to do with virtual memory mapping.&lt;br /&gt;
&lt;br /&gt;
== Thanks ==&lt;br /&gt;
Do you know how the new codesign is added yet?&lt;br /&gt;
I notice you think they didn't use ldid.&lt;br /&gt;
It seems that the second patches to asr and restored are codesign (from what I can tell when 2.1 and 2.2 files are compared), but I don't see any in the kernel, they're all simple.&lt;br /&gt;
&lt;br /&gt;
== patches ==&lt;br /&gt;
&lt;br /&gt;
patches to asr and restored are the patches i listed above, and patches for the hashes so that they will run. when i say in the kernel codesign is patch, then it wil patch out the need for code to be signed, but apparently it was determined that the sha1 hash check was too annoying to patched as it would always be changing, so they just rehashed asr and restored, not codesign, just rehashed.&lt;br /&gt;
&lt;br /&gt;
== hashes ==&lt;br /&gt;
&lt;br /&gt;
What are you taking the hash of?&lt;br /&gt;
For example, I extracted asr from a stock 018-4378-1.dmg from 2.2 and compared it to one from a custom disk image; diffing them shows two patches; the first I assume to be the SHA1 check (at 0x12F16).&lt;br /&gt;
The second at 0x27C7A confuses me though, because I think this must be the hash (I'm new to this stuff, so forgive me if I'm just missing something incredibly obvious).&lt;br /&gt;
If I take the hash of the stock asr (9146c06d34b4fa9fc3cb3c7490851fabb875e3c8) and compare it to the hash within the file, it doesn't match (6350E8890FD7217152F72B3EA3285B6D7E617020).&lt;br /&gt;
The hash of the custom asr doesn't match the internal hash either, and the same goes for restored.&lt;br /&gt;
&lt;br /&gt;
== isha / ldid ==&lt;br /&gt;
&lt;br /&gt;
it is rehashed with isha or ldid -s, i don't really know the nitty gritty of that stuff.&lt;br /&gt;
&lt;br /&gt;
== 2G DeviceTree ==&lt;br /&gt;
&lt;br /&gt;
It seems that this was never patched until redsn0w QuickPwn.&lt;br /&gt;
What exactly is the patch made--[[User:Cool name|Cool name]] 02:24, 14 April 2009 (UTC)--[[User:Cool name|Cool name]] 02:24, 14 April 2009 (UTC) to allow LogoMe to work?&lt;br /&gt;
I tried old patches (function-disable_keys -&amp;gt; xxxxxxxx-disable_keys, secure-root-prefix doesn't exist at all), but they don't seem to work.&lt;br /&gt;
&lt;br /&gt;
:disable keys and secure root patches should have worked, afaik, are u sure u decrypted it correctly? [[User:ChronicDev|ChronicDev]] 23:44, 13 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::I believe I did, all names are visible. I notice at 0x0 - 0x10, there seems to be secure-root-prefix, but it is garbled (*junk*oot-prefix), I don't know what this is about..&lt;br /&gt;
::I patched function-disable_keys at 0x3534, though.--[[User:James|James]] 00:10, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::you somehow used the wrong IV probably, double check that [[User:ChronicDev|ChronicDev]] 02:00, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I used the IV from ChronicDev GoogleCode, is it correct? I actually don't have a 2G so I cannot verify it. --[[User:James|James]] 02:03, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:::::Err, James. How do you know the DeviceTree patches are not working if you do not have a 2G to get the keys from?--[[User:Cool name|Cool name]] 02:24, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::::I've had other people test them for me. I always thought it was fishy that there was what was seemingly garbage at the beginning of the file, but went with it anyways and made the patch I could. The resulting image would never work, so I knew there must be either another patch or I did it wrong. --[[User:James|James]] 02:29, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::::::Ahh ok. You should have someone independently verify the keys of that DeviceTree, because as chronic said that IV is most likely incorrect.--[[User:Cool name|Cool name]] 02:39, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::::::I most certainly remember there being a slip up with the devtree key, my bad, we never fixed that. if you can, in the meantime, use planet's crypto bundle to get the right IV&lt;br /&gt;
&lt;br /&gt;
:::::::::Yeah, that's what I plan on having someone do. It's really weird though, we correctly decrypted 3.0b2 keys on the device with a seemingly bad DeviceTree flashed. It only had disable_keys patched out and garbage at the beginning iirc. Weird stuff. I'll comment the page with the correct IV when it's found though so you can edit it in. I'm kind of making this wiki a chat though, so I'll stop the edits. --[[User:James|James]] 03:00, 14 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3507</id>
		<title>Talk:Research: Pwnage Patches</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3507"/>
		<updated>2009-04-14T02:29:22Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Kernel and ramdisk patches ==&lt;br /&gt;
Anyone care to share what is patched?&lt;br /&gt;
&lt;br /&gt;
== yup ==&lt;br /&gt;
&lt;br /&gt;
'''ramdisk''':&lt;br /&gt;
&lt;br /&gt;
'''asr''' - patch out rootfs SHA1 check&lt;br /&gt;
&lt;br /&gt;
'''restored_external''' - patch wiping routine&lt;br /&gt;
&lt;br /&gt;
'''kernel''':&lt;br /&gt;
&lt;br /&gt;
haven't looked into this, but there are four patches, at least some of them are for codesign and apparently one of them has to do with virtual memory mapping.&lt;br /&gt;
&lt;br /&gt;
== Thanks ==&lt;br /&gt;
Do you know how the new codesign is added yet?&lt;br /&gt;
I notice you think they didn't use ldid.&lt;br /&gt;
It seems that the second patches to asr and restored are codesign (from what I can tell when 2.1 and 2.2 files are compared), but I don't see any in the kernel, they're all simple.&lt;br /&gt;
&lt;br /&gt;
== patches ==&lt;br /&gt;
&lt;br /&gt;
patches to asr and restored are the patches i listed above, and patches for the hashes so that they will run. when i say in the kernel codesign is patch, then it wil patch out the need for code to be signed, but apparently it was determined that the sha1 hash check was too annoying to patched as it would always be changing, so they just rehashed asr and restored, not codesign, just rehashed.&lt;br /&gt;
&lt;br /&gt;
== hashes ==&lt;br /&gt;
&lt;br /&gt;
What are you taking the hash of?&lt;br /&gt;
For example, I extracted asr from a stock 018-4378-1.dmg from 2.2 and compared it to one from a custom disk image; diffing them shows two patches; the first I assume to be the SHA1 check (at 0x12F16).&lt;br /&gt;
The second at 0x27C7A confuses me though, because I think this must be the hash (I'm new to this stuff, so forgive me if I'm just missing something incredibly obvious).&lt;br /&gt;
If I take the hash of the stock asr (9146c06d34b4fa9fc3cb3c7490851fabb875e3c8) and compare it to the hash within the file, it doesn't match (6350E8890FD7217152F72B3EA3285B6D7E617020).&lt;br /&gt;
The hash of the custom asr doesn't match the internal hash either, and the same goes for restored.&lt;br /&gt;
&lt;br /&gt;
== isha / ldid ==&lt;br /&gt;
&lt;br /&gt;
it is rehashed with isha or ldid -s, i don't really know the nitty gritty of that stuff.&lt;br /&gt;
&lt;br /&gt;
== 2G DeviceTree ==&lt;br /&gt;
&lt;br /&gt;
It seems that this was never patched until redsn0w QuickPwn.&lt;br /&gt;
What exactly is the patch made--[[User:Cool name|Cool name]] 02:24, 14 April 2009 (UTC)--[[User:Cool name|Cool name]] 02:24, 14 April 2009 (UTC) to allow LogoMe to work?&lt;br /&gt;
I tried old patches (function-disable_keys -&amp;gt; xxxxxxxx-disable_keys, secure-root-prefix doesn't exist at all), but they don't seem to work.&lt;br /&gt;
&lt;br /&gt;
:disable keys and secure root patches should have worked, afaik, are u sure u decrypted it correctly? [[User:ChronicDev|ChronicDev]] 23:44, 13 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::I believe I did, all names are visible. I notice at 0x0 - 0x10, there seems to be secure-root-prefix, but it is garbled (*junk*oot-prefix), I don't know what this is about..&lt;br /&gt;
::I patched function-disable_keys at 0x3534, though.--[[User:James|James]] 00:10, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::you somehow used the wrong IV probably, double check that [[User:ChronicDev|ChronicDev]] 02:00, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I used the IV from ChronicDev GoogleCode, is it correct? I actually don't have a 2G so I cannot verify it. --[[User:James|James]] 02:03, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:::::Err, James. How do you know the DeviceTree patches are not working if you do not have a 2G to get the keys from?--[[User:Cool name|Cool name]] 02:24, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::::I've had other people test them for me. I always thought it was fishy that there was what was seemingly garbage at the beginning of the file, but went with it anyways and made the patch I could. The resulting image would never work, so I knew there must be either another patch or I did it wrong. --[[User:James|James]] 02:29, 14 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3505</id>
		<title>Talk:Research: Pwnage Patches</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3505"/>
		<updated>2009-04-14T02:03:23Z</updated>

		<summary type="html">&lt;p&gt;James: /* 2G DeviceTree */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Kernel and ramdisk patches ==&lt;br /&gt;
Anyone care to share what is patched?&lt;br /&gt;
&lt;br /&gt;
== yup ==&lt;br /&gt;
&lt;br /&gt;
'''ramdisk''':&lt;br /&gt;
&lt;br /&gt;
'''asr''' - patch out rootfs SHA1 check&lt;br /&gt;
&lt;br /&gt;
'''restored_external''' - patch wiping routine&lt;br /&gt;
&lt;br /&gt;
'''kernel''':&lt;br /&gt;
&lt;br /&gt;
haven't looked into this, but there are four patches, at least some of them are for codesign and apparently one of them has to do with virtual memory mapping.&lt;br /&gt;
&lt;br /&gt;
== Thanks ==&lt;br /&gt;
Do you know how the new codesign is added yet?&lt;br /&gt;
I notice you think they didn't use ldid.&lt;br /&gt;
It seems that the second patches to asr and restored are codesign (from what I can tell when 2.1 and 2.2 files are compared), but I don't see any in the kernel, they're all simple.&lt;br /&gt;
&lt;br /&gt;
== patches ==&lt;br /&gt;
&lt;br /&gt;
patches to asr and restored are the patches i listed above, and patches for the hashes so that they will run. when i say in the kernel codesign is patch, then it wil patch out the need for code to be signed, but apparently it was determined that the sha1 hash check was too annoying to patched as it would always be changing, so they just rehashed asr and restored, not codesign, just rehashed.&lt;br /&gt;
&lt;br /&gt;
== hashes ==&lt;br /&gt;
&lt;br /&gt;
What are you taking the hash of?&lt;br /&gt;
For example, I extracted asr from a stock 018-4378-1.dmg from 2.2 and compared it to one from a custom disk image; diffing them shows two patches; the first I assume to be the SHA1 check (at 0x12F16).&lt;br /&gt;
The second at 0x27C7A confuses me though, because I think this must be the hash (I'm new to this stuff, so forgive me if I'm just missing something incredibly obvious).&lt;br /&gt;
If I take the hash of the stock asr (9146c06d34b4fa9fc3cb3c7490851fabb875e3c8) and compare it to the hash within the file, it doesn't match (6350E8890FD7217152F72B3EA3285B6D7E617020).&lt;br /&gt;
The hash of the custom asr doesn't match the internal hash either, and the same goes for restored.&lt;br /&gt;
&lt;br /&gt;
== isha / ldid ==&lt;br /&gt;
&lt;br /&gt;
it is rehashed with isha or ldid -s, i don't really know the nitty gritty of that stuff.&lt;br /&gt;
&lt;br /&gt;
== 2G DeviceTree ==&lt;br /&gt;
&lt;br /&gt;
It seems that this was never patched until redsn0w QuickPwn.&lt;br /&gt;
What exactly is the patch made to allow LogoMe to work?&lt;br /&gt;
I tried old patches (function-disable_keys -&amp;gt; xxxxxxxx-disable_keys, secure-root-prefix doesn't exist at all), but they don't seem to work.&lt;br /&gt;
&lt;br /&gt;
:disable keys and secure root patches should have worked, afaik, are u sure u decrypted it correctly? [[User:ChronicDev|ChronicDev]] 23:44, 13 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::I believe I did, all names are visible. I notice at 0x0 - 0x10, there seems to be secure-root-prefix, but it is garbled (*junk*oot-prefix), I don't know what this is about..&lt;br /&gt;
::I patched function-disable_keys at 0x3534, though.--[[User:James|James]] 00:10, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::you somehow used the wrong IV probably, double check that [[User:ChronicDev|ChronicDev]] 02:00, 14 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::::I used the IV from ChronicDev GoogleCode, is it correct? I actually don't have a 2G so I cannot verify it. --[[User:James|James]] 02:03, 14 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3503</id>
		<title>Talk:Research: Pwnage Patches</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3503"/>
		<updated>2009-04-14T00:11:35Z</updated>

		<summary type="html">&lt;p&gt;James: Formatting.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Kernel and ramdisk patches ==&lt;br /&gt;
Anyone care to share what is patched?&lt;br /&gt;
&lt;br /&gt;
== yup ==&lt;br /&gt;
&lt;br /&gt;
'''ramdisk''':&lt;br /&gt;
&lt;br /&gt;
'''asr''' - patch out rootfs SHA1 check&lt;br /&gt;
&lt;br /&gt;
'''restored_external''' - patch wiping routine&lt;br /&gt;
&lt;br /&gt;
'''kernel''':&lt;br /&gt;
&lt;br /&gt;
haven't looked into this, but there are four patches, at least some of them are for codesign and apparently one of them has to do with virtual memory mapping.&lt;br /&gt;
&lt;br /&gt;
== Thanks ==&lt;br /&gt;
Do you know how the new codesign is added yet?&lt;br /&gt;
I notice you think they didn't use ldid.&lt;br /&gt;
It seems that the second patches to asr and restored are codesign (from what I can tell when 2.1 and 2.2 files are compared), but I don't see any in the kernel, they're all simple.&lt;br /&gt;
&lt;br /&gt;
== patches ==&lt;br /&gt;
&lt;br /&gt;
patches to asr and restored are the patches i listed above, and patches for the hashes so that they will run. when i say in the kernel codesign is patch, then it wil patch out the need for code to be signed, but apparently it was determined that the sha1 hash check was too annoying to patched as it would always be changing, so they just rehashed asr and restored, not codesign, just rehashed.&lt;br /&gt;
&lt;br /&gt;
== hashes ==&lt;br /&gt;
&lt;br /&gt;
What are you taking the hash of?&lt;br /&gt;
For example, I extracted asr from a stock 018-4378-1.dmg from 2.2 and compared it to one from a custom disk image; diffing them shows two patches; the first I assume to be the SHA1 check (at 0x12F16).&lt;br /&gt;
The second at 0x27C7A confuses me though, because I think this must be the hash (I'm new to this stuff, so forgive me if I'm just missing something incredibly obvious).&lt;br /&gt;
If I take the hash of the stock asr (9146c06d34b4fa9fc3cb3c7490851fabb875e3c8) and compare it to the hash within the file, it doesn't match (6350E8890FD7217152F72B3EA3285B6D7E617020).&lt;br /&gt;
The hash of the custom asr doesn't match the internal hash either, and the same goes for restored.&lt;br /&gt;
&lt;br /&gt;
== isha / ldid ==&lt;br /&gt;
&lt;br /&gt;
it is rehashed with isha or ldid -s, i don't really know the nitty gritty of that stuff.&lt;br /&gt;
&lt;br /&gt;
== 2G DeviceTree ==&lt;br /&gt;
&lt;br /&gt;
It seems that this was never patched until redsn0w QuickPwn.&lt;br /&gt;
What exactly is the patch made to allow LogoMe to work?&lt;br /&gt;
I tried old patches (function-disable_keys -&amp;gt; xxxxxxxx-disable_keys, secure-root-prefix doesn't exist at all), but they don't seem to work.&lt;br /&gt;
&lt;br /&gt;
:disable keys and secure root patches should have worked, afaik, are u sure u decrypted it correctly? [[User:ChronicDev|ChronicDev]] 23:44, 13 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::I believe I did, all names are visible. I notice at 0x0 - 0x10, there seems to be secure-root-prefix, but it is garbled (*junk*oot-prefix), I don't know what this is about..&lt;br /&gt;
::I patched function-disable_keys at 0x3534, though.--[[User:James|James]] 00:10, 14 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3502</id>
		<title>Talk:Research: Pwnage Patches</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3502"/>
		<updated>2009-04-14T00:10:55Z</updated>

		<summary type="html">&lt;p&gt;James: /* 2G DeviceTree */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Kernel and ramdisk patches ==&lt;br /&gt;
Anyone care to share what is patched?&lt;br /&gt;
&lt;br /&gt;
== yup ==&lt;br /&gt;
&lt;br /&gt;
'''ramdisk''':&lt;br /&gt;
&lt;br /&gt;
'''asr''' - patch out rootfs SHA1 check&lt;br /&gt;
&lt;br /&gt;
'''restored_external''' - patch wiping routine&lt;br /&gt;
&lt;br /&gt;
'''kernel''':&lt;br /&gt;
&lt;br /&gt;
haven't looked into this, but there are four patches, at least some of them are for codesign and apparently one of them has to do with virtual memory mapping.&lt;br /&gt;
&lt;br /&gt;
== Thanks ==&lt;br /&gt;
Do you know how the new codesign is added yet?&lt;br /&gt;
I notice you think they didn't use ldid.&lt;br /&gt;
It seems that the second patches to asr and restored are codesign (from what I can tell when 2.1 and 2.2 files are compared), but I don't see any in the kernel, they're all simple.&lt;br /&gt;
&lt;br /&gt;
== patches ==&lt;br /&gt;
&lt;br /&gt;
patches to asr and restored are the patches i listed above, and patches for the hashes so that they will run. when i say in the kernel codesign is patch, then it wil patch out the need for code to be signed, but apparently it was determined that the sha1 hash check was too annoying to patched as it would always be changing, so they just rehashed asr and restored, not codesign, just rehashed.&lt;br /&gt;
&lt;br /&gt;
== hashes ==&lt;br /&gt;
&lt;br /&gt;
What are you taking the hash of?&lt;br /&gt;
For example, I extracted asr from a stock 018-4378-1.dmg from 2.2 and compared it to one from a custom disk image; diffing them shows two patches; the first I assume to be the SHA1 check (at 0x12F16).&lt;br /&gt;
The second at 0x27C7A confuses me though, because I think this must be the hash (I'm new to this stuff, so forgive me if I'm just missing something incredibly obvious).&lt;br /&gt;
If I take the hash of the stock asr (9146c06d34b4fa9fc3cb3c7490851fabb875e3c8) and compare it to the hash within the file, it doesn't match (6350E8890FD7217152F72B3EA3285B6D7E617020).&lt;br /&gt;
The hash of the custom asr doesn't match the internal hash either, and the same goes for restored.&lt;br /&gt;
&lt;br /&gt;
== isha / ldid ==&lt;br /&gt;
&lt;br /&gt;
it is rehashed with isha or ldid -s, i don't really know the nitty gritty of that stuff.&lt;br /&gt;
&lt;br /&gt;
== 2G DeviceTree ==&lt;br /&gt;
&lt;br /&gt;
It seems that this was never patched until redsn0w QuickPwn.&lt;br /&gt;
What exactly is the patch made to allow LogoMe to work?&lt;br /&gt;
I tried old patches (function-disable_keys -&amp;gt; xxxxxxxx-disable_keys, secure-root-prefix doesn't exist at all), but they don't seem to work.&lt;br /&gt;
&lt;br /&gt;
:disable keys and secure root patches should have worked, afaik, are u sure u decrypted it correctly? [[User:ChronicDev|ChronicDev]] 23:44, 13 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::I believe I did, all names are visible. I notice at 0x0 - 0x10, there seems to be secure-root-prefix, but it is garbled (*junk*oot-prefix), I don't know what this is about..&lt;br /&gt;
I patched function-disable_keys at 0x3534, though.--[[User:James|James]] 00:10, 14 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3495</id>
		<title>Talk:Research: Pwnage Patches</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Research:_Pwnage_Patches&amp;diff=3495"/>
		<updated>2009-04-13T21:14:30Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Kernel and ramdisk patches ==&lt;br /&gt;
Anyone care to share what is patched?&lt;br /&gt;
&lt;br /&gt;
== yup ==&lt;br /&gt;
&lt;br /&gt;
'''ramdisk''':&lt;br /&gt;
&lt;br /&gt;
'''asr''' - patch out rootfs SHA1 check&lt;br /&gt;
&lt;br /&gt;
'''restored_external''' - patch wiping routine&lt;br /&gt;
&lt;br /&gt;
'''kernel''':&lt;br /&gt;
&lt;br /&gt;
haven't looked into this, but there are four patches, at least some of them are for codesign and apparently one of them has to do with virtual memory mapping.&lt;br /&gt;
&lt;br /&gt;
== Thanks ==&lt;br /&gt;
Do you know how the new codesign is added yet?&lt;br /&gt;
I notice you think they didn't use ldid.&lt;br /&gt;
It seems that the second patches to asr and restored are codesign (from what I can tell when 2.1 and 2.2 files are compared), but I don't see any in the kernel, they're all simple.&lt;br /&gt;
&lt;br /&gt;
== patches ==&lt;br /&gt;
&lt;br /&gt;
patches to asr and restored are the patches i listed above, and patches for the hashes so that they will run. when i say in the kernel codesign is patch, then it wil patch out the need for code to be signed, but apparently it was determined that the sha1 hash check was too annoying to patched as it would always be changing, so they just rehashed asr and restored, not codesign, just rehashed.&lt;br /&gt;
&lt;br /&gt;
== hashes ==&lt;br /&gt;
&lt;br /&gt;
What are you taking the hash of?&lt;br /&gt;
For example, I extracted asr from a stock 018-4378-1.dmg from 2.2 and compared it to one from a custom disk image; diffing them shows two patches; the first I assume to be the SHA1 check (at 0x12F16).&lt;br /&gt;
The second at 0x27C7A confuses me though, because I think this must be the hash (I'm new to this stuff, so forgive me if I'm just missing something incredibly obvious).&lt;br /&gt;
If I take the hash of the stock asr (9146c06d34b4fa9fc3cb3c7490851fabb875e3c8) and compare it to the hash within the file, it doesn't match (6350E8890FD7217152F72B3EA3285B6D7E617020).&lt;br /&gt;
The hash of the custom asr doesn't match the internal hash either, and the same goes for restored.&lt;br /&gt;
&lt;br /&gt;
== isha / ldid ==&lt;br /&gt;
&lt;br /&gt;
it is rehashed with isha or ldid -s, i don't really know the nitty gritty of that stuff.&lt;br /&gt;
&lt;br /&gt;
== 2G DeviceTree ==&lt;br /&gt;
&lt;br /&gt;
It seems that this was never patched until redsn0w QuickPwn.&lt;br /&gt;
What exactly is the patch made to allow LogoMe to work?&lt;br /&gt;
I tried old patches (function-disable_keys -&amp;gt; xxxxxxxx-disable_keys, secure-root-prefix doesn't exist at all), but they don't seem to work.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Obtaining_IMG3_Keys&amp;diff=3401</id>
		<title>Talk:Obtaining IMG3 Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Obtaining_IMG3_Keys&amp;diff=3401"/>
		<updated>2009-04-10T04:00:05Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hey, thats my &amp;quot;exploit&amp;quot; ;-) Dev used openiboot.&lt;br /&gt;
&lt;br /&gt;
Much easier, just use iran to download the modified iBoot directly, no reason to pwn with it. I was originally strapping this with the diags exploit.&lt;br /&gt;
&lt;br /&gt;
And thanks for writing this up.&lt;br /&gt;
&lt;br /&gt;
~geohot&lt;br /&gt;
&lt;br /&gt;
I adapted this method from your write-up earlier, because CPICH and Chronic were wanting to decrypt IMG3 keys, and the openiboot method has quite a bit of setup overhead, and requires modifying my C source, and I thought helping them fill out the missing pieces for your method would be simpler. I just slightly modified your assembly to do stack/register cleanup (and combined that mw into protected memory) and had them put a direct BX from a random iBoot function, since explaining how to patch the permissions bits is more conceptually difficult, and I wasn't sure how easy it would be to make &amp;quot;go&amp;quot; behave the way we want it to (I didn't have access to IDA when I was helping them). I asked them to write it up after they got it to work. Hope that's okay. :)&lt;br /&gt;
&lt;br /&gt;
I've since made something easier: http://www.iphone-dev.org/planetbeing/crypto.tar.gz&lt;br /&gt;
&lt;br /&gt;
--[[User:Planetbeing|Planetbeing]] 03:20, 7 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== iBoot ==&lt;br /&gt;
&lt;br /&gt;
Why do you need a modified iBoot? Doesn't Pwnage Tool/xpwn/winpwn already patch/modify iBoot?&lt;br /&gt;
&lt;br /&gt;
== no ==&lt;br /&gt;
&lt;br /&gt;
yeah. their iboot is simply patched so the pwned ipsw wil work. there is soooooo much more you can do to the iboot :)&lt;br /&gt;
&lt;br /&gt;
== iBoot ==&lt;br /&gt;
&lt;br /&gt;
Ok, but does the iBoot need to be patched more than Pwnage already does for the userland AES KBAG decryption to work (using the program linked to by planetbeing?)&lt;br /&gt;
&lt;br /&gt;
== no...no... ==&lt;br /&gt;
&lt;br /&gt;
this is...different. not like that at all. just trust planetbeing :)&lt;br /&gt;
&lt;br /&gt;
== Got it ==&lt;br /&gt;
&lt;br /&gt;
Ok, thanks Chronic...and good idea, I will trust planetbeing.&lt;br /&gt;
&lt;br /&gt;
== of course ==&lt;br /&gt;
&lt;br /&gt;
pb is very talented and prolific dev team member, what's not to trust? :)&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 ==&lt;br /&gt;
&lt;br /&gt;
Is there any way to use planetbeing's utility on 2.0.2?&lt;br /&gt;
It seems like something about the kernel has changed, since Pwnage doesn't decrypt it before patching.&lt;br /&gt;
Is it as simple as patching it in a hex editor or modifying crypto binary? --[[User:James|James]] 06:34, 1 September 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== uh..==&lt;br /&gt;
planetbeing's thing works fine in 2.0.2. just edit the script so it doesnt require a key and IV. if you dont know how to do that, no offense, but maybe its a sign you should not be doing this, only because it can majorly screw up your iPhone and require a DFU restore if you mess up.&lt;br /&gt;
&lt;br /&gt;
== re:uh... ==&lt;br /&gt;
That's exactly why I asked, because I don't know exactly what I'm doing.&lt;br /&gt;
I edited the script but didn't want to boot with the resulting kernel, fearing that it'd cause problems.&lt;br /&gt;
I use my iPod anyways so I don't lose any information, even if I do have to restore.&lt;br /&gt;
Thanks for the answer though. :)&lt;br /&gt;
&lt;br /&gt;
== np ==&lt;br /&gt;
&lt;br /&gt;
no prob&lt;br /&gt;
&lt;br /&gt;
good luck&lt;br /&gt;
&lt;br /&gt;
== chronics modified script for 2.0.2 crypto ==&lt;br /&gt;
&lt;br /&gt;
 #!/bin/bash&lt;br /&gt;
 XPWNTOOL=./xpwntool&lt;br /&gt;
 PATCHKERNEL=./patch-kernel-crypto&lt;br /&gt;
 KERNEL=/System/Library/Caches/com.apple.kernelcaches/kernelcache.s5l8900x&lt;br /&gt;
 &lt;br /&gt;
 ${XPWNTOOL} ${KERNEL} /tmp/a&lt;br /&gt;
 ${PATCHKERNEL} /tmp/a&lt;br /&gt;
 ${XPWNTOOL} /tmp/a /tmp/b -t ${KERNEL}&lt;br /&gt;
 rm /tmp/a&lt;br /&gt;
 cp ${KERNEL} /kernel.backup&lt;br /&gt;
 cp /tmp/b ${KERNEL}&lt;br /&gt;
 rm /tmp/b&lt;br /&gt;
&lt;br /&gt;
there u go :)&lt;br /&gt;
&lt;br /&gt;
James: what did you to fix this problem?&lt;br /&gt;
&lt;br /&gt;
The DeviceTree wasn't patched, since QuickPwn flashed a stock one over it. After patching it, all was fine. --[[User:James|James]] 04:00, 10 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Obtaining_IMG3_Keys&amp;diff=3399</id>
		<title>Talk:Obtaining IMG3 Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Obtaining_IMG3_Keys&amp;diff=3399"/>
		<updated>2009-04-10T00:07:47Z</updated>

		<summary type="html">&lt;p&gt;James: Nevermind, my bad.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hey, thats my &amp;quot;exploit&amp;quot; ;-) Dev used openiboot.&lt;br /&gt;
&lt;br /&gt;
Much easier, just use iran to download the modified iBoot directly, no reason to pwn with it. I was originally strapping this with the diags exploit.&lt;br /&gt;
&lt;br /&gt;
And thanks for writing this up.&lt;br /&gt;
&lt;br /&gt;
~geohot&lt;br /&gt;
&lt;br /&gt;
I adapted this method from your write-up earlier, because CPICH and Chronic were wanting to decrypt IMG3 keys, and the openiboot method has quite a bit of setup overhead, and requires modifying my C source, and I thought helping them fill out the missing pieces for your method would be simpler. I just slightly modified your assembly to do stack/register cleanup (and combined that mw into protected memory) and had them put a direct BX from a random iBoot function, since explaining how to patch the permissions bits is more conceptually difficult, and I wasn't sure how easy it would be to make &amp;quot;go&amp;quot; behave the way we want it to (I didn't have access to IDA when I was helping them). I asked them to write it up after they got it to work. Hope that's okay. :)&lt;br /&gt;
&lt;br /&gt;
I've since made something easier: http://www.iphone-dev.org/planetbeing/crypto.tar.gz&lt;br /&gt;
&lt;br /&gt;
--[[User:Planetbeing|Planetbeing]] 03:20, 7 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== iBoot ==&lt;br /&gt;
&lt;br /&gt;
Why do you need a modified iBoot? Doesn't Pwnage Tool/xpwn/winpwn already patch/modify iBoot?&lt;br /&gt;
&lt;br /&gt;
== no ==&lt;br /&gt;
&lt;br /&gt;
yeah. their iboot is simply patched so the pwned ipsw wil work. there is soooooo much more you can do to the iboot :)&lt;br /&gt;
&lt;br /&gt;
== iBoot ==&lt;br /&gt;
&lt;br /&gt;
Ok, but does the iBoot need to be patched more than Pwnage already does for the userland AES KBAG decryption to work (using the program linked to by planetbeing?)&lt;br /&gt;
&lt;br /&gt;
== no...no... ==&lt;br /&gt;
&lt;br /&gt;
this is...different. not like that at all. just trust planetbeing :)&lt;br /&gt;
&lt;br /&gt;
== Got it ==&lt;br /&gt;
&lt;br /&gt;
Ok, thanks Chronic...and good idea, I will trust planetbeing.&lt;br /&gt;
&lt;br /&gt;
== of course ==&lt;br /&gt;
&lt;br /&gt;
pb is very talented and prolific dev team member, what's not to trust? :)&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 ==&lt;br /&gt;
&lt;br /&gt;
Is there any way to use planetbeing's utility on 2.0.2?&lt;br /&gt;
It seems like something about the kernel has changed, since Pwnage doesn't decrypt it before patching.&lt;br /&gt;
Is it as simple as patching it in a hex editor or modifying crypto binary? --[[User:James|James]] 06:34, 1 September 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== uh..==&lt;br /&gt;
planetbeing's thing works fine in 2.0.2. just edit the script so it doesnt require a key and IV. if you dont know how to do that, no offense, but maybe its a sign you should not be doing this, only because it can majorly screw up your iPhone and require a DFU restore if you mess up.&lt;br /&gt;
&lt;br /&gt;
== re:uh... ==&lt;br /&gt;
That's exactly why I asked, because I don't know exactly what I'm doing.&lt;br /&gt;
I edited the script but didn't want to boot with the resulting kernel, fearing that it'd cause problems.&lt;br /&gt;
I use my iPod anyways so I don't lose any information, even if I do have to restore.&lt;br /&gt;
Thanks for the answer though. :)&lt;br /&gt;
&lt;br /&gt;
== np ==&lt;br /&gt;
&lt;br /&gt;
no prob&lt;br /&gt;
&lt;br /&gt;
good luck&lt;br /&gt;
&lt;br /&gt;
== chronics modified script for 2.0.2 crypto ==&lt;br /&gt;
&lt;br /&gt;
 #!/bin/bash&lt;br /&gt;
 XPWNTOOL=./xpwntool&lt;br /&gt;
 PATCHKERNEL=./patch-kernel-crypto&lt;br /&gt;
 KERNEL=/System/Library/Caches/com.apple.kernelcaches/kernelcache.s5l8900x&lt;br /&gt;
 &lt;br /&gt;
 ${XPWNTOOL} ${KERNEL} /tmp/a&lt;br /&gt;
 ${PATCHKERNEL} /tmp/a&lt;br /&gt;
 ${XPWNTOOL} /tmp/a /tmp/b -t ${KERNEL}&lt;br /&gt;
 rm /tmp/a&lt;br /&gt;
 cp ${KERNEL} /kernel.backup&lt;br /&gt;
 cp /tmp/b ${KERNEL}&lt;br /&gt;
 rm /tmp/b&lt;br /&gt;
&lt;br /&gt;
there u go :)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Obtaining_IMG3_Keys&amp;diff=3398</id>
		<title>Talk:Obtaining IMG3 Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Obtaining_IMG3_Keys&amp;diff=3398"/>
		<updated>2009-04-09T23:53:03Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hey, thats my &amp;quot;exploit&amp;quot; ;-) Dev used openiboot.&lt;br /&gt;
&lt;br /&gt;
Much easier, just use iran to download the modified iBoot directly, no reason to pwn with it. I was originally strapping this with the diags exploit.&lt;br /&gt;
&lt;br /&gt;
And thanks for writing this up.&lt;br /&gt;
&lt;br /&gt;
~geohot&lt;br /&gt;
&lt;br /&gt;
I adapted this method from your write-up earlier, because CPICH and Chronic were wanting to decrypt IMG3 keys, and the openiboot method has quite a bit of setup overhead, and requires modifying my C source, and I thought helping them fill out the missing pieces for your method would be simpler. I just slightly modified your assembly to do stack/register cleanup (and combined that mw into protected memory) and had them put a direct BX from a random iBoot function, since explaining how to patch the permissions bits is more conceptually difficult, and I wasn't sure how easy it would be to make &amp;quot;go&amp;quot; behave the way we want it to (I didn't have access to IDA when I was helping them). I asked them to write it up after they got it to work. Hope that's okay. :)&lt;br /&gt;
&lt;br /&gt;
I've since made something easier: http://www.iphone-dev.org/planetbeing/crypto.tar.gz&lt;br /&gt;
&lt;br /&gt;
--[[User:Planetbeing|Planetbeing]] 03:20, 7 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== iBoot ==&lt;br /&gt;
&lt;br /&gt;
Why do you need a modified iBoot? Doesn't Pwnage Tool/xpwn/winpwn already patch/modify iBoot?&lt;br /&gt;
&lt;br /&gt;
== no ==&lt;br /&gt;
&lt;br /&gt;
yeah. their iboot is simply patched so the pwned ipsw wil work. there is soooooo much more you can do to the iboot :)&lt;br /&gt;
&lt;br /&gt;
== iBoot ==&lt;br /&gt;
&lt;br /&gt;
Ok, but does the iBoot need to be patched more than Pwnage already does for the userland AES KBAG decryption to work (using the program linked to by planetbeing?)&lt;br /&gt;
&lt;br /&gt;
== no...no... ==&lt;br /&gt;
&lt;br /&gt;
this is...different. not like that at all. just trust planetbeing :)&lt;br /&gt;
&lt;br /&gt;
== Got it ==&lt;br /&gt;
&lt;br /&gt;
Ok, thanks Chronic...and good idea, I will trust planetbeing.&lt;br /&gt;
&lt;br /&gt;
== of course ==&lt;br /&gt;
&lt;br /&gt;
pb is very talented and prolific dev team member, what's not to trust? :)&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 ==&lt;br /&gt;
&lt;br /&gt;
Is there any way to use planetbeing's utility on 2.0.2?&lt;br /&gt;
It seems like something about the kernel has changed, since Pwnage doesn't decrypt it before patching.&lt;br /&gt;
Is it as simple as patching it in a hex editor or modifying crypto binary? --[[User:James|James]] 06:34, 1 September 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== uh..==&lt;br /&gt;
planetbeing's thing works fine in 2.0.2. just edit the script so it doesnt require a key and IV. if you dont know how to do that, no offense, but maybe its a sign you should not be doing this, only because it can majorly screw up your iPhone and require a DFU restore if you mess up.&lt;br /&gt;
&lt;br /&gt;
== re:uh... ==&lt;br /&gt;
That's exactly why I asked, because I don't know exactly what I'm doing.&lt;br /&gt;
I edited the script but didn't want to boot with the resulting kernel, fearing that it'd cause problems.&lt;br /&gt;
I use my iPod anyways so I don't lose any information, even if I do have to restore.&lt;br /&gt;
Thanks for the answer though. :)&lt;br /&gt;
&lt;br /&gt;
== np ==&lt;br /&gt;
&lt;br /&gt;
no prob&lt;br /&gt;
&lt;br /&gt;
good luck&lt;br /&gt;
&lt;br /&gt;
== chronics modified script for 2.0.2 crypto ==&lt;br /&gt;
&lt;br /&gt;
 #!/bin/bash&lt;br /&gt;
 XPWNTOOL=./xpwntool&lt;br /&gt;
 PATCHKERNEL=./patch-kernel-crypto&lt;br /&gt;
 KERNEL=/System/Library/Caches/com.apple.kernelcaches/kernelcache.s5l8900x&lt;br /&gt;
 &lt;br /&gt;
 ${XPWNTOOL} ${KERNEL} /tmp/a&lt;br /&gt;
 ${PATCHKERNEL} /tmp/a&lt;br /&gt;
 ${XPWNTOOL} /tmp/a /tmp/b -t ${KERNEL}&lt;br /&gt;
 rm /tmp/a&lt;br /&gt;
 cp ${KERNEL} /kernel.backup&lt;br /&gt;
 cp /tmp/b ${KERNEL}&lt;br /&gt;
 rm /tmp/b&lt;br /&gt;
&lt;br /&gt;
there u go :)&lt;br /&gt;
&lt;br /&gt;
== iPod 2G ==&lt;br /&gt;
Doesn't seem to work, even with function-disable_keys patched in the DeviceTree (can't seem to find secure-root-prefix).&lt;br /&gt;
It returns bogus keys..&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3339</id>
		<title>Talk:GenPass</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3339"/>
		<updated>2009-04-06T20:50:19Z</updated>

		<summary type="html">&lt;p&gt;James: Too many justs.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Compilation notes ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
If anyone is trying to compile this using MinGW on Windows, you'll run into some linking problems with libcrypto.&lt;br /&gt;
After searching around for awhile, I found that the problem can be solved by adding -lgdi32 to your linker flags.&lt;br /&gt;
&lt;br /&gt;
I just needed the -lgdi32  What crap that a crypto lib linked to a graphics library&lt;br /&gt;
&lt;br /&gt;
I don't know, it's screwy. I think a lot of OpenSSL is actually hacky on Windows (after reading the posts with corrections for this problem, it seems like their talking about some kind of pre-alpha program that barely works on anything besides Linux).&lt;br /&gt;
Also, I see that compiling works with just gdi, so I removed it from my initial suggestion.&lt;br /&gt;
Must have had ws2_32 first or something..&lt;br /&gt;
&lt;br /&gt;
=== Mac compiling ===&lt;br /&gt;
&lt;br /&gt;
it seems to fail hard when attempting to compile it on mac, even with modded openssl for sha256 stuff. i am trying to get it working though, already defeated many errors by changing some code and using Apple's CommonCrypto instead of OpenSSL&lt;br /&gt;
&lt;br /&gt;
=== Linux compiling ===&lt;br /&gt;
What do you expect? Works fine with just -lcrypto.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3338</id>
		<title>Talk:GenPass</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3338"/>
		<updated>2009-04-06T20:49:58Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Compilation notes ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
If anyone is trying to compile this using MinGW on Windows, you'll run into some linking problems with libcrypto.&lt;br /&gt;
After searching around for awhile, I found that the problem can be solved by adding -lgdi32 to your linker flags.&lt;br /&gt;
&lt;br /&gt;
I just needed the -lgdi32  What crap that a crypto lib linked to a graphics library&lt;br /&gt;
&lt;br /&gt;
I don't know, it's screwy. I think a lot of OpenSSL is actually hacky on Windows (after reading the posts with corrections for this problem, it seems like their talking about some kind of pre-alpha program that barely works on anything besides Linux).&lt;br /&gt;
Also, I see that compiling works with just gdi, so I removed it from my initial suggestion.&lt;br /&gt;
Must have had ws2_32 first or something..&lt;br /&gt;
&lt;br /&gt;
=== Mac compiling ===&lt;br /&gt;
&lt;br /&gt;
it seems to fail hard when attempting to compile it on mac, even with modded openssl for sha256 stuff. i am trying to get it working though, already defeated many errors by changing some code and using Apple's CommonCrypto instead of OpenSSL&lt;br /&gt;
&lt;br /&gt;
=== Linux compiling ===&lt;br /&gt;
What do you expect? Works just fine with just -lcrypto.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Ramdisk&amp;diff=3333</id>
		<title>Talk:Ramdisk</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Ramdisk&amp;diff=3333"/>
		<updated>2009-04-06T07:17:14Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Compression in 3.x==&lt;br /&gt;
I'm sure you guys are getting to posting it (well, maybe not, because you may want to keep something secret), but how would one go about decompressing a decrypted ramdisk?&lt;br /&gt;
I tried using a decrypted b2 ramdisk with genpass just to realize that it was still compressed, so I kept getting incorrect keys.&lt;br /&gt;
&lt;br /&gt;
:snow leopard&lt;br /&gt;
:[[User:ChronicDev|ChronicDev]] 02:01, 6 April 2009 (UTC)&lt;br /&gt;
::snow leopard is the only way? :(&lt;br /&gt;
::--[[User:Cool name|Cool name]] 02:03, 6 April 2009 (UTC)&lt;br /&gt;
:::yea, either snow leopard, running genpass on a already jailbroken iphone 3.0b2, or adding the new compression to xpwn. take your pick =P&lt;br /&gt;
:::--[[User:Posixninja|posixninja]] 06:31, 6 April 2009 (UTC)&lt;br /&gt;
::::Well, adding it to XPwn will come eventually, but what do you mean by running genpass on a jailbroken phone? Using hfs tools on the phone to extract the ramdisk (since they must understand the compression) and rebuilding the ramdisk?&lt;br /&gt;
::::--[[User:James|James]] 07:17, 6 April 2009 (UTC)&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3330</id>
		<title>Talk:GenPass</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:GenPass&amp;diff=3330"/>
		<updated>2009-04-06T02:46:11Z</updated>

		<summary type="html">&lt;p&gt;James: Added a Windows/MinGW compilation note.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Windows compilation note==&lt;br /&gt;
If anyone is trying to compile this using MinGW on Windows, you'll run into some linking problems with libcrypto.&lt;br /&gt;
After searching around for awhile, I found that the problem can be solved by adding -lgdi32 -lws2_32 to your linker flags.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Ramdisk&amp;diff=3327</id>
		<title>Talk:Ramdisk</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Ramdisk&amp;diff=3327"/>
		<updated>2009-04-06T01:57:44Z</updated>

		<summary type="html">&lt;p&gt;James: New page: ==Compression in 3.x== I'm sure you guys are getting to posting it (well, maybe not, because you may want to keep something secret), but how would one go about decompressing a decrypted ra...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Compression in 3.x==&lt;br /&gt;
I'm sure you guys are getting to posting it (well, maybe not, because you may want to keep something secret), but how would one go about decompressing a decrypted ramdisk?&lt;br /&gt;
I tried using a decrypted b2 ramdisk with genpass just to realize that it was still compressed, so I kept getting incorrect keys.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=3304</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=3304"/>
		<updated>2009-04-03T19:24:48Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt-mac.zip (Mac OS X Universal)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== 1.0 (Build 1A543a) ==&lt;br /&gt;
28c909fc6d322fa18940f03279d70880e59a4507998347c70d5b8ca7ef090ecccc15e82d&lt;br /&gt;
&lt;br /&gt;
== 1.0.1 (Build 1C25) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.0.2 (Build 1C28) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A109a) ==&lt;br /&gt;
f45de7637a62b200950e550f4144696d7ff3dc5f0b19c8efdf194c88f3bc2fa808fea3b3&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A110a) ==&lt;br /&gt;
d45b837ddd85bdae0ec82a033ba00ea03ceb8c827040034f7554c65d6376472844b8dc6a&lt;br /&gt;
&lt;br /&gt;
== 1.1.2 (Build 3B48b) ==&lt;br /&gt;
70e11d7209602ada5b15fbecc1709ad4910d0ad010bb9a9125b78f9f50e25f3e05c595e2&lt;br /&gt;
&lt;br /&gt;
== 1.1.3 (Build 4A93) ==&lt;br /&gt;
11070c11d93b9be5069b643204451ed95aad37df7b332d10e48fd3d23c62fca517055816&lt;br /&gt;
&lt;br /&gt;
== 1.1.4 (Build 4A102) ==&lt;br /&gt;
d0a0c0977bd4b6350b256d6650ec9eca419b6f961f593e74b7e5b93e010b698ca6cca1fe&lt;br /&gt;
&lt;br /&gt;
== 1.1.5 (Build 4B1) ==&lt;br /&gt;
c7973558e8f6af22e38d4573737d1533f1d5eec202bf86a32d941975d76f8906c7f0afe4&lt;br /&gt;
&lt;br /&gt;
== 1.2 (Beta 1) (Build 5A147p) ==&lt;br /&gt;
86bec353ddfbe3fb750e9d7905801f79791e69acf65d16930d288e697644c76f16c4f16d&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 2) (Build 5A225c) ==&lt;br /&gt;
ea14f3ec624c7fdbd52e108aa92d13b16f6b0b940c841f7bbc7792099dae45da928d13e7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 3) (Build 5A240d) ==&lt;br /&gt;
e24bfab40a2e5d3dc25e089291846e5615b640897ae8b424946c587bcf53b201a1041d36&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 4) (Build 5A258f) ==&lt;br /&gt;
198d6602ba2ad2d427adf7058045fff5f20d05846622c186cca3d423ad03b5bc3f43c61c&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 5) (Build 5a274d) ==&lt;br /&gt;
589df25eaa4ff0a5e29e1425fb99bf50957888ff098ba2fcb72cf130f40e15e00bcf2fc7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Pre-Release) (Build 5a292g) ==&lt;br /&gt;
890b1fbf22975e0d4be2ea3f9bc5c87f38fd8158394fd31cf80a43ad25547573bbd0ec4e&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Final) (Build 5a308) ==&lt;br /&gt;
3964ca8d8bf5d3715cdc172986f2d9606672c54d5e0aa3f3a892166b4e54e4cefef21279&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 7) (Build 5a331) ==&lt;br /&gt;
3d9a9832a108fc5084fc9329d6e84e38edf06e380554c49376b70e951f8a8d1ed943f819&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Build 5a347) ==&lt;br /&gt;
 Ramdisk Key: 85 0A FC 27 11 32 D1 5A E6 98 95 65 56 7E 65 BF&lt;br /&gt;
 Ramdisk IV: 29 68 1F 62 5D 1F 61 27 1E C3 11 66 01 B8 BC DE&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.1 (Build 5B108) ==&lt;br /&gt;
 Ramdisk Key: 21 9E AC 3E 01 27 6C 7E C5 04 32 12 3F 50 97 1A&lt;br /&gt;
 Ramdisk IV: 02 4f DB BA 71 EB F3 4D F5 B5 25 CD 97 5A EF E8&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 (Build 5C1) ==&lt;br /&gt;
 Ramdisk Key: CC 02 8F D2 9D C2 7F 89 5E 40 1D 98 65 E7 21 00&lt;br /&gt;
 Ramdisk IV: 53 7E B4 E7 12 9E A8 1F 57 2E C2 3D BE C4 2B 80&lt;br /&gt;
31e3ff09ff046d5237187346ee893015354d2135e3f0f39480be63dd2a18444961c2da5d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Beta 1) (Build 5F90) ==&lt;br /&gt;
 Ramdisk Key: 78 29 32 89 1F 0D 76 DB 49 0F DD CA 02 7A 13 B2&lt;br /&gt;
 Ramdisk IV: 6B EA 32 6D 0F 41 10 51 59 F0 AE A8 F9 9F E7 77&lt;br /&gt;
f61c14aa0d53386dd42c49163686e8ccdeb86d14aafdecfe99c2e12c41a7f9f2811daa3d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F136) ==&lt;br /&gt;
 Ramdisk Key: 42 B4 F3 99 76 AF A5 9F 9E C6 80 FC CD 2C 7D 04&lt;br /&gt;
 Ramdisk IV: FD 53 0C 4C F8 A8 78 F1 63 87 43 29 88 B1 99 B8&lt;br /&gt;
562ca0f7963eafb462da74a9c1f01a45c30a7eb5f1f493feceecae03ee6521a334f4ff68&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F137) ==&lt;br /&gt;
 Ramdisk Key: 7C 80 7F 65 65 01 5D AA 6D 18 2D FF 79 5E 10 91&lt;br /&gt;
 Ramdisk IV: 5C B7 FA 82 E8 FC 42 B9 DB 6C 02 7D 8F 4C 7C 39&lt;br /&gt;
9714f2cb955afa550d6287a1c7dd7bd0efb3c26cf74b948de7c43cf934913df69fc5a05f&lt;br /&gt;
&lt;br /&gt;
==2.1.1 (Build 5F138)==&lt;br /&gt;
 Ramdisk Key: 6D 4A 00 C0 A0 8E 90 A3 B0 24 88 5F 45 BC B7 20&lt;br /&gt;
 Ramdisk IV: 2F 44 81 85 5C A3 9E 67 DF BF 3D 19 B8 AD E6 0E&lt;br /&gt;
d1b957a0a5e56903adc523c5fa99f5d165c3963aea48274770b766b44ecdebab7b5a8f30&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77) ==&lt;br /&gt;
 Ramdisk Key: EE A6 E8 78 24 A3 C0 B0 BE 86 E8 E2 BB D8 CF E9&lt;br /&gt;
 Ramdisk IV: 18 2C DD A9 0A 38 87 0D E9 68 80 EE 7F F5 BB BC&lt;br /&gt;
dc39d88afe4cbd8a3f36824b8fd68acf04ac72718c09100816c5cb89889b8079e96802f0&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77a) ==&lt;br /&gt;
 Ramdisk Key: 77 8B 48 88 33 CA DA 94 0A 10 A7 C4 4C AC 74 13&lt;br /&gt;
 Ramdisk IV: 47 9C 46 F2 7F 5B 18 AC 5F A0 18 85 CF 2B 06 F9&lt;br /&gt;
148025cde5c51d51d7733e74c6857dfca70d7240287d6eb039a1ed835413120b0af1e296&lt;br /&gt;
&lt;br /&gt;
== 2.2.1 (Build 5H11) ==&lt;br /&gt;
 Ramdisk Key: DA 01 0F 69 B0 E2 03 4B 4C E7 B7 C9 0B 63 BA D5&lt;br /&gt;
 Ramdisk IV: 29 FF 3D 43 C4 00 1B 97 89 63 DE E4 37 E2 53 86&lt;br /&gt;
ee4eeeb62240c1378c739696dff9fef2c88834e98877f55a29c147e7d5b137967197392a&lt;br /&gt;
&lt;br /&gt;
== 2.2.1 (Build 5H11a) ==&lt;br /&gt;
 Ramdisk Key: 78 4F 13 3C 28 82 37 63 41 B9 E2 76 DA 96 6C 0F&lt;br /&gt;
 Ramdisk IV: C9 8F 1D 8E 26 F0 4F 89 01 3E 9C 61 49 9C D1 FE&lt;br /&gt;
2611c9f73504344fb22c93791659ec92e65f914025c5814d708b2023ab67229d89c39791&lt;br /&gt;
&lt;br /&gt;
== 3.0 Beta 2 (Build 7A259g) ==&lt;br /&gt;
 Ramdisk Key: B1 11 BD B4 F4 A4 5E B2 BE 94 F4 3B DF C5 79 6F&lt;br /&gt;
 Ramdisk IV: FA 01 C6 EC FC 18 6A 09 86 E2 31 1D 20 D9 6A C4&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PMB8878&amp;diff=3271</id>
		<title>PMB8878</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PMB8878&amp;diff=3271"/>
		<updated>2009-03-18T01:38:40Z</updated>

		<summary type="html">&lt;p&gt;James: Added 3.0 beta 1 baseband.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the baseband processor used in the iPhone 3G. It is upgraded with [[BBUpdaterExtreme]]. It is also known as the [[PMB8878]]&lt;br /&gt;
&lt;br /&gt;
==Datasheet==&lt;br /&gt;
Anyone got one? Infineon provides [http://www.infineon.com/dgdl/X-GOLD608_XMM6080.pdf?location=Products.Mobile_Phone_Baseband_ICs.WCDMA___HSDPA.X-GOLD__608_-_PMB_8878.PRODUCT_TYPE_DOCUMENTS.X-GOLD608_XMM6080.pdf&amp;amp;folderId=db3a304312fcb1bc0113000c158f0004&amp;amp;fileId=db3a30431936bc4b011957c66fee3850 this], which isn't really useful.&lt;br /&gt;
&lt;br /&gt;
==Secpack 2.0==&lt;br /&gt;
This is the security region in the files sent to the [[X-Gold 608]]. This is the first 0xCF8 is new fls and eep files.&lt;br /&gt;
&lt;br /&gt;
===Layout===&lt;br /&gt;
 0x634--Memory Map&lt;br /&gt;
 0x714--Descriptor&lt;br /&gt;
 0xCD4--Post secpack pointer to name&lt;br /&gt;
 0xCEC--Data length&lt;br /&gt;
&lt;br /&gt;
==Endpack==&lt;br /&gt;
The fls and eep files also have a footer tacked onto the end containing the loader and signature.&lt;br /&gt;
&lt;br /&gt;
==Memory Map==&lt;br /&gt;
  FLASH      0x20000000 0x1000000&lt;br /&gt;
  CODE       0x20000000   0x40000 0b0010(bootstrapper)&lt;br /&gt;
  CODE       0x20040000  0xDC0000 0b0100(main firmware)&lt;br /&gt;
  FFS        0x20A00000  0x100000 0b1100(empty)&lt;br /&gt;
  DYNFFS     0x20A00000  0x100000 0b1100(empty)&lt;br /&gt;
  FFS        0x20B00000   0x40000 0b1011(empty)&lt;br /&gt;
  DYN_EEP    0x20E40000   0x80000 0b0110&lt;br /&gt;
  SECPACK    0x20EC0000   0x40000&lt;br /&gt;
  SECZONE    0x20F80000   0x40000&lt;br /&gt;
  STATIC_EEP 0x20FC0000   0x40000 0b0111&lt;br /&gt;
  RAM        0x40000000  0x800000&lt;br /&gt;
&lt;br /&gt;
==MMU relocation table==&lt;br /&gt;
===Bootloader===&lt;br /&gt;
[[Image:Bltbl.png]]&lt;br /&gt;
&lt;br /&gt;
===Firmware===&lt;br /&gt;
[[Image:Bbmmu.png]]&lt;br /&gt;
&lt;br /&gt;
==Complete memory dump==&lt;br /&gt;
[http://depositfiles.com/files/i5119hpzm 0x00000000-0x0001FFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/mxslfu4dp 0x20000000-0x20FFFFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/6wiet73wn 0x40000000-0x407FFFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/fioppsphe 0xFFFF0000-0xFFFFFFFF]&lt;br /&gt;
&lt;br /&gt;
== Known Firmware Versions ==&lt;br /&gt;
  [[1.43.00]]    2.0 (Build 5A331 - Internal Beta)&lt;br /&gt;
  [[1.45.00]]    2.0 (Build 5A347 - Gold Master)&lt;br /&gt;
  [[1.48.02]]    2.0.1 (Build 5B108)&lt;br /&gt;
  [[2.04.03]]    2.1 (Build 5F90)&lt;br /&gt;
  [[2.08.01]]    2.0.2 (Build 5C1)&lt;br /&gt;
  [[2.11.07]]    2.1 (Build 5F136)&lt;br /&gt;
  [[2.28.00]]    2.2 (Build 5G77)&lt;br /&gt;
  [[2.30.03]]    2.2.1 (Build 5H11)&lt;br /&gt;
  [[4.20.01]]    3.0 beta 1 (Build 7A238j)&lt;br /&gt;
&lt;br /&gt;
==Accessing Interactive Mode==&lt;br /&gt;
Interactive mode isn't accessed by sending characters to the baseband. Instead a GPIO pin is raised with a kernel call to preupdate reset.&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 0, 0, 0, 0, 0);	//reset&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 1, 0, 0, 0, 0);	//power set&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 2, 0, 0, 0, 0);	//configuring mux&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 7, 0, 0, 0, 0);	//powercycle&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 8, 0, 0, 0, 0);	//preupdate reset&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:BurnIn&amp;diff=3183</id>
		<title>Talk:BurnIn</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:BurnIn&amp;diff=3183"/>
		<updated>2009-03-13T01:51:50Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Where did these pictures come from? ~geohot&lt;br /&gt;
&lt;br /&gt;
Chronic found these pictures from a guy at hackint0sh who sent in his 3G for repair. -wEsTbAeR--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
geohot, the only flaw with your ramdisk hypothosis is that someone got their iphone back with that on it. plus, could all the needed frameworks for a GUI application fit on a ramdisk?&lt;br /&gt;
[[User:ChronicDev|ChronicDev]]&lt;br /&gt;
&lt;br /&gt;
Chronic, maybe on a 32MB Zibri ZramdiskZ. :P&lt;br /&gt;
Actually this is a really bad-ass GUI, so it should fit in these 32MB or something.&lt;br /&gt;
&lt;br /&gt;
-wEsTbAeR--&lt;br /&gt;
&lt;br /&gt;
== nah ==&lt;br /&gt;
&lt;br /&gt;
even this. you need new frameworks that dont come on a vanilla ramdisk&lt;br /&gt;
&lt;br /&gt;
== geohot ==&lt;br /&gt;
&lt;br /&gt;
Actually, I wonder what this does to the baseband. Something has to set up each baseband from the factory, and that something contains the private keys!!!&lt;br /&gt;
&lt;br /&gt;
Only the baseband private keys, not the IPSW private keys. But who cares about the IPSW ones.&lt;br /&gt;
&lt;br /&gt;
== well ==&lt;br /&gt;
&lt;br /&gt;
don't get your hopes up. according to a friend, even builds that are seeded directly to people that work for carriers don't even get this, so this is for people way way way way WAY high up. If only that guy on hackintosh took the iPhone home, the devteam could have helped him pwn and extract the BurnIn application :( I doubt a phone like this will ever be seen in the wild again.&lt;br /&gt;
&lt;br /&gt;
In other words, the likelyhood of us getting this is as likely as us getting the key that Apple uses to sign their ipsws, unless there is another factory slip up.&lt;br /&gt;
&lt;br /&gt;
geohot, as a side note since I am already kind of talking to you :P, would you mind sharing the 114 iboot patches you used to get AES access? thanks to your post, I know how to do it, but I have been trying and I am just not skilled enough to find the correct patches :(  I posted them last week, check the page about it ~geohot&lt;br /&gt;
&lt;br /&gt;
== Data recovery? ==&lt;br /&gt;
&lt;br /&gt;
It's a stretch, I know, but what about data recovery?  If some (all?) devices have this firmware initially, then it is replaced, could some data still be recovered from the device?  Or is it zeroed out before it leaves?  I guess the real question is, does an OOTB device have data still on-disk other than actual inodes?    --[[User:Haldo|Haldo]] 23:22, 5 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
It would surprise me if the phones had anything on disk. I still believe it is a ramdisk. Although, lets assume I'm wrong. A dump is very easy to do, and if we do it at the iBoot level, I believe we can recover the out of band data too. ~geohot&lt;br /&gt;
&lt;br /&gt;
== 100% ==&lt;br /&gt;
&lt;br /&gt;
its an application dude. talk to me on IRC about it for more info. trust me.&lt;br /&gt;
&lt;br /&gt;
and i saw the page, but I get permission denied errors if i use just what is there unfortunately :(&lt;br /&gt;
&lt;br /&gt;
== Any more? ==&lt;br /&gt;
&lt;br /&gt;
Ah, very nice to see those iPod Touch pictures... I remember them being posted to hackint0sh a while back.  Beyond the 3G and iPod Touch, has *anyone* else ever had this happen?  While it's rare, it seems to not be impossible.&lt;br /&gt;
&lt;br /&gt;
== does drag to unlock actually unlock ==&lt;br /&gt;
&lt;br /&gt;
well does it? this would be a miracle :) i'll see if i can get someone to lend me a brand new device and maybe we can look to to see if it's there assuming apple doesnt zero out everyone iphone&lt;br /&gt;
&lt;br /&gt;
== Can I try it? ==&lt;br /&gt;
&lt;br /&gt;
I really want to try this out on my iPhone 3G with jailbroken 2.2.1 firmware. Is it possible? Please send me an email: [mailto:drumthrasher109@gmail.com]&lt;br /&gt;
&lt;br /&gt;
--[[User:Drumthrasher109|Drumthrasher109]] 13:27, 10 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Buy one on eBay! ==&lt;br /&gt;
&lt;br /&gt;
I know we're not the richest group of folks here, but one (or two) iPhone proto units is selling on eBay.  It appears to be running burn-in from early 2007.&lt;br /&gt;
&lt;br /&gt;
Seller of that protos has posted the filesystem dump of that proto at MacRumors, so it's not necessary to spend the cash on this. --[[User:Pjakuszew|Pjakuszew]] 08:00, 12 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Link to the MacRumors post?&lt;br /&gt;
&lt;br /&gt;
Link to post with NOR dump: http://forums.macrumors.com/showpost.php?p=7249071&amp;amp;postcount=85&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:0wnboot&amp;diff=3173</id>
		<title>Talk:0wnboot</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:0wnboot&amp;diff=3173"/>
		<updated>2009-03-11T23:38:40Z</updated>

		<summary type="html">&lt;p&gt;James: New page: ==Compiling== I can't seem to ever compile a good copy on Windows.. I'm using WinARM (http://tinyurl.com/d5nyhy); specifically arm-elf-as and arm-elf-objcopy. The resulting .bin is ~200 by...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Compiling==&lt;br /&gt;
I can't seem to ever compile a good copy on Windows..&lt;br /&gt;
I'm using WinARM (http://tinyurl.com/d5nyhy); specifically arm-elf-as and arm-elf-objcopy.&lt;br /&gt;
The resulting .bin is ~200 bytes too large, it is compiled as follows:&lt;br /&gt;
arm-elf-as -o 0wnboot 0wnboot.S &amp;amp;&amp;amp; arm-elf-objcopy -O binary 0wnboot 0wnboot.bin&lt;br /&gt;
&lt;br /&gt;
Is there something wrong with WinARM or am I just missing flags?&lt;br /&gt;
Also, any word on kbag support?&lt;br /&gt;
I personally don't own a 2G yet, so I haven't been able to try planetbeing's crypto utility (I assume it works, but you never know), but it would be useful.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PMB8878&amp;diff=2942</id>
		<title>PMB8878</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PMB8878&amp;diff=2942"/>
		<updated>2009-02-04T18:26:24Z</updated>

		<summary type="html">&lt;p&gt;James: Added 2.30.03.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the baseband processor used in the iPhone 3G. It is upgraded with [[BBUpdaterExtreme]]. It is also known as the [[PMB8878]]&lt;br /&gt;
&lt;br /&gt;
==Datasheet==&lt;br /&gt;
Anyone got one? Infineon provides [http://www.infineon.com/dgdl/X-GOLD608_XMM6080.pdf?location=Products.Mobile_Phone_Baseband_ICs.WCDMA___HSDPA.X-GOLD__608_-_PMB_8878.PRODUCT_TYPE_DOCUMENTS.X-GOLD608_XMM6080.pdf&amp;amp;folderId=db3a304312fcb1bc0113000c158f0004&amp;amp;fileId=db3a30431936bc4b011957c66fee3850 this], which isn't really useful.&lt;br /&gt;
&lt;br /&gt;
==Memory Map==&lt;br /&gt;
  FLASH      0x20000000 0x1000000&lt;br /&gt;
  CODE       0x20000000   0x40000 0b0010(bootstrapper)&lt;br /&gt;
  CODE       0x20040000  0xDC0000 0b0100(main firmware)&lt;br /&gt;
  FFS        0x20A00000  0x100000 0b1100(empty)&lt;br /&gt;
  DYNFFS     0x20A00000  0x100000 0b1100(empty)&lt;br /&gt;
  FFS        0x20B00000   0x40000 0b1011(empty)&lt;br /&gt;
  DYN_EEP    0x20E40000   0x80000 0b0110&lt;br /&gt;
  SECPACK    0x20EC0000   0x40000&lt;br /&gt;
  SECZONE    0x20F80000   0x40000&lt;br /&gt;
  STATIC_EEP 0x20FC0000   0x40000 0b0111&lt;br /&gt;
  RAM        0x40000000  0x800000&lt;br /&gt;
&lt;br /&gt;
==MMU relocation table==&lt;br /&gt;
===Bootloader===&lt;br /&gt;
[[Image:Bltbl.png]]&lt;br /&gt;
&lt;br /&gt;
===Firmware===&lt;br /&gt;
[[Image:Bbmmu.png]]&lt;br /&gt;
&lt;br /&gt;
==Complete memory dump==&lt;br /&gt;
[http://depositfiles.com/files/i5119hpzm 0x00000000-0x0001FFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/mxslfu4dp 0x20000000-0x20FFFFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/6wiet73wn 0x40000000-0x407FFFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/fioppsphe 0xFFFF0000-0xFFFFFFFF]&lt;br /&gt;
&lt;br /&gt;
== Known Firmware Versions ==&lt;br /&gt;
  [[1.43.00]]    2.0 (Build 5A331 - Internal Beta)&lt;br /&gt;
  [[1.45.00]]    2.0 (Build 5A347 - Gold Master)&lt;br /&gt;
  [[1.48.02]]    2.0.1(Build 5B108)&lt;br /&gt;
  [[2.04.03]]    2.1 (Build 5F90)&lt;br /&gt;
  [[2.08.01]]    2.0.2 (Build 5C1)&lt;br /&gt;
  [[2.11.07]]    2.1 (Build 5F136)&lt;br /&gt;
  [[2.28.00]]    2.2 (Build 5G77)&lt;br /&gt;
  [[2.30.03]]    2.2.1 (Build 5H11)&lt;br /&gt;
&lt;br /&gt;
==Accessing Interactive Mode==&lt;br /&gt;
Interactive mode isn't accessed by sending characters to the baseband. Instead a GPIO pin is raised with a kernel call to preupdate reset.&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 0, 0, 0, 0, 0);	//reset&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 1, 0, 0, 0, 0);	//power set&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 2, 0, 0, 0, 0);	//configuring mux&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 7, 0, 0, 0, 0);	//powercycle&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 8, 0, 0, 0, 0);	//preupdate reset&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2926</id>
		<title>Talk:Restore Mode</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2926"/>
		<updated>2009-02-01T10:22:34Z</updated>

		<summary type="html">&lt;p&gt;James: /* Verbose mode, again */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Verbose mode==&lt;br /&gt;
Anyone care to elaborate on how to enable a verbose restore like in [http://qik.com/video/932215 this video]?&lt;br /&gt;
&lt;br /&gt;
===RE: Verbose mode===&lt;br /&gt;
you need to patch iBoot to redirect the pointer of the ramdisk boot-args string somewhere else, where you have a string that is the ramdisk boot-args as well as the -v arg. kinda hacky, but that's what I did and it worked :)&lt;br /&gt;
&lt;br /&gt;
====RE: RE: Verbose mode====&lt;br /&gt;
That is hacky indeed, but I'll try and figure out how to. Thanks Chronic.&lt;br /&gt;
&lt;br /&gt;
=====Verbose mode, again=====&lt;br /&gt;
Now that the source of 0wnboot is public, I see what you did to enable -v ramdisks.&lt;br /&gt;
However, how would I convert this to something that can be run on a device other than a 2G (aka some simple mw's)?&lt;br /&gt;
I know, it's kind of a n00by question to ask, but -v looks useful and I know almost nothing about ASM.&lt;br /&gt;
&lt;br /&gt;
Also, another question that will make me look stupid; how do you boot from a ramdisk on 2.x?&lt;br /&gt;
I remember doing it on 1.x, but obviously things have changed.&lt;br /&gt;
I tried looking at what QuickPwn does, but it's not completely obvious..&lt;br /&gt;
It sends iBSS and iBoot (well, it looks like it, from it's temp files that it creates), and boots into them (?, doing this actually boots into iPhone OS), then sends the ramdisk, kernel, and DeviceTree.&lt;br /&gt;
After this, they must execute the ramdisk.&lt;br /&gt;
If I were to try to emulate this process using a tool such as iRecovery, what exactly would I do?&lt;br /&gt;
I've tried setenv boot-args rd=md0, but from what I remember, boot-args are ignored on 2.x..&lt;br /&gt;
Any help would be appreciated.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2925</id>
		<title>Talk:Restore Mode</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2925"/>
		<updated>2009-02-01T09:17:16Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Verbose mode==&lt;br /&gt;
Anyone care to elaborate on how to enable a verbose restore like in [http://qik.com/video/932215 this video]?&lt;br /&gt;
&lt;br /&gt;
===RE: Verbose mode===&lt;br /&gt;
you need to patch iBoot to redirect the pointer of the ramdisk boot-args string somewhere else, where you have a string that is the ramdisk boot-args as well as the -v arg. kinda hacky, but that's what I did and it worked :)&lt;br /&gt;
&lt;br /&gt;
====RE: RE: Verbose mode====&lt;br /&gt;
That is hacky indeed, but I'll try and figure out how to. Thanks Chronic.&lt;br /&gt;
&lt;br /&gt;
=====Verbose mode, again=====&lt;br /&gt;
Now that the source of 0wnboot is public, I see what you did to enable -v ramdisks.&lt;br /&gt;
However, how would I convert this to something that can be run on a device other than a 2G (aka some simple mw's)?&lt;br /&gt;
I know, it's kind of a n00by question to ask, but -v looks useful and I know almost nothing about ASM.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware&amp;diff=2906</id>
		<title>Firmware</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware&amp;diff=2906"/>
		<updated>2009-01-31T02:12:55Z</updated>

		<summary type="html">&lt;p&gt;James: Added iPhone1,2_2.2.1 SHA1.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the iPhone OS system the iPhone runs. Latest Apple download links can be found [http://www.itunes.com/version here].&lt;br /&gt;
&lt;br /&gt;
==Comparison of firmware versions==&lt;br /&gt;
&lt;br /&gt;
===[[iPhone]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! [[Baseband]]&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! Can be [[unlock|unlocked]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| Heavenly 1A543a&lt;br /&gt;
| 03.12.06_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3538.20070629.B7vXa/iPhone1,1_1.0_1A543a_Restore.ipsw iPhone1,1_1.0_1A543a_Restore.ipsw]&lt;br /&gt;
| fb8bb3ee2e9a997affbb97868599f2995c78209c&lt;br /&gt;
| Initial US shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.604.348&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| Heavenly 1C25&lt;br /&gt;
| 03.12.06_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3614.20070731.Nt6Y7/iPhone1,1_1.0.1_1C25_Restore.ipsw iPhone1,1_1.0.1_1C25_Restore.ipsw]&lt;br /&gt;
| a00b85a7a55d62a94be5fbf5effbc42fd63f3097&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.627.958&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| Heavenly 1C28&lt;br /&gt;
| 03.14.08_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3823.20070821.vormd/iPhone1,1_1.0.2_1C28_Restore.ipsw iPhone1,1_1.0.2_1C28_Restore.ipsw]&lt;br /&gt;
| 7f5c0ff1f84a0202b75a55c3fcb362e415334d1e&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.627.324&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Snowbird 3A109a&lt;br /&gt;
| 04.01.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3883.20070927.In76t/iPhone1,1_1.1.1_3A109a_Restore.ipsw iPhone1,1_1.1.1_3A109a_Restore.ipsw]&lt;br /&gt;
| d441dd1c71ce18f25d8fc4faa71c1e6eaa02d02c&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 159.668.150&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48a&lt;br /&gt;
| 04.02.13_G&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial Euro shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48b&lt;br /&gt;
| 04.02.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4037.20071107.5Bghn/iPhone1,1_1.1.2_3B48b_Restore.ipsw iPhone1,1_1.1.2_3B48b_Restore.ipsw]&lt;br /&gt;
| 797c02e7d660940e8d9a16cc7229ccf3f67dd8b1&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 167.927.501&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| Little Bear 4A93&lt;br /&gt;
| 04.03.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4061.20080115.4Fvn7/iPhone1,1_1.1.3_4A93_Restore.ipsw iPhone1,1_1.1.3_4A93_Restore.ipsw]&lt;br /&gt;
| b3dec7580bd00dc4faf28449d9618ef40aeacc96&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 169.950.551&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
| Little Bear 4A102&lt;br /&gt;
| 04.04.05_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4313.20080226.Sw39i/iPhone1,1_1.1.4_4A102_Restore.ipsw iPhone1,1_1.1.4_4A102_Restore.ipsw]&lt;br /&gt;
| 000811bac096011b50ebf6ec1ec2285b62fda4cb&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 169.946.442&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4956.20080710.V50OI/iPhone1,1_2.0_5A347_Restore.ipsw iPhone1,1_2.0_5A347_Restore.ipsw]&lt;br /&gt;
| 9c510a3cfce789fa5f92a8f763c231bac82ff6d4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 228.768.637&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5135.20080729.Vfgtr/iPhone1,1_2.0.1_5B108_Restore.ipsw iPhone1,1_2.0.1_5B108_Restore.ipsw]&lt;br /&gt;
| 61de6a2bd6ceddc9ecabad1671b91a59b3824bc4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 254.048.068&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5246.20080818.2V0hO/iPhone1,1_2.0.2_5C1_Restore.ipsw iPhone1,1_2.0.2_5C1_Restore.ipsw]&lt;br /&gt;
| b84b57bea919bdc720287ec908c1378e7d7b5e1b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 253.589.000&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F136&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5202.20080909.gkbEj/iPhone1,1_2.1_5F136_Restore.ipsw iPhone1,1_2.1_5F136_Restore.ipsw]&lt;br /&gt;
| 353b7745767b85932e14e262e69463620939bdf7&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 242.171.241&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5779.20081120.Pt5yH/iPhone1,1_2.2_5G77_Restore.ipsw iPhone1,1_2.2_5G77_Restore.ipsw]&lt;br /&gt;
| cbfc6ff886ce89868a55547b9fb980dbf92e6418 &lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 257.576.980&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5830.20090127.Mmni6/iPhone1,1_2.2.1_5H11_Restore.ipsw iPhone1,1_2.2.1_5H11_Restore.ipsw]&lt;br /&gt;
| 43b95ebe1e51f8d30eae916053396595c08440d3&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 257,593,705&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[iPhone 3G]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! [[Baseband]]&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! Can be [[unlock|unlocked]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A345&lt;br /&gt;
| 01.45.00&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial iPhone 3G shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| 01.45.00&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4955.20080710.bgt53/iPhone1,2_2.0_5A347_Restore.ipsw iPhone1,2_2.0_5A347_Restore.ipsw]&lt;br /&gt;
| af9506ca0034e462674f9f59c5406f159eaf9fc1&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 235,957,125&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| 01.48.02&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5134.20080729.Q2W3E/iPhone1,2_2.0.1_5B108_Restore.ipsw iPhone1,2_2.0.1_5B108_Restore.ipsw]&lt;br /&gt;
| e81c7ac7e334a3e9d81b3b47894bfaa1ec495482&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 261,224,227&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| 02.08.01&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5241.20080818.t5Fv3/iPhone1,2_2.0.2_5C1_Restore.ipsw iPhone1,2_2.0.2_5C1_Restore.ipsw]&lt;br /&gt;
| bef7fef954293046420fbcf947379839178a195b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 260,761,030&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F136&lt;br /&gt;
| 02.11.07&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5198.20080909.K3294/iPhone1,2_2.1_5F136_Restore.ipsw iPhone1,2_2.1_5F136_Restore.ipsw]&lt;br /&gt;
| c6957dcbf2a95ccfd6dce374a727b1b7700a9043&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 249,341,655&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| 02.28.00&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5778.20081120.Aqw4R/iPhone1,2_2.2_5G77_Restore.ipsw iPhone1,2_2.2_5G77_Restore.ipsw]&lt;br /&gt;
| f67f8b2b842428bf89456cda0c2d5cf954d111a4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258,342,348&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11&lt;br /&gt;
| 02.30.03&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5828.20090127.aQLi8/iPhone1,2_2.2.1_5H11_Restore.ipsw iPhone1,2_2.2.1_5H11_Restore.ipsw]&lt;br /&gt;
| e0098e6fab5c90b59e067e03ae3ccd4a7cd0f39c&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| 258,359,073&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[N45ap|iPod touch (1st generation)]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| Snowbird 3A100a&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| Snowbird 3A101a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3882.20070910.N8uyT/iPod1,1_1.1_3A101a_Restore.ipsw iPod1,1_1.1_3A101a_Restore.ipsw]&lt;br /&gt;
| 9b0d83c7f8b4328174a3f31e0e93f60e591ae143&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 157,890,186&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Snowbird 3A110a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3932.20070927.p23dD/iPod1,1_1.1.1_3A110a_Restore.ipsw iPod1,1_1.1.1_3A110a_Restore.ipsw]&lt;br /&gt;
| 84bbc6ea8bf29745195bc9926c1874f7c2a36f32&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 157,906,686&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48b&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4036.20071107.9g3DF/iPod1,1_1.1.2_3B48b_Restore.ipsw iPod1,1_1.1.2_3B48b_Restore.ipsw]&lt;br /&gt;
| 108d8ffe9ea75e61cd5e57170ad388b7fa00d923&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 165,567,897&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| Little Bear 4A93&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/061-4060.20080115.9Iuh5/iPod1,1_1.1.3_4A93_Restore.ipsw iPod1,1_1.1.3_4A93_Restore.ipsw]&lt;br /&gt;
| 8dca23eec69d5ae58fbf3d4a23276e46cbb2e3c6&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173,511,411&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
| Little Bear 4A102&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4312.20080226.Btu45/iPod1,1_1.1.4_4A102_Restore.ipsw iPod1,1_1.1.4_4A102_Restore.ipsw]&lt;br /&gt;
| c148d1eb1c979bb6434175411d4a372103a4fdd2&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173,519,589&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.5&lt;br /&gt;
| Little Bear 4B1&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4841.20080714.bgy8O/iPod1,1_1.1.5_4B1_Restore.ipsw iPod1,1_1.1.5_4B1_Restore.ipsw]&lt;br /&gt;
| 1b818911316e4248ee01d3ec67f9d39afc3db240&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173,519,637&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| ae82798e85f9953b0f4798bad36187cb020c9d22&lt;br /&gt;
| 2.0+ is a paid upgrade series&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 233,409,573&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| a81b6e7af4b85ef436d047f9da57c0f694d8964a&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258,660,321&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| c8b6f9fefa3f3777c56285dfe4c735b1e08a81a2&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258,201,218&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F137&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| fc7f6d0972927df502ffca47438ca75dcccffaf3&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 251,155,156&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| 081a7de363230fb38d0ce092cbbe42f2a50c8a5f&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 260,186,851&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| fc69be9e421bc0630567184506ab771f6b7ef68b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 260,166,688&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[N72ap|iPod touch (2nd generation)]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| Sugar Bowl 5F138&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-5494.20080909.8i9o0/iPod2,1_2.1.1_5F138_Restore.ipsw iPod2,1_2.1.1_5F138_Restore.ipsw]&lt;br /&gt;
| c3c700be49ad227d1152188e7c1e46b8958fd1e4&lt;br /&gt;
|&lt;br /&gt;
| {{yes|Yes (but not yet released)}}&lt;br /&gt;
| 282,083,944&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/061-5358.20081120.Gtghy/iPod2,1_2.2_5G77a_Restore.ipsw iPod2,1_2.2_5G77a_Restore.ipsw]&lt;br /&gt;
| 34a0a489605f34d6cc6c9954edcaaf9a050deedc&lt;br /&gt;
|&lt;br /&gt;
| {{yes|Yes (but not yet released)}}&lt;br /&gt;
| 291,123,491&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5863.20090127.rt56K/iPod2,1_2.2.1_5H11a_Restore.ipsw iPod2,1_2.2.1_5H11a_Restore.ipsw]&lt;br /&gt;
| 9af5625ea34acdd8abeb6fce71a72651d0c815d5&lt;br /&gt;
|&lt;br /&gt;
| {{yes|Yes (but not yet released)}}&lt;br /&gt;
| 291,140,244&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[VFDecrypt Keys]]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
*[http://www.trejan.com/projects/ipod/ Firmware List]&lt;br /&gt;
*[http://www.iphones.ru/forum/index.php?showtopic=7115 iPhone FW's Links (Russian)]&lt;br /&gt;
*[http://www.iphones.ru/forum/index.php?showtopic=13934 iPod Touch FW's Links (Russian)]&lt;br /&gt;
*[http://pastebin.ca/1209360 A link of interest...]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=2901</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=2901"/>
		<updated>2009-01-29T20:38:56Z</updated>

		<summary type="html">&lt;p&gt;James: Added 2.2.1 5H11a ramdisk key and IV and RootFS key. Thanks AriX.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt.zip (Mac OS X Universal) (link is broken)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== 1.0 (Build 1A543a) ==&lt;br /&gt;
28c909fc6d322fa18940f03279d70880e59a4507998347c70d5b8ca7ef090ecccc15e82d&lt;br /&gt;
&lt;br /&gt;
== 1.0.1 (Build 1C25) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.0.2 (Build 1C28) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A109a) ==&lt;br /&gt;
f45de7637a62b200950e550f4144696d7ff3dc5f0b19c8efdf194c88f3bc2fa808fea3b3&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A110a) ==&lt;br /&gt;
d45b837ddd85bdae0ec82a033ba00ea03ceb8c827040034f7554c65d6376472844b8dc6a&lt;br /&gt;
&lt;br /&gt;
== 1.1.2 (Build 3B48b) ==&lt;br /&gt;
70e11d7209602ada5b15fbecc1709ad4910d0ad010bb9a9125b78f9f50e25f3e05c595e2&lt;br /&gt;
&lt;br /&gt;
== 1.1.3 (Build 4A93) ==&lt;br /&gt;
11070c11d93b9be5069b643204451ed95aad37df7b332d10e48fd3d23c62fca517055816&lt;br /&gt;
&lt;br /&gt;
== 1.1.4 (Build 4A102) ==&lt;br /&gt;
d0a0c0977bd4b6350b256d6650ec9eca419b6f961f593e74b7e5b93e010b698ca6cca1fe&lt;br /&gt;
&lt;br /&gt;
== 1.1.5 (Build 4B1) ==&lt;br /&gt;
c7973558e8f6af22e38d4573737d1533f1d5eec202bf86a32d941975d76f8906c7f0afe4&lt;br /&gt;
&lt;br /&gt;
== 1.2 (Beta 1) (Build 5A147p) ==&lt;br /&gt;
86bec353ddfbe3fb750e9d7905801f79791e69acf65d16930d288e697644c76f16c4f16d&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 2) (Build 5A225c) ==&lt;br /&gt;
ea14f3ec624c7fdbd52e108aa92d13b16f6b0b940c841f7bbc7792099dae45da928d13e7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 3) (Build 5A240d) ==&lt;br /&gt;
e24bfab40a2e5d3dc25e089291846e5615b640897ae8b424946c587bcf53b201a1041d36&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 4) (Build 5A258f) ==&lt;br /&gt;
198d6602ba2ad2d427adf7058045fff5f20d05846622c186cca3d423ad03b5bc3f43c61c&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 5) (Build 5a274d) ==&lt;br /&gt;
589df25eaa4ff0a5e29e1425fb99bf50957888ff098ba2fcb72cf130f40e15e00bcf2fc7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Pre-Release) (Build 5a292g) ==&lt;br /&gt;
890b1fbf22975e0d4be2ea3f9bc5c87f38fd8158394fd31cf80a43ad25547573bbd0ec4e&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Final) (Build 5a308) ==&lt;br /&gt;
3964ca8d8bf5d3715cdc172986f2d9606672c54d5e0aa3f3a892166b4e54e4cefef21279&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 7) (Build 5a331) ==&lt;br /&gt;
3d9a9832a108fc5084fc9329d6e84e38edf06e380554c49376b70e951f8a8d1ed943f819&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Build 5a347) ==&lt;br /&gt;
 Ramdisk Key: 85 0A FC 27 11 32 D1 5A E6 98 95 65 56 7E 65 BF&lt;br /&gt;
 Ramdisk IV: 29 68 1F 62 5D 1F 61 27 1E C3 11 66 01 B8 BC DE&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.1 (Build 5B108) ==&lt;br /&gt;
 Ramdisk Key: 21 9E AC 3E 01 27 6C 7E C5 04 32 12 3F 50 97 1A&lt;br /&gt;
 Ramdisk IV: 02 4f DB BA 71 EB F3 4D F5 B5 25 CD 97 5A EF E8&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 (Build 5C1) ==&lt;br /&gt;
 Ramdisk Key: CC 02 8F D2 9D C2 7F 89 5E 40 1D 98 65 E7 21 00&lt;br /&gt;
 Ramdisk IV: 53 7E B4 E7 12 9E A8 1F 57 2E C2 3D BE C4 2B 80&lt;br /&gt;
31e3ff09ff046d5237187346ee893015354d2135e3f0f39480be63dd2a18444961c2da5d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Beta 1) (Build 5F90) ==&lt;br /&gt;
 Ramdisk Key: 78 29 32 89 1F 0D 76 DB 49 0F DD CA 02 7A 13 B2&lt;br /&gt;
 Ramdisk IV: 6B EA 32 6D 0F 41 10 51 59 F0 AE A8 F9 9F E7 77&lt;br /&gt;
f61c14aa0d53386dd42c49163686e8ccdeb86d14aafdecfe99c2e12c41a7f9f2811daa3d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F136) ==&lt;br /&gt;
 Ramdisk Key: 42 B4 F3 99 76 AF A5 9F 9E C6 80 FC CD 2C 7D 04&lt;br /&gt;
 Ramdisk IV: FD 53 0C 4C F8 A8 78 F1 63 87 43 29 88 B1 99 B8&lt;br /&gt;
562ca0f7963eafb462da74a9c1f01a45c30a7eb5f1f493feceecae03ee6521a334f4ff68&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F137) ==&lt;br /&gt;
 Ramdisk Key: 7C 80 7F 65 65 01 5D AA 6D 18 2D FF 79 5E 10 91&lt;br /&gt;
 Ramdisk IV: 5C B7 FA 82 E8 FC 42 B9 DB 6C 02 7D 8F 4C 7C 39&lt;br /&gt;
9714f2cb955afa550d6287a1c7dd7bd0efb3c26cf74b948de7c43cf934913df69fc5a05f&lt;br /&gt;
&lt;br /&gt;
==2.1.1 (Build 5F138)==&lt;br /&gt;
 Ramdisk Key: 6D 4A 00 C0 A0 8E 90 A3 B0 24 88 5F 45 BC B7 20&lt;br /&gt;
 Ramdisk IV: 2F 44 81 85 5C A3 9E 67 DF BF 3D 19 B8 AD E6 0E&lt;br /&gt;
d1b957a0a5e56903adc523c5fa99f5d165c3963aea48274770b766b44ecdebab7b5a8f30&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77) ==&lt;br /&gt;
 Ramdisk Key: EE A6 E8 78 24 A3 C0 B0 BE 86 E8 E2 BB D8 CF E9&lt;br /&gt;
 Ramdisk IV: 18 2C DD A9 0A 38 87 0D E9 68 80 EE 7F F5 BB BC&lt;br /&gt;
dc39d88afe4cbd8a3f36824b8fd68acf04ac72718c09100816c5cb89889b8079e96802f0&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77a) ==&lt;br /&gt;
 Ramdisk Key: 77 8B 48 88 33 CA DA 94 0A 10 A7 C4 4C AC 74 13&lt;br /&gt;
 Ramdisk IV: 47 9C 46 F2 7F 5B 18 AC 5F A0 18 85 CF 2B 06 F9&lt;br /&gt;
148025cde5c51d51d7733e74c6857dfca70d7240287d6eb039a1ed835413120b0af1e296&lt;br /&gt;
&lt;br /&gt;
== 2.2.1 (Build 5H11) ==&lt;br /&gt;
 Ramdisk Key: DA 01 0F 69 B0 E2 03 4B 4C E7 B7 C9 0B 63 BA D5&lt;br /&gt;
 Ramdisk IV: 29 FF 3D 43 C4 00 1B 97 89 63 DE E4 37 E2 53 86&lt;br /&gt;
ee4eeeb62240c1378c739696dff9fef2c88834e98877f55a29c147e7d5b137967197392a&lt;br /&gt;
&lt;br /&gt;
== 2.2.1 (Build 5H11a) ==&lt;br /&gt;
 Ramdisk Key: 78 4F 13 3C 28 82 37 63 41 B9 E2 76 DA 96 6C 0F&lt;br /&gt;
 Ramdisk IV: C9 8F 1D 8E 26 F0 4F 89 01 3E 9C 61 49 9C D1 FE&lt;br /&gt;
2611c9f73504344fb22c93791659ec92e65f914025c5814d708b2023ab67229d89c39791&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2898</id>
		<title>Talk:Restore Mode</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2898"/>
		<updated>2009-01-28T23:16:58Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Verbose mode==&lt;br /&gt;
Anyone care to elaborate on how to enable a verbose restore like in [http://qik.com/video/932215 this video]?&lt;br /&gt;
&lt;br /&gt;
==RE: Verbose mode==&lt;br /&gt;
you need to patch iBoot to redirect the pointer of the ramdisk boot-args string somewhere else, where you have a string that is the ramdisk boot-args as well as the -v arg. kinda hacky, but that's what I did and it worked :)&lt;br /&gt;
&lt;br /&gt;
==RE: RE: Verbose mode==&lt;br /&gt;
That is hacky indeed, but I'll try and figure out how to. Thanks Chronic.&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2896</id>
		<title>Talk:Restore Mode</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Restore_Mode&amp;diff=2896"/>
		<updated>2009-01-28T22:23:44Z</updated>

		<summary type="html">&lt;p&gt;James: New page: ==Verbose mode== Anyone care to elaborate on how to enable a verbose restore like in [http://qik.com/video/932215 this video]?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Verbose mode==&lt;br /&gt;
Anyone care to elaborate on how to enable a verbose restore like in [http://qik.com/video/932215 this video]?&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=2885</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=2885"/>
		<updated>2009-01-28T02:54:26Z</updated>

		<summary type="html">&lt;p&gt;James: Added 2.2.1 5H11 ramdisk key and IV and RootFS key.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt.zip (Mac OS X Universal) (link is broken)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== 1.0 (Build 1A543a) ==&lt;br /&gt;
28c909fc6d322fa18940f03279d70880e59a4507998347c70d5b8ca7ef090ecccc15e82d&lt;br /&gt;
&lt;br /&gt;
== 1.0.1 (Build 1C25) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.0.2 (Build 1C28) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A109a) ==&lt;br /&gt;
f45de7637a62b200950e550f4144696d7ff3dc5f0b19c8efdf194c88f3bc2fa808fea3b3&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A110a) ==&lt;br /&gt;
d45b837ddd85bdae0ec82a033ba00ea03ceb8c827040034f7554c65d6376472844b8dc6a&lt;br /&gt;
&lt;br /&gt;
== 1.1.2 (Build 3B48b) ==&lt;br /&gt;
70e11d7209602ada5b15fbecc1709ad4910d0ad010bb9a9125b78f9f50e25f3e05c595e2&lt;br /&gt;
&lt;br /&gt;
== 1.1.3 (Build 4A93) ==&lt;br /&gt;
11070c11d93b9be5069b643204451ed95aad37df7b332d10e48fd3d23c62fca517055816&lt;br /&gt;
&lt;br /&gt;
== 1.1.4 (Build 4A102) ==&lt;br /&gt;
d0a0c0977bd4b6350b256d6650ec9eca419b6f961f593e74b7e5b93e010b698ca6cca1fe&lt;br /&gt;
&lt;br /&gt;
== 1.1.5 (Build 4B1) ==&lt;br /&gt;
c7973558e8f6af22e38d4573737d1533f1d5eec202bf86a32d941975d76f8906c7f0afe4&lt;br /&gt;
&lt;br /&gt;
== 1.2 (Beta 1) (Build 5A147p) ==&lt;br /&gt;
86bec353ddfbe3fb750e9d7905801f79791e69acf65d16930d288e697644c76f16c4f16d&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 2) (Build 5A225c) ==&lt;br /&gt;
ea14f3ec624c7fdbd52e108aa92d13b16f6b0b940c841f7bbc7792099dae45da928d13e7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 3) (Build 5A240d) ==&lt;br /&gt;
e24bfab40a2e5d3dc25e089291846e5615b640897ae8b424946c587bcf53b201a1041d36&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 4) (Build 5A258f) ==&lt;br /&gt;
198d6602ba2ad2d427adf7058045fff5f20d05846622c186cca3d423ad03b5bc3f43c61c&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 5) (Build 5a274d) ==&lt;br /&gt;
589df25eaa4ff0a5e29e1425fb99bf50957888ff098ba2fcb72cf130f40e15e00bcf2fc7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Pre-Release) (Build 5a292g) ==&lt;br /&gt;
890b1fbf22975e0d4be2ea3f9bc5c87f38fd8158394fd31cf80a43ad25547573bbd0ec4e&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Final) (Build 5a308) ==&lt;br /&gt;
3964ca8d8bf5d3715cdc172986f2d9606672c54d5e0aa3f3a892166b4e54e4cefef21279&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 7) (Build 5a331) ==&lt;br /&gt;
3d9a9832a108fc5084fc9329d6e84e38edf06e380554c49376b70e951f8a8d1ed943f819&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Build 5a347) ==&lt;br /&gt;
 Ramdisk Key: 85 0A FC 27 11 32 D1 5A E6 98 95 65 56 7E 65 BF&lt;br /&gt;
 Ramdisk IV: 29 68 1F 62 5D 1F 61 27 1E C3 11 66 01 B8 BC DE&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.1 (Build 5B108) ==&lt;br /&gt;
 Ramdisk Key: 21 9E AC 3E 01 27 6C 7E C5 04 32 12 3F 50 97 1A&lt;br /&gt;
 Ramdisk IV: 02 4f DB BA 71 EB F3 4D F5 B5 25 CD 97 5A EF E8&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 (Build 5C1) ==&lt;br /&gt;
 Ramdisk Key: CC 02 8F D2 9D C2 7F 89 5E 40 1D 98 65 E7 21 00&lt;br /&gt;
 Ramdisk IV: 53 7E B4 E7 12 9E A8 1F 57 2E C2 3D BE C4 2B 80&lt;br /&gt;
31e3ff09ff046d5237187346ee893015354d2135e3f0f39480be63dd2a18444961c2da5d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Beta 1) (Build 5F90) ==&lt;br /&gt;
 Ramdisk Key: 78 29 32 89 1F 0D 76 DB 49 0F DD CA 02 7A 13 B2&lt;br /&gt;
 Ramdisk IV: 6B EA 32 6D 0F 41 10 51 59 F0 AE A8 F9 9F E7 77&lt;br /&gt;
f61c14aa0d53386dd42c49163686e8ccdeb86d14aafdecfe99c2e12c41a7f9f2811daa3d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F136) ==&lt;br /&gt;
 Ramdisk Key: 42 B4 F3 99 76 AF A5 9F 9E C6 80 FC CD 2C 7D 04&lt;br /&gt;
 Ramdisk IV: FD 53 0C 4C F8 A8 78 F1 63 87 43 29 88 B1 99 B8&lt;br /&gt;
562ca0f7963eafb462da74a9c1f01a45c30a7eb5f1f493feceecae03ee6521a334f4ff68&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F137) ==&lt;br /&gt;
 Ramdisk Key: 7C 80 7F 65 65 01 5D AA 6D 18 2D FF 79 5E 10 91&lt;br /&gt;
 Ramdisk IV: 5C B7 FA 82 E8 FC 42 B9 DB 6C 02 7D 8F 4C 7C 39&lt;br /&gt;
9714f2cb955afa550d6287a1c7dd7bd0efb3c26cf74b948de7c43cf934913df69fc5a05f&lt;br /&gt;
&lt;br /&gt;
==2.1.1 (Build 5F138)==&lt;br /&gt;
 Ramdisk Key: 6D 4A 00 C0 A0 8E 90 A3 B0 24 88 5F 45 BC B7 20&lt;br /&gt;
 Ramdisk IV: 2F 44 81 85 5C A3 9E 67 DF BF 3D 19 B8 AD E6 0E&lt;br /&gt;
d1b957a0a5e56903adc523c5fa99f5d165c3963aea48274770b766b44ecdebab7b5a8f30&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77) ==&lt;br /&gt;
 Ramdisk Key: EE A6 E8 78 24 A3 C0 B0 BE 86 E8 E2 BB D8 CF E9&lt;br /&gt;
 Ramdisk IV: 18 2C DD A9 0A 38 87 0D E9 68 80 EE 7F F5 BB BC&lt;br /&gt;
dc39d88afe4cbd8a3f36824b8fd68acf04ac72718c09100816c5cb89889b8079e96802f0&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77a) ==&lt;br /&gt;
 Ramdisk Key: 77 8B 48 88 33 CA DA 94 0A 10 A7 C4 4C AC 74 13&lt;br /&gt;
 Ramdisk IV: 47 9C 46 F2 7F 5B 18 AC 5F A0 18 85 CF 2B 06 F9&lt;br /&gt;
148025cde5c51d51d7733e74c6857dfca70d7240287d6eb039a1ed835413120b0af1e296&lt;br /&gt;
&lt;br /&gt;
== 2.2.1 (Build 5H11) ==&lt;br /&gt;
 Ramdisk Key: DA 01 0F 69 B0 E2 03 4B 4C E7 B7 C9 0B 63 BA D5&lt;br /&gt;
 Ramdisk IV: 29 FF 3D 43 C4 00 1B 97 89 63 DE E4 37 E2 53 86&lt;br /&gt;
ee4eeeb62240c1378c739696dff9fef2c88834e98877f55a29c147e7d5b137967197392a&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware&amp;diff=2884</id>
		<title>Firmware</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware&amp;diff=2884"/>
		<updated>2009-01-28T02:52:00Z</updated>

		<summary type="html">&lt;p&gt;James: This is not true, it can be jailbroken, but it is tethered. Also added 2.2.1 RootFS disk name.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the iPhone OS system the iPhone runs. Latest Apple download links can be found [http://www.itunes.com/version here].&lt;br /&gt;
&lt;br /&gt;
==Comparison of firmware versions==&lt;br /&gt;
&lt;br /&gt;
===[[iPhone]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! [[Baseband]]&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! Can be [[unlock|unlocked]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| Heavenly 1A543a&lt;br /&gt;
| 03.12.06_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3538.20070629.B7vXa/iPhone1,1_1.0_1A543a_Restore.ipsw iPhone1,1_1.0_1A543a_Restore.ipsw]&lt;br /&gt;
| fb8bb3ee2e9a997affbb97868599f2995c78209c&lt;br /&gt;
| Initial US shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.604.348&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| Heavenly 1C25&lt;br /&gt;
| 03.12.06_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3614.20070731.Nt6Y7/iPhone1,1_1.0.1_1C25_Restore.ipsw iPhone1,1_1.0.1_1C25_Restore.ipsw]&lt;br /&gt;
| a00b85a7a55d62a94be5fbf5effbc42fd63f3097&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.627.958&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| Heavenly 1C28&lt;br /&gt;
| 03.14.08_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3823.20070821.vormd/iPhone1,1_1.0.2_1C28_Restore.ipsw iPhone1,1_1.0.2_1C28_Restore.ipsw]&lt;br /&gt;
| 7f5c0ff1f84a0202b75a55c3fcb362e415334d1e&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.627.324&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Snowbird 3A109a&lt;br /&gt;
| 04.01.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3883.20070927.In76t/iPhone1,1_1.1.1_3A109a_Restore.ipsw iPhone1,1_1.1.1_3A109a_Restore.ipsw]&lt;br /&gt;
| d441dd1c71ce18f25d8fc4faa71c1e6eaa02d02c&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 159.668.150&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48a&lt;br /&gt;
| 04.02.13_G&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial Euro shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48b&lt;br /&gt;
| 04.02.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4037.20071107.5Bghn/iPhone1,1_1.1.2_3B48b_Restore.ipsw iPhone1,1_1.1.2_3B48b_Restore.ipsw]&lt;br /&gt;
| 797c02e7d660940e8d9a16cc7229ccf3f67dd8b1&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 167.927.501&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| Little Bear 4A93&lt;br /&gt;
| 04.03.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4061.20080115.4Fvn7/iPhone1,1_1.1.3_4A93_Restore.ipsw iPhone1,1_1.1.3_4A93_Restore.ipsw]&lt;br /&gt;
| b3dec7580bd00dc4faf28449d9618ef40aeacc96&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 169.950.551&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
| Little Bear 4A102&lt;br /&gt;
| 04.04.05_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4313.20080226.Sw39i/iPhone1,1_1.1.4_4A102_Restore.ipsw iPhone1,1_1.1.4_4A102_Restore.ipsw]&lt;br /&gt;
| 000811bac096011b50ebf6ec1ec2285b62fda4cb&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 169.946.442&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4956.20080710.V50OI/iPhone1,1_2.0_5A347_Restore.ipsw iPhone1,1_2.0_5A347_Restore.ipsw]&lt;br /&gt;
| 9c510a3cfce789fa5f92a8f763c231bac82ff6d4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 228.768.637&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5135.20080729.Vfgtr/iPhone1,1_2.0.1_5B108_Restore.ipsw iPhone1,1_2.0.1_5B108_Restore.ipsw]&lt;br /&gt;
| 61de6a2bd6ceddc9ecabad1671b91a59b3824bc4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 254.048.068&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5246.20080818.2V0hO/iPhone1,1_2.0.2_5C1_Restore.ipsw iPhone1,1_2.0.2_5C1_Restore.ipsw]&lt;br /&gt;
| b84b57bea919bdc720287ec908c1378e7d7b5e1b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 253.589.000&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F136&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5202.20080909.gkbEj/iPhone1,1_2.1_5F136_Restore.ipsw iPhone1,1_2.1_5F136_Restore.ipsw]&lt;br /&gt;
| 353b7745767b85932e14e262e69463620939bdf7&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 242.171.241&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5779.20081120.Pt5yH/iPhone1,1_2.2_5G77_Restore.ipsw iPhone1,1_2.2_5G77_Restore.ipsw]&lt;br /&gt;
| cbfc6ff886ce89868a55547b9fb980dbf92e6418 &lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 257.576.980&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5830.20090127.Mmni6/iPhone1,1_2.2.1_5H11_Restore.ipsw iPhone1,1_2.2.1_5H11_Restore.ipsw]&lt;br /&gt;
| 43b95ebe1e51f8d30eae916053396595c08440d3&lt;br /&gt;
| &lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| {{yes|Yes (by updating from an unlocked state)}}&lt;br /&gt;
| 257,593,705&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[iPhone 3G]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! [[Baseband]]&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! Can be [[unlock|unlocked]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A345&lt;br /&gt;
| 01.45.00&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial iPhone 3G shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| 01.45.00&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4955.20080710.bgt53/iPhone1,2_2.0_5A347_Restore.ipsw iPhone1,2_2.0_5A347_Restore.ipsw]&lt;br /&gt;
| af9506ca0034e462674f9f59c5406f159eaf9fc1&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 235.957.125&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| 01.48.02&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5134.20080729.Q2W3E/iPhone1,2_2.0.1_5B108_Restore.ipsw iPhone1,2_2.0.1_5B108_Restore.ipsw]&lt;br /&gt;
| e81c7ac7e334a3e9d81b3b47894bfaa1ec495482&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 261.224.227&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| 02.08.01&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5241.20080818.t5Fv3/iPhone1,2_2.0.2_5C1_Restore.ipsw iPhone1,2_2.0.2_5C1_Restore.ipsw]&lt;br /&gt;
| bef7fef954293046420fbcf947379839178a195b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 260.761.030&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F136&lt;br /&gt;
| 02.11.07&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5198.20080909.K3294/iPhone1,2_2.1_5F136_Restore.ipsw iPhone1,2_2.1_5F136_Restore.ipsw]&lt;br /&gt;
| c6957dcbf2a95ccfd6dce374a727b1b7700a9043&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 249.341.655&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| 02.28.00&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5778.20081120.Aqw4R/iPhone1,2_2.2_5G77_Restore.ipsw iPhone1,2_2.2_5G77_Restore.ipsw]&lt;br /&gt;
| f67f8b2b842428bf89456cda0c2d5cf954d111a4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258.342.348&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11&lt;br /&gt;
| 02.30.03&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5828.20090127.aQLi8/iPhone1,2_2.2.1_5H11_Restore.ipsw iPhone1,2_2.2.1_5H11_Restore.ipsw]&lt;br /&gt;
| -&lt;br /&gt;
| &lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[N45ap|iPod touch (1st generation)]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| Snowbird 3A100a&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| Snowbird 3A101a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3882.20070910.N8uyT/iPod1,1_1.1_3A101a_Restore.ipsw iPod1,1_1.1_3A101a_Restore.ipsw]&lt;br /&gt;
| 9b0d83c7f8b4328174a3f31e0e93f60e591ae143&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 157.890.186&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Snowbird 3A110a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3932.20070927.p23dD/iPod1,1_1.1.1_3A110a_Restore.ipsw iPod1,1_1.1.1_3A110a_Restore.ipsw]&lt;br /&gt;
| 84bbc6ea8bf29745195bc9926c1874f7c2a36f32&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 157.906.686&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48b&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4036.20071107.9g3DF/iPod1,1_1.1.2_3B48b_Restore.ipsw iPod1,1_1.1.2_3B48b_Restore.ipsw]&lt;br /&gt;
| 108d8ffe9ea75e61cd5e57170ad388b7fa00d923&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 165.567.897&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| Little Bear 4A93&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/061-4060.20080115.9Iuh5/iPod1,1_1.1.3_4A93_Restore.ipsw iPod1,1_1.1.3_4A93_Restore.ipsw]&lt;br /&gt;
| 8dca23eec69d5ae58fbf3d4a23276e46cbb2e3c6&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173.511.411&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
| Little Bear 4A102&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4312.20080226.Btu45/iPod1,1_1.1.4_4A102_Restore.ipsw iPod1,1_1.1.4_4A102_Restore.ipsw]&lt;br /&gt;
| c148d1eb1c979bb6434175411d4a372103a4fdd2&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173.519.589&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.5&lt;br /&gt;
| Little Bear 4B1&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4841.20080714.bgy8O/iPod1,1_1.1.5_4B1_Restore.ipsw iPod1,1_1.1.5_4B1_Restore.ipsw]&lt;br /&gt;
| 1b818911316e4248ee01d3ec67f9d39afc3db240&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173.519.637&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| ae82798e85f9953b0f4798bad36187cb020c9d22&lt;br /&gt;
| 2.0+ is a paid upgrade series&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 233.409.573&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| a81b6e7af4b85ef436d047f9da57c0f694d8964a&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258.660.321&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| c8b6f9fefa3f3777c56285dfe4c735b1e08a81a2&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258.201.218&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F137&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| fc7f6d0972927df502ffca47438ca75dcccffaf3&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 251.155.156&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| 081a7de363230fb38d0ce092cbbe42f2a50c8a5f&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 260.186.851&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| -&lt;br /&gt;
| &lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[N72ap|iPod touch (2nd generation)]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| Sugar Bowl 5F138&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-5494.20080909.8i9o0/iPod2,1_2.1.1_5F138_Restore.ipsw iPod2,1_2.1.1_5F138_Restore.ipsw]&lt;br /&gt;
| c3c700be49ad227d1152188e7c1e46b8958fd1e4&lt;br /&gt;
|&lt;br /&gt;
| {{yes|Yes (but not yet released)}}&lt;br /&gt;
| 282.083.944&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/061-5358.20081120.Gtghy/iPod2,1_2.2_5G77a_Restore.ipsw iPod2,1_2.2_5G77a_Restore.ipsw]&lt;br /&gt;
| 34a0a489605f34d6cc6c9954edcaaf9a050deedc&lt;br /&gt;
|&lt;br /&gt;
| {{yes|Yes (but not yet released)}}&lt;br /&gt;
| 291.123.491&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| SUTimberline 5H11a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5863.20090127.rt56K/iPod2,1_2.2.1_5H11a_Restore.ipsw iPod2,1_2.2.1_5H11a_Restore.ipsw]&lt;br /&gt;
| -&lt;br /&gt;
|&lt;br /&gt;
| {{yes|Yes (but not yet released)}}&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[VFDecrypt Keys]]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
*[http://www.trejan.com/projects/ipod/ Firmware List]&lt;br /&gt;
*[http://www.iphones.ru/forum/index.php?showtopic=7115 iPhone FW's Links (Russian)]&lt;br /&gt;
*[http://www.iphones.ru/forum/index.php?showtopic=13934 iPod Touch FW's Links (Russian)]&lt;br /&gt;
*[http://pastebin.ca/1209360 A link of interest...]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=2874</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=2874"/>
		<updated>2009-01-23T02:24:59Z</updated>

		<summary type="html">&lt;p&gt;James: Added 2.1.1 RootFS key, rd key, and rd IV. Also added 2.2 5G77a rd key and rd IV. Both courtesy of Chronic and co.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt.zip (Mac OS X Universal) (link is broken)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== 1.0 (Build 1A543a) ==&lt;br /&gt;
28c909fc6d322fa18940f03279d70880e59a4507998347c70d5b8ca7ef090ecccc15e82d&lt;br /&gt;
&lt;br /&gt;
== 1.0.1 (Build 1C25) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.0.2 (Build 1C28) ==&lt;br /&gt;
7d5962d0b582ec2557c2cade50de90f4353a1c1de07b74212513fef9cc71fb890574bfe5&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A109a) ==&lt;br /&gt;
f45de7637a62b200950e550f4144696d7ff3dc5f0b19c8efdf194c88f3bc2fa808fea3b3&lt;br /&gt;
&lt;br /&gt;
== 1.1.1 (Build 3A110a) ==&lt;br /&gt;
d45b837ddd85bdae0ec82a033ba00ea03ceb8c827040034f7554c65d6376472844b8dc6a&lt;br /&gt;
&lt;br /&gt;
== 1.1.2 (Build 3B48b) ==&lt;br /&gt;
70e11d7209602ada5b15fbecc1709ad4910d0ad010bb9a9125b78f9f50e25f3e05c595e2&lt;br /&gt;
&lt;br /&gt;
== 1.1.3 (Build 4A93) ==&lt;br /&gt;
11070c11d93b9be5069b643204451ed95aad37df7b332d10e48fd3d23c62fca517055816&lt;br /&gt;
&lt;br /&gt;
== 1.1.4 (Build 4A102) ==&lt;br /&gt;
d0a0c0977bd4b6350b256d6650ec9eca419b6f961f593e74b7e5b93e010b698ca6cca1fe&lt;br /&gt;
&lt;br /&gt;
== 1.1.5 (Build 4B1) ==&lt;br /&gt;
c7973558e8f6af22e38d4573737d1533f1d5eec202bf86a32d941975d76f8906c7f0afe4&lt;br /&gt;
&lt;br /&gt;
== 1.2 (Beta 1) (Build 5A147p) ==&lt;br /&gt;
86bec353ddfbe3fb750e9d7905801f79791e69acf65d16930d288e697644c76f16c4f16d&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 2) (Build 5A225c) ==&lt;br /&gt;
ea14f3ec624c7fdbd52e108aa92d13b16f6b0b940c841f7bbc7792099dae45da928d13e7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 3) (Build 5A240d) ==&lt;br /&gt;
e24bfab40a2e5d3dc25e089291846e5615b640897ae8b424946c587bcf53b201a1041d36&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 4) (Build 5A258f) ==&lt;br /&gt;
198d6602ba2ad2d427adf7058045fff5f20d05846622c186cca3d423ad03b5bc3f43c61c&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 5) (Build 5a274d) ==&lt;br /&gt;
589df25eaa4ff0a5e29e1425fb99bf50957888ff098ba2fcb72cf130f40e15e00bcf2fc7&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Pre-Release) (Build 5a292g) ==&lt;br /&gt;
890b1fbf22975e0d4be2ea3f9bc5c87f38fd8158394fd31cf80a43ad25547573bbd0ec4e&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 6 Final) (Build 5a308) ==&lt;br /&gt;
3964ca8d8bf5d3715cdc172986f2d9606672c54d5e0aa3f3a892166b4e54e4cefef21279&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Beta 7) (Build 5a331) ==&lt;br /&gt;
3d9a9832a108fc5084fc9329d6e84e38edf06e380554c49376b70e951f8a8d1ed943f819&lt;br /&gt;
&lt;br /&gt;
== 2.0 (Build 5a347) ==&lt;br /&gt;
 Ramdisk Key: 85 0A FC 27 11 32 D1 5A E6 98 95 65 56 7E 65 BF&lt;br /&gt;
 Ramdisk IV: 29 68 1F 62 5D 1F 61 27 1E C3 11 66 01 B8 BC DE&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.1 (Build 5B108) ==&lt;br /&gt;
 Ramdisk Key: 21 9E AC 3E 01 27 6C 7E C5 04 32 12 3F 50 97 1A&lt;br /&gt;
 Ramdisk IV: 02 4f DB BA 71 EB F3 4D F5 B5 25 CD 97 5A EF E8&lt;br /&gt;
2cfca55aabb22fde7746e6a034f738b7795458be9902726002a8341995558990f41e3755&lt;br /&gt;
&lt;br /&gt;
== 2.0.2 (Build 5C1) ==&lt;br /&gt;
 Ramdisk Key: CC 02 8F D2 9D C2 7F 89 5E 40 1D 98 65 E7 21 00&lt;br /&gt;
 Ramdisk IV: 53 7E B4 E7 12 9E A8 1F 57 2E C2 3D BE C4 2B 80&lt;br /&gt;
31e3ff09ff046d5237187346ee893015354d2135e3f0f39480be63dd2a18444961c2da5d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Beta 1) (Build 5F90) ==&lt;br /&gt;
 Ramdisk Key: 78 29 32 89 1F 0D 76 DB 49 0F DD CA 02 7A 13 B2&lt;br /&gt;
 Ramdisk IV: 6B EA 32 6D 0F 41 10 51 59 F0 AE A8 F9 9F E7 77&lt;br /&gt;
f61c14aa0d53386dd42c49163686e8ccdeb86d14aafdecfe99c2e12c41a7f9f2811daa3d&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F136) ==&lt;br /&gt;
 Ramdisk Key: 42 B4 F3 99 76 AF A5 9F 9E C6 80 FC CD 2C 7D 04&lt;br /&gt;
 Ramdisk IV: FD 53 0C 4C F8 A8 78 F1 63 87 43 29 88 B1 99 B8&lt;br /&gt;
562ca0f7963eafb462da74a9c1f01a45c30a7eb5f1f493feceecae03ee6521a334f4ff68&lt;br /&gt;
&lt;br /&gt;
== 2.1 (Build 5F137) ==&lt;br /&gt;
 Ramdisk Key: 7C 80 7F 65 65 01 5D AA 6D 18 2D FF 79 5E 10 91&lt;br /&gt;
 Ramdisk IV: 5C B7 FA 82 E8 FC 42 B9 DB 6C 02 7D 8F 4C 7C 39&lt;br /&gt;
9714f2cb955afa550d6287a1c7dd7bd0efb3c26cf74b948de7c43cf934913df69fc5a05f&lt;br /&gt;
&lt;br /&gt;
==2.1.1 (Build 5F138)==&lt;br /&gt;
 Ramdisk Key: 6D 4A 00 C0 A0 8E 90 A3 B0 24 88 5F 45 BC B7 20&lt;br /&gt;
 Ramdisk IV: 2F 44 81 85 5C A3 9E 67 DF BF 3D 19 B8 AD E6 0E&lt;br /&gt;
d1b957a0a5e56903adc523c5fa99f5d165c3963aea48274770b766b44ecdebab7b5a8f30&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77) ==&lt;br /&gt;
 Ramdisk Key: EE A6 E8 78 24 A3 C0 B0 BE 86 E8 E2 BB D8 CF E9&lt;br /&gt;
 Ramdisk IV: 18 2C DD A9 0A 38 87 0D E9 68 80 EE 7F F5 BB BC&lt;br /&gt;
dc39d88afe4cbd8a3f36824b8fd68acf04ac72718c09100816c5cb89889b8079e96802f0&lt;br /&gt;
&lt;br /&gt;
== 2.2 (Build 5G77a) ==&lt;br /&gt;
 Ramdisk Key: 77 8B 48 88 33 CA DA 94 0A 10 A7 C4 4C AC 74 13&lt;br /&gt;
 Ramdisk IV: 47 9C 46 F2 7F 5B 18 AC 5F A0 18 85 CF 2B 06 F9&lt;br /&gt;
148025cde5c51d51d7733e74c6857dfca70d7240287d6eb039a1ed835413120b0af1e296&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Redsn0w_Lite&amp;diff=2837</id>
		<title>Redsn0w Lite</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Redsn0w_Lite&amp;diff=2837"/>
		<updated>2009-01-16T22:50:45Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the [[dev team]] jailbreak for the [[n72ap|iPod Touch 2G]]. It has not been released yet and this page will be updated when it is :)&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
[http://redsn0w.com/ Red Sn0w Website]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=ARM7_Go&amp;diff=2836</id>
		<title>ARM7 Go</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=ARM7_Go&amp;diff=2836"/>
		<updated>2009-01-16T21:44:20Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This exploit is present in 2.1.1 iPod Touch 2G devices, as well as the iBEC / iBSS if you choose to upload it via DFU. It allows the running of unsigned code on the iPod Touch 2G device's ARM7 processor (not the ARM11, mind you).&lt;br /&gt;
&lt;br /&gt;
'''This exploit cannot be used on an [[iPhone]], [[iPhone 3G]], or [[n45ap|iPod touch 1G]], nor is there any reason for it to be as they have already been jailbroken.'''&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
chronic / [[dev team]] (no collaboration - spotted by each on their own and worked on seperately)&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
There is an ARM7 in the iPod Touch 2G in addition to the main processor, the ARM11. It is on the same address bus, so it has access to everything the ARM11 has access to, such as the AES engine, the PKE accelorator, and such. The actual exploit is that, in the iPod Touch 2G 2.1.1 firmware, they left behind two commands: arm7_stop and arm7_go. They were promptly removed in 2.2. The arm7_go command had no signature checking, permissions checking, or anything like that. The command gives the ARM7 the load address (default is 0x09000000) of an &amp;quot;image&amp;quot; you sent it, and it is supposed to execute it. Unfortunately, it does not like naked binaries, nor does it like IMG3 files. Hopefully on the release of [[RedSn0w]] it will provide some insight on how the ARM7 expects an image to before it is executed.&lt;br /&gt;
&lt;br /&gt;
==Payload==&lt;br /&gt;
As mentioned above, the payload is not as simple as writing some ARM code and sending it, then using &amp;quot;arm7_go&amp;quot;. This section will be updated once I get a chance to see how the dev team's redsn0w utilizes this exploit :)&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=ARM7_Go&amp;diff=2835</id>
		<title>ARM7 Go</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=ARM7_Go&amp;diff=2835"/>
		<updated>2009-01-16T21:42:38Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This exploit is present in 2.1.1 iPod Touch 2G devices, as well as the iBEC / iBSS if you choose to upload it via DFU. It allows the running of unsigned code on the iPod Touch 2G device's ARM7 processor (not the ARM11, mind you).&lt;br /&gt;
&lt;br /&gt;
'''This exploit cannot be used on an [[iPhone]], [[iPhone 3G]], or [[iPod Touch 1G]], nor is there any reason for it to be as they have already been jailbroken'''&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
chronic / [[dev team]] (no collaboration - spotted by each on their own and worked on seperately)&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
There is an ARM7 in the iPod Touch 2G in addition to the main processor, the ARM11. It is on the same address bus, so it has access to everything the ARM11 has access to, such as the AES engine, the PKE accelorator, and such. The actual exploit is that, in the iPod Touch 2G 2.1.1 firmware, they left behind two commands: arm7_stop and arm7_go. They were promptly removed in 2.2. The arm7_go command had no signature checking, permissions checking, or anything like that. The command gives the ARM7 the load address (default is 0x09000000) of an &amp;quot;image&amp;quot; you sent it, and it is supposed to execute it. Unfortunately, it does not like naked binaries, nor does it like IMG3 files. Hopefully on the release of [[RedSn0w]] it will provide some insight on how the ARM7 expects an image to before it is executed.&lt;br /&gt;
&lt;br /&gt;
==Payload==&lt;br /&gt;
As mentioned above, the payload is not as simple as writing some ARM code and sending it, then using &amp;quot;arm7_go&amp;quot;. This section will be updated once I get a chance to see how the dev team's redsn0w utilizes this exploit :)&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Redsn0w_Lite&amp;diff=2834</id>
		<title>Redsn0w Lite</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Redsn0w_Lite&amp;diff=2834"/>
		<updated>2009-01-16T21:39:26Z</updated>

		<summary type="html">&lt;p&gt;James: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the [[dev team]] jailbreak for the [[iPod Touch 2G]]. It has not been released yet and this page will be updated when it is :)&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
[http://redsn0w.com/ Red Sn0w Website]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware&amp;diff=2813</id>
		<title>Firmware</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware&amp;diff=2813"/>
		<updated>2009-01-14T21:39:29Z</updated>

		<summary type="html">&lt;p&gt;James: Updated iPod 2G table.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the iPhone OS system the iPhone runs. Latest Apple download links can be found [http://www.itunes.com/version here].&lt;br /&gt;
&lt;br /&gt;
==Comparison of firmware versions==&lt;br /&gt;
&lt;br /&gt;
===[[iPhone]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! [[Baseband]]&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! Can be [[unlock|unlocked]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| Heavenly 1A543a&lt;br /&gt;
| 03.12.06_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3538.20070629.B7vXa/iPhone1,1_1.0_1A543a_Restore.ipsw iPhone1,1_1.0_1A543a_Restore.ipsw]&lt;br /&gt;
| fb8bb3ee2e9a997affbb97868599f2995c78209c&lt;br /&gt;
| Initial US shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.604.348&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| Heavenly 1C25&lt;br /&gt;
| 03.12.06_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3614.20070731.Nt6Y7/iPhone1,1_1.0.1_1C25_Restore.ipsw iPhone1,1_1.0.1_1C25_Restore.ipsw]&lt;br /&gt;
| a00b85a7a55d62a94be5fbf5effbc42fd63f3097&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.627.958&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| Heavenly 1C28&lt;br /&gt;
| 03.14.08_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3823.20070821.vormd/iPhone1,1_1.0.2_1C28_Restore.ipsw iPhone1,1_1.0.2_1C28_Restore.ipsw]&lt;br /&gt;
| 7f5c0ff1f84a0202b75a55c3fcb362e415334d1e&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 95.627.324&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Snowbird 3A109a&lt;br /&gt;
| 04.01.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3883.20070927.In76t/iPhone1,1_1.1.1_3A109a_Restore.ipsw iPhone1,1_1.1.1_3A109a_Restore.ipsw]&lt;br /&gt;
| d441dd1c71ce18f25d8fc4faa71c1e6eaa02d02c&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 159.668.150&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48a&lt;br /&gt;
| 04.02.13_G&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial Euro shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48b&lt;br /&gt;
| 04.02.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4037.20071107.5Bghn/iPhone1,1_1.1.2_3B48b_Restore.ipsw iPhone1,1_1.1.2_3B48b_Restore.ipsw]&lt;br /&gt;
| 797c02e7d660940e8d9a16cc7229ccf3f67dd8b1&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 167.927.501&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| Little Bear 4A93&lt;br /&gt;
| 04.03.13_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4061.20080115.4Fvn7/iPhone1,1_1.1.3_4A93_Restore.ipsw iPhone1,1_1.1.3_4A93_Restore.ipsw]&lt;br /&gt;
| b3dec7580bd00dc4faf28449d9618ef40aeacc96&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 169.950.551&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
| Little Bear 4A102&lt;br /&gt;
| 04.04.05_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4313.20080226.Sw39i/iPhone1,1_1.1.4_4A102_Restore.ipsw iPhone1,1_1.1.4_4A102_Restore.ipsw]&lt;br /&gt;
| 000811bac096011b50ebf6ec1ec2285b62fda4cb&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 169.946.442&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4956.20080710.V50OI/iPhone1,1_2.0_5A347_Restore.ipsw iPhone1,1_2.0_5A347_Restore.ipsw]&lt;br /&gt;
| 9c510a3cfce789fa5f92a8f763c231bac82ff6d4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 228.768.637&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5135.20080729.Vfgtr/iPhone1,1_2.0.1_5B108_Restore.ipsw iPhone1,1_2.0.1_5B108_Restore.ipsw]&lt;br /&gt;
| 61de6a2bd6ceddc9ecabad1671b91a59b3824bc4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 254.048.068&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5246.20080818.2V0hO/iPhone1,1_2.0.2_5C1_Restore.ipsw iPhone1,1_2.0.2_5C1_Restore.ipsw]&lt;br /&gt;
| b84b57bea919bdc720287ec908c1378e7d7b5e1b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 253.589.000&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F136&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5202.20080909.gkbEj/iPhone1,1_2.1_5F136_Restore.ipsw iPhone1,1_2.1_5F136_Restore.ipsw]&lt;br /&gt;
| 353b7745767b85932e14e262e69463620939bdf7&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 242.171.241&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| 04.05.04_G&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5779.20081120.Pt5yH/iPhone1,1_2.2_5G77_Restore.ipsw iPhone1,1_2.2_5G77_Restore.ipsw]&lt;br /&gt;
| cbfc6ff886ce89868a55547b9fb980dbf92e6418 &lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 257.576.980&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[iPhone 3G]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! [[Baseband]]&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! Can be [[unlock|unlocked]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A345&lt;br /&gt;
| 01.45.00&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial iPhone 3G shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| 01.45.00&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4955.20080710.bgt53/iPhone1,2_2.0_5A347_Restore.ipsw iPhone1,2_2.0_5A347_Restore.ipsw]&lt;br /&gt;
| af9506ca0034e462674f9f59c5406f159eaf9fc1&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 235.957.125&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| 01.48.02&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5134.20080729.Q2W3E/iPhone1,2_2.0.1_5B108_Restore.ipsw iPhone1,2_2.0.1_5B108_Restore.ipsw]&lt;br /&gt;
| e81c7ac7e334a3e9d81b3b47894bfaa1ec495482&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 261.224.227&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| 02.08.01&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5241.20080818.t5Fv3/iPhone1,2_2.0.2_5C1_Restore.ipsw iPhone1,2_2.0.2_5C1_Restore.ipsw]&lt;br /&gt;
| bef7fef954293046420fbcf947379839178a195b&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 260.761.030&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F136&lt;br /&gt;
| 02.11.07&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5198.20080909.K3294/iPhone1,2_2.1_5F136_Restore.ipsw iPhone1,2_2.1_5F136_Restore.ipsw]&lt;br /&gt;
| c6957dcbf2a95ccfd6dce374a727b1b7700a9043&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 249.341.655&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| 02.28.00&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-5778.20081120.Aqw4R/iPhone1,2_2.2_5G77_Restore.ipsw iPhone1,2_2.2_5G77_Restore.ipsw]&lt;br /&gt;
| f67f8b2b842428bf89456cda0c2d5cf954d111a4&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258.342.348&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[N45ap|iPod touch (1st generation)]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| Snowbird 3A100a&lt;br /&gt;
| No download available&lt;br /&gt;
|&lt;br /&gt;
| Initial shipment.&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| Snowbird 3A101a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3882.20070910.N8uyT/iPod1,1_1.1_3A101a_Restore.ipsw iPod1,1_1.1_3A101a_Restore.ipsw]&lt;br /&gt;
| 9b0d83c7f8b4328174a3f31e0e93f60e591ae143&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 157.890.186&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Snowbird 3A110a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3932.20070927.p23dD/iPod1,1_1.1.1_3A110a_Restore.ipsw iPod1,1_1.1.1_3A110a_Restore.ipsw]&lt;br /&gt;
| 84bbc6ea8bf29745195bc9926c1874f7c2a36f32&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 157.906.686&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Oktoberfest 3B48b&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4036.20071107.9g3DF/iPod1,1_1.1.2_3B48b_Restore.ipsw iPod1,1_1.1.2_3B48b_Restore.ipsw]&lt;br /&gt;
| 108d8ffe9ea75e61cd5e57170ad388b7fa00d923&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 165.567.897&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| Little Bear 4A93&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/061-4060.20080115.9Iuh5/iPod1,1_1.1.3_4A93_Restore.ipsw iPod1,1_1.1.3_4A93_Restore.ipsw]&lt;br /&gt;
| 8dca23eec69d5ae58fbf3d4a23276e46cbb2e3c6&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173.511.411&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
| Little Bear 4A102&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4312.20080226.Btu45/iPod1,1_1.1.4_4A102_Restore.ipsw iPod1,1_1.1.4_4A102_Restore.ipsw]&lt;br /&gt;
| c148d1eb1c979bb6434175411d4a372103a4fdd2&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173.519.589&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.5&lt;br /&gt;
| Little Bear 4B1&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-4841.20080714.bgy8O/iPod1,1_1.1.5_4B1_Restore.ipsw iPod1,1_1.1.5_4B1_Restore.ipsw]&lt;br /&gt;
| 1b818911316e4248ee01d3ec67f9d39afc3db240&lt;br /&gt;
|&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 173.519.637&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| Big Bear 5A347&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| ae82798e85f9953b0f4798bad36187cb020c9d22&lt;br /&gt;
| 2.0+ is a paid upgrade series&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 233.409.573&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| Big Bear 5B108&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| a81b6e7af4b85ef436d047f9da57c0f694d8964a&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258.660.321&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
| Big Bear 5C1&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| c8b6f9fefa3f3777c56285dfe4c735b1e08a81a2&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 258.201.218&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| Sugar Bowl 5F137&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| fc7f6d0972927df502ffca47438ca75dcccffaf3&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 251.155.156&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77&lt;br /&gt;
| Download Link Prohibited&lt;br /&gt;
| 081a7de363230fb38d0ce092cbbe42f2a50c8a5f&lt;br /&gt;
| &lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 260.186.851&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===[[N72ap|iPod touch (2nd generation)]]===&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! IPSW Download URL&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! Can be [[jailbreak|jailbroken]]?&lt;br /&gt;
! File Size&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| Sugar Bowl 5F138&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-5494.20080909.8i9o0/iPod2,1_2.1.1_5F138_Restore.ipsw iPod2,1_2.1.1_5F138_Restore.ipsw]&lt;br /&gt;
| c3c700be49ad227d1152188e7c1e46b8958fd1e4&lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 282.083.944&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Timberline 5G77a&lt;br /&gt;
| [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/061-5358.20081120.Gtghy/iPod2,1_2.2_5G77a_Restore.ipsw iPod2,1_2.2_5G77a_Restore.ipsw]&lt;br /&gt;
| 34a0a489605f34d6cc6c9954edcaaf9a050deedc&lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;background:yellow; color:black;&amp;quot; class=&amp;quot;table-yes&amp;quot; | Yes (but not yet released)&lt;br /&gt;
| 291.123.491&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[VFDecrypt Keys]]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
*[http://www.trejan.com/projects/ipod/ Firmware List]&lt;br /&gt;
*[http://www.iphones.ru/forum/index.php?showtopic=7115 iPhone FW's Links (Russian)]&lt;br /&gt;
*[http://www.iphones.ru/forum/index.php?showtopic=13934 iPod Touch FW's Links (Russian)]&lt;br /&gt;
*[http://pastebin.ca/1209360 A link of interest...]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Tutorial:Unlock_iPhone_3G_with_TurboSim&amp;diff=2401</id>
		<title>Tutorial:Unlock iPhone 3G with TurboSim</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Tutorial:Unlock_iPhone_3G_with_TurboSim&amp;diff=2401"/>
		<updated>2008-12-07T05:26:39Z</updated>

		<summary type="html">&lt;p&gt;James: Cleaned up modem firmware versions and added information for newer firmwares 02.11.07 and 02.28.00.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{disclaimer}}&lt;br /&gt;
&lt;br /&gt;
This article is a step by step instruction to use a net-locked iPhone-3G with a different provider. &lt;br /&gt;
&lt;br /&gt;
The dev team states on [http://blog.iphone-dev.org/post/44428446/updates their blog] that the SIM hacks they examined send illegal signals. &lt;br /&gt;
&amp;lt;table border=1 width=100%&amp;gt;&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=#ffA4A4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Update / Warning:'''&lt;br /&gt;
&lt;br /&gt;
'''ZeroG''', was '''''not intended''''' ''' to do trickery to your cellular network'''. But due to the way the iPhone's 2.x baseband firmware handles the login, '''actually it does'''. Short overview: ZeroG starts up the SIM replacing MCC / MNC with test IMSI codes, leaving the MSIN untouched. Then it restarts the SIM giving the correct IMSI afterwards. Unfortunately the iPhone asks the SIM exactly ''one'' time for the IMSI, it doesn't care about the restart. So effectively the login into the cellular network is done in test IMSI mode. Now it is up to your provider, how it handles such requests. For normal logins (no turboSIM) the login request is processed by your provider. In the roaming case your login request is routed from the guest provider to your provider. There is no provider for 'test' MCC / MCN. Your provider has to recognize this upon login (This implies you have to manually select cellular network right from the start.) If your provider accepts the test IMSI code and does authentication with your MSIN (this implies, (real) roaming is not possible, as only _your_ provider can process MSIN correctly), everything ''could'' be fine. You don't spoof your identity, there should also be no billing problems. But if you try this method, have successfully installed ZeroG.trb and do _not_ gain access, probably your provider does not accept test IMSI mode. In this case better do not retry as you might risk your IMSI beeing blacklisted.&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ip terminal.png | thumb | right | 240px | Swisscom -&amp;gt; O2 Germany]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Preamble ===&lt;br /&gt;
&lt;br /&gt;
Apart from the warning and some other things, the method is quite stable if it works with your provider at all. You have to take care of:&lt;br /&gt;
* never switch on 3G mode&lt;br /&gt;
* before you use your SIM card that you want to unlock, put it in a different 2G phone and manually select provider and check GPRS works&lt;br /&gt;
* for GPRS, &amp;quot;data roaming&amp;quot; has to be enabled on the iPhone (it is not roaming for your provider, but the iPhone thinks it's roaming)&lt;br /&gt;
&lt;br /&gt;
=== Motivation ===&lt;br /&gt;
&lt;br /&gt;
Everyone who dislikes pink T's, over-priced unlocked iPhones and likes investigating exciting techniques ... (a.s.o.)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Supported Basebands ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellpadding=5 border=1&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;Baseband&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;Exploitable&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
         &amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;01.43.00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #c0c0c0; text-align: center&amp;quot;&amp;gt;unknown&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;01.45.00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #64ff64; text-align: center&amp;quot;&amp;gt;yes&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
        &amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;01.48.02&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #64ff64; text-align: center&amp;quot;&amp;gt;yes&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
        &amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;02.04.03&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #c0c0c0; text-align: center&amp;quot;&amp;gt;unknown&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
        &amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;02.08.01&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #64ff64; text-align: center&amp;quot;&amp;gt;yes&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
        &amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;02.11.07&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #64ff64; text-align: center&amp;quot;&amp;gt;yes&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
        &amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;text-align: center&amp;quot;&amp;gt;02.28.00&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;background-color: #ff9090; text-align: center&amp;quot;&amp;gt;no&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
&lt;br /&gt;
You need:&lt;br /&gt;
* Jailbroken iPhone 3G with OpenSSH installed (from cydia) and WLAN connection to your PC. ([http://www.iclarified.com/entry/index.php?enid=1558 Jailbreak Tutorial])&lt;br /&gt;
* Bladox's TurboSIM. (From http://www.bladox.com)&lt;br /&gt;
* SSH client for Windows Users such as Putty ([http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html Putty Download Page])&lt;br /&gt;
* SCP client (e.g. [http://winscp.net/eng/download.php#download2 WinSCP]) or FTP Client such as [http://rsug.itd.umich.edu/software/fugu/ Fugu] for Mac and [http://rsug.itd.umich.edu/software/fugu/ SmartFTP] for Windows&lt;br /&gt;
* TurboSIM programming sw [[http://dl.free.fr/pzijbVjXl/turbo-cable-utils-iPhone-0.7.0-rev3-firmware-v2.tar.gz download]]&lt;br /&gt;
* TurboSIM app zero-g [[http://www.bladox.com/pub/zerog-0.95.tar.gz download]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Installation ===&lt;br /&gt;
&lt;br /&gt;
1. Insert your simcard in another 2G phone, and remove the SIM Card Pin Code. You should also go to the Network Selection, and Manually select your network. Then cut your SIM card to fit with the TurboSIM. Google a little bit how to do this, or use YouTube and insert both into your iPhone 3G.&lt;br /&gt;
&lt;br /&gt;
2. Unpack turbo-cable-utils&lt;br /&gt;
&lt;br /&gt;
3. Copy contents of bin-iphonev2 to folder /bin/ on your iPhone.  (username: root   password: alpine)&lt;br /&gt;
&lt;br /&gt;
4. Unpack zerog-0.95 and copy zerog095.trb to /private/var/root/&lt;br /&gt;
&lt;br /&gt;
[[Image:Winscp_turbo-utils.png]]&lt;br /&gt;
&lt;br /&gt;
5. For Windows users, SSH into your iPhone using Putty. For Mac users, SSH into your iPhone using Terminal (Applications::Utilities::Terminal)&lt;br /&gt;
&lt;br /&gt;
6. Change the permissions of the turbo files to 755&lt;br /&gt;
&lt;br /&gt;
 chmod 755 /bin/turbo-*&lt;br /&gt;
&lt;br /&gt;
7. Run&lt;br /&gt;
 launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist&lt;br /&gt;
&lt;br /&gt;
8. You should now lose your signal, and WiFi. Restart your phone. You will now have WiFi on and CommCentre unloaded.&lt;br /&gt;
&lt;br /&gt;
9. Run turbo-info&lt;br /&gt;
&lt;br /&gt;
 # turbo-info&lt;br /&gt;
  initializing modem&lt;br /&gt;
 modem initiated&lt;br /&gt;
 OK. No Error&lt;br /&gt;
&lt;br /&gt;
NOTE: If you get an error from turbo-info, look for turbo-iphone-smsreset and run it.&lt;br /&gt;
&lt;br /&gt;
10. Now run turbo-app /private/var/root/zerog095.trb&lt;br /&gt;
&lt;br /&gt;
 # turbo-app /private/var/root/zerog095.trb &lt;br /&gt;
 SRC /private/var/root/zerog095.trb&lt;br /&gt;
 SIZE 1032&lt;br /&gt;
 initializing modem&lt;br /&gt;
 modem initiated&lt;br /&gt;
 OK. No Error&lt;br /&gt;
&lt;br /&gt;
11. Run &lt;br /&gt;
 launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist&lt;br /&gt;
&lt;br /&gt;
12. Now you should see Zero-G in the Sim Applications in Settings -&amp;gt; Phone -&amp;gt; Sim Applications&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Ip_simapp.png]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Ip_zerog.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Click on Zero-G&lt;br /&gt;
&lt;br /&gt;
15. Remove your card and TurboSIM from the 1st Generation iPhone&lt;br /&gt;
&lt;br /&gt;
16. You will get No Service&lt;br /&gt;
&lt;br /&gt;
[[Image:Ip_noservice.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Open Settings -&amp;gt; Phone -&amp;gt; Sim Applications and click on Zero-G&lt;br /&gt;
You may be interrupted by a popup which says Going to Switch, just choose Accept (Green Button) If you do not get interrupted, it will appear in a minute after choosing Zero-G from Sim Applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Ip_zerog2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. That's it!!&lt;br /&gt;
&lt;br /&gt;
[[Image:Ip_unlocked.png]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== 2G data settings ===&lt;br /&gt;
* roaming must be enabled&lt;br /&gt;
* make sure APN settings are correct (if APN options don't show up, just install a configuration file created with Apple's 'Web Configuration Utility' ([http://www.apple.com/support/downloads/iphoneconfigurationwebutility10formac.html Mac] / [http://www.apple.com/support/downloads/iphoneconfigurationwebutility10forwindows.html Windoze]) (In Windoze you can reach it with http://localhost:3000 ). Send this file to yourself and open it with the mail client.&lt;br /&gt;
* in BossPref (if you don't use it, don't care) 'edge' should be left enabled, even if network does not provide it (seems the BossPref option is a little bit misleading and 'edge' actually means 'GPRS/edge')&lt;br /&gt;
&lt;br /&gt;
=== 3G-SIM / USIM ===&lt;br /&gt;
&lt;br /&gt;
A new adapter was released in September (Gevey-3G) which allows full unlocking without the need of first placing the simcard in another unlocked device. You may have to turn 3G off, then insert the adapter placed with your sim card. After that you can turn 3G on. You'll have a full unlocked iPhone, including 3G signal. Also, this particular adapter does not require to cut your simcard, since the memory component is placed in the bottom part. This adapter does not allow &amp;quot;flight mode&amp;quot; use. In some cases a jailbreaking is needed in order to have it working properly.&lt;br /&gt;
&lt;br /&gt;
It works with (some?) USIMs (blau.de Germany) as well. 3G '''must not be activated''' on the iPhone. Once 3G is activated, it stops working, even if it is deactivated afterwards. To revive such SIM, put it in a non UMTS capable phone (did it together with turboSIM), check phone and GPRS functions and then this USIM will work again on the iPhone-3G. The SIM application (zero-g) was not visible, but it worked though. If GPRS does not work after a while (3 minutes or so), reboot your phone and try again.&lt;br /&gt;
&lt;br /&gt;
=== GPRS-'Fix' ===&lt;br /&gt;
&lt;br /&gt;
Today GPRS stopped working for me. Seems to be there are some 'states', stored on the SIM. This fixed the issue:&lt;br /&gt;
* removed SIM+TSim&lt;br /&gt;
* put SIM (without TSim) into non UMTS, but GPRS/edge mobile&lt;br /&gt;
* checked GPRS&lt;br /&gt;
* repacked Sim+TSim and put it back to the iPhone&lt;br /&gt;
&lt;br /&gt;
Voilà, here we go :-) GPRS for another few days :-)&lt;br /&gt;
&lt;br /&gt;
Tho' this might really not be the ultimate solution, I could hardly switch back to my old XDA Orbit. But XDA is a good device to revive the TSim solution... For that, I still love it a litte bit ;-)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Stuck in No Signal after a period ===&lt;br /&gt;
&lt;br /&gt;
Randomly you can get stuck in a bad No Signal. To correct that:&lt;br /&gt;
&lt;br /&gt;
* remove SIM+TSim&lt;br /&gt;
* put SIM (without TSim) into non 3G phone&lt;br /&gt;
* Manually select your provider (desired to unlock) network&lt;br /&gt;
* repack Sim+TSim and put it back to the iPhone&lt;br /&gt;
&lt;br /&gt;
Here we go again, unlock iphone for a few days more also.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TurboSIM Compatibility with Operators ===&lt;br /&gt;
&lt;br /&gt;
Actually this table gives a rough overview of all *sim solutions because it reflects working of MCC/MNC = 001/01 and all *sim known so far use this method. The table doesn't give information about 3G though, as turbosim does not support 3G SIM-ME communication at the moment. So could be, some *sim solutions work with 3G where this table indicates no. Most probably there isn't any *sim solution that works in a specific configuration if this table indicates 'no' for the method at all.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: center; width: auto; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Country&lt;br /&gt;
! Unlocked Provider&lt;br /&gt;
! SIM/USIM&lt;br /&gt;
! Calls?&lt;br /&gt;
! SMS?&lt;br /&gt;
! GPRS/EDGE?&lt;br /&gt;
! UMTS/HSDPA?&lt;br /&gt;
! Comments&lt;br /&gt;
|-&lt;br /&gt;
| Brazil&lt;br /&gt;
| TIM&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3G signal with Gevey-3G adapter. Turn off 3G, insert simcard, then turn 3G on.&lt;br /&gt;
|-&lt;br /&gt;
| Brazil&lt;br /&gt;
| Claro&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3G signal with Gevey-3G adapter. Turn off 3G, insert simcard, then turn 3G on.&lt;br /&gt;
|-&lt;br /&gt;
| Brazil&lt;br /&gt;
| Vivo (Telefónica)&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3G signal with Gevey-3G adapter. Turn off 3G, insert simcard, then turn 3G on.&lt;br /&gt;
|-&lt;br /&gt;
| Brazil&lt;br /&gt;
| BrasilTelecom&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| 3G signal with Gevey-3G adapter. Turn off 3G, insert simcard, then turn 3G on.&lt;br /&gt;
|-&lt;br /&gt;
| Germany&lt;br /&gt;
| Blau.de&lt;br /&gt;
| USIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Germany&lt;br /&gt;
| Congstar&lt;br /&gt;
| USIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
|-&lt;br /&gt;
| Germany&lt;br /&gt;
| O2&lt;br /&gt;
| USIM&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| They realized the challenge, striking back. Don't stress them. Don't use it.&lt;br /&gt;
|-&lt;br /&gt;
| Germany&lt;br /&gt;
| O2&lt;br /&gt;
| SIM&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
| They realized the challenge, striking back. Don't stress them. Don't use it.&lt;br /&gt;
|-&lt;br /&gt;
| Israel&lt;br /&gt;
| Orange (Partner)&lt;br /&gt;
| USIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Jordan&lt;br /&gt;
| Orange&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Jordan&lt;br /&gt;
| Umniah&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Jordan&lt;br /&gt;
| Zain&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Netherlands&lt;br /&gt;
| KPN&lt;br /&gt;
| USIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| Unstable.&lt;br /&gt;
|-&lt;br /&gt;
| Turkey&lt;br /&gt;
| Turkcell&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| UK&lt;br /&gt;
| Orange&lt;br /&gt;
| SIM&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| UK&lt;br /&gt;
| Tesco&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
| N/A&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| UK&lt;br /&gt;
| Virgin&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
| N/A&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| UK&lt;br /&gt;
| Vodafone&lt;br /&gt;
| SIM&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| N/A&lt;br /&gt;
| N/A&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| N/A&lt;br /&gt;
| T-Mobile&lt;br /&gt;
| SIM&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| N/A&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Bermuda&lt;br /&gt;
| Mobility&lt;br /&gt;
| SIM&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| Please note this is a Gevey 3G and it may just be my card.&lt;br /&gt;
|-&lt;br /&gt;
! Australia&lt;br /&gt;
! Three&lt;br /&gt;
! USIM&lt;br /&gt;
! {{yes}}&lt;br /&gt;
! {{yes}}&lt;br /&gt;
! {{no}}&lt;br /&gt;
! {{yes}}&lt;br /&gt;
! Airplane mode not working. Turn 3G off needs reboot if you want signal again. Using &amp;quot;i-SmartPhone&amp;quot; TSim&lt;br /&gt;
|-}&lt;br /&gt;
&lt;br /&gt;
=== Remarks ===&lt;br /&gt;
&lt;br /&gt;
* Important is you get zero-g into your turboSim. So you could also try with a first gen iphone, this needs the other version of turbo-cable-utils (bin-iphonev1) in case you didn't upgrade to 2.x yet.&lt;br /&gt;
* If you get ''ERROR: Not Enough RAM'' run '''turbo-rm-apps'''&lt;br /&gt;
* If you should encounter any problems with your TurboSIM (no access anymore, wrong app, ...) there is an easy method to remove installed turbo sim applications: instead of giving your SIM-Pin, enter the TPIN which you can find next to the serial number on the cover. This will reset your TurboSIM. Afterwards the phone asks a second time for your PIN, now use the SIM-Pin.&lt;br /&gt;
&lt;br /&gt;
**A little help Gevey 3G not working at all not even picking up sim card any suggestions?**&lt;br /&gt;
&lt;br /&gt;
[[Category:Unlocking Methods]]&lt;/div&gt;</summary>
		<author><name>James</name></author>
		
	</entry>
</feed>