<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nvidia2008</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nvidia2008"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Nvidia2008"/>
	<updated>2026-04-06T00:34:13Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1732</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1732"/>
		<updated>2008-08-14T16:45:55Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit (iPhone) ==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits. This may explain the SIM hack working for several hours or days before it stops working. On [http://www.hackint0sh.org/forum/showthread.php?p=329221 hackint0sh] one user reported that '''all SIM solutions be''' '''''_not_''''' '''working with EDGE and UMTS''' [http://www.hackint0sh.org/forum/showpost.php?p=329739&amp;amp;postcount=24].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; Warning &amp;lt;/b&amp;gt;&lt;br /&gt;
(citation taken from dev team's [http://blog.iphone-dev.org/post/44428446/updates blog]):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;cite&amp;gt;We’ve been monitoring the whole “SIM-card unlock” proxy-SIM situation.  This involves using a chip that is attached to your SIM card (with a small modification to your SIM) or sometimes a small PCB soldered inside the phone.  These sim mods so far seem '''very very very''' questionable.  Zf has found that they use trickery of the GSM and UMTS network that is considered highly illegal in most countries and they rely on sending bogus IMSIs and various other nasty hacks to obtain service on your iPhone. A couple of our members have worked out how this all “works” and we’ll try to publish our findings soon. '''DevTeam recommendation: Steer clear, don’t use!'''&amp;lt;/cite&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(In alphabetical order)&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
The company video demonstrates 2G but mentions no 3G function at this stage. The RebelSim website claims it has tested iPhone 3G operation. More information is required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
One of the more expensive variants of the SIM hacks on sale now.  More formal reports indicate that this method is just as unstable as the rest.  It fakes IMSI like the rest, but eventually gets kicked off the network.  Don't buy.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Universal Sim===&lt;br /&gt;
Claims that they're updated hardware/software now allows full iPhone 3G functionality. Reports are not clear yet at this stage although their website now shows several videos. In discussions with Hackint0sh forum members Universal Sim claims that their technique is quite different to the other SIM solutions. &lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Overall, there are conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;. Initial testing of Yessim with stock configurations shows problems after several hours or a few days.&lt;br /&gt;
&lt;br /&gt;
== SIM hacks development status ==&lt;br /&gt;
&lt;br /&gt;
===SIM communication===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
''Hackint0sh.Org Policy:'' At this stage due to complications all SIM Hack testing and discussion should be done  [http://www.hackint0sh.org/forum/showthread.php?p=329221 here].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;br /&gt;
&lt;br /&gt;
[[Category:Unlocking Methods]]&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1731</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1731"/>
		<updated>2008-08-14T16:45:10Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit (iPhone) ==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits. This may explain the SIM hack working for several hours or days before it stops working. On [http://www.hackint0sh.org/forum/showthread.php?p=329221 hackint0sh] one user reported that '''all SIM solutions be''' '''''_not_''''' '''working with EDGE and UMTS''' [http://www.hackint0sh.org/forum/showpost.php?p=329739&amp;amp;postcount=24].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; Warning &amp;lt;/b&amp;gt;&lt;br /&gt;
(citation taken from dev team's [http://blog.iphone-dev.org/post/44428446/updates blog]):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;cite&amp;gt;We’ve been monitoring the whole “SIM-card unlock” proxy-SIM situation.  This involves using a chip that is attached to your SIM card (with a small modification to your SIM) or sometimes a small PCB soldered inside the phone.  These sim mods so far seem '''very very very''' questionable.  Zf has found that they use trickery of the GSM and UMTS network that is considered highly illegal in most countries and they rely on sending bogus IMSIs and various other nasty hacks to obtain service on your iPhone. A couple of our members have worked out how this all “works” and we’ll try to publish our findings soon. '''DevTeam recommendation: Steer clear, don’t use!'''&amp;lt;/cite&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(In alphabetical order)&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
The company video demonstrates 2G but mentions no 3G function at this stage. The RebelSim website claims it has tested iPhone 3G operation. More information is required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
One of the more expensive variant of the SIM hacks on sale now.  More formal reports indicate that this method is just as unstable as the rest.  It fakes IMSI like the rest, but eventually gets kicked off the network.  Don't buy.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Universal Sim===&lt;br /&gt;
Claims that they're updated hardware/software now allows full iPhone 3G functionality. Reports are not clear yet at this stage although their website now shows several videos. In discussions with Hackint0sh forum members Universal Sim claims that their technique is quite different to the other SIM solutions. &lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Overall, there are conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;. Initial testing of Yessim with stock configurations shows problems after several hours or a few days.&lt;br /&gt;
&lt;br /&gt;
== SIM hacks development status ==&lt;br /&gt;
&lt;br /&gt;
===SIM communication===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
''Hackint0sh.Org Policy:'' At this stage due to complications all SIM Hack testing and discussion should be done  [http://www.hackint0sh.org/forum/showthread.php?p=329221 here].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;br /&gt;
&lt;br /&gt;
[[Category:Unlocking Methods]]&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1266</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1266"/>
		<updated>2008-08-02T18:21:44Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* StealthSim */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit (iPhone) ==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits. This may explain the SIM hack working for several hours or days before it stops working. On [http://www.hackint0sh.org/forum/showthread.php?p=329221 hackint0sh] one user reported that '''all SIM solutions be''' '''''_not_''''' '''working with EDGE and UMTS''' [http://www.hackint0sh.org/forum/showpost.php?p=329739&amp;amp;postcount=24].&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
The [http://www.youtube.com/watch?v=lNG3CUM8yNM official video] demonstrates 2G but mentions no 3G function at this stage. The [http://rebelsimcard.com/virtu/ RebelSim website] claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However there is no conclusive evidence at this stage.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Overall, there are conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;. Initial testing of Yessim with stock configurations shows problems after several hours or a few days.&lt;br /&gt;
&lt;br /&gt;
== SIM hacks development status ==&lt;br /&gt;
&lt;br /&gt;
===SIM communication===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
''Hackint0sh.Org Policy:'' At this stage due to complications all SIM Hack testing and discussion should be done  [http://www.hackint0sh.org/forum/showthread.php?p=329221 here].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1265</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1265"/>
		<updated>2008-08-02T18:18:00Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit (iPhone) ==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits. This may explain the SIM hack working for several hours or days before it stops working. On [http://www.hackint0sh.org/forum/showthread.php?p=329221 hackint0sh] one user reported that '''all SIM solutions be''' '''''_not_''''' '''working with EDGE and UMTS''' [http://www.hackint0sh.org/forum/showpost.php?p=329739&amp;amp;postcount=24].&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
The [http://www.youtube.com/watch?v=lNG3CUM8yNM official video] demonstrates 2G but mentions no 3G function at this stage. The [http://rebelsimcard.com/virtu/ RebelSim website] claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Overall, there are conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;. Initial testing of Yessim with stock configurations shows problems after several hours or a few days.&lt;br /&gt;
&lt;br /&gt;
== SIM hacks development status ==&lt;br /&gt;
&lt;br /&gt;
===SIM communication===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
''Hackint0sh.Org Policy:'' At this stage due to complications all SIM Hack testing and discussion should be done  [http://www.hackint0sh.org/forum/showthread.php?p=329221 here].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1210</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1210"/>
		<updated>2008-08-01T18:15:43Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit (iPhone) ==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits. This may explain the SIM hack working for several hours or days before it stops working.&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
The official video http://www.youtube.com/watch?v=lNG3CUM8yNM demonstrates 2G but mentions no 3G function at this stage. The [http://rebelsimcard.com/virtu/ RebelSim website] claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
== SIM hacks development status ==&lt;br /&gt;
&lt;br /&gt;
===SIM communication===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
''Hackint0sh.Org Policy:'' At this stage due to complications all SIM Hack testing and discussion should be done  [http://www.hackint0sh.org/forum/showthread.php?p=329221 here].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1207</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1207"/>
		<updated>2008-08-01T17:59:00Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Summary===&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits. This may explain the SIM hack working for several hours or days before it stops working.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1206</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1206"/>
		<updated>2008-08-01T17:57:04Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* iPhonix / Juma */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Summary===&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode (data mode not clear) works with this. MacBug.de seems to be distancing itself from the product.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1205</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1205"/>
		<updated>2008-08-01T17:55:50Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Summary===&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on. It is also theorised that different carrier networks have an ability to detect and block such exploits.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1204</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1204"/>
		<updated>2008-08-01T17:54:45Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Summary===&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1203</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1203"/>
		<updated>2008-08-01T17:54:12Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
It seems that some level of 2G call and SMS operation with SIM hacks is possible. However there is a high level of unpredictable behaviour based on different networks, SIMs, SIM hack co-devices, and so on.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1202</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1202"/>
		<updated>2008-08-01T17:52:22Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Baseband Feedback */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing. In very layman-person terms, there is a way to see the baseband requesting information from the SIM and seeing the modem commands and various other baseband operations. This information will probably be clearer in other sections of this Wiki.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1201</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1201"/>
		<updated>2008-08-01T17:50:59Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* RebelSim */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh Forum user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1200</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1200"/>
		<updated>2008-08-01T17:50:32Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* RebelSim */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
http://rebelsimcard.com/virtu/ website claims it has tested iPhone 3G operation. Online chat through the website with a representative seems responsive. A Hackint0sh user has seen (not tried) this in action. Further investigation required.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1199</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1199"/>
		<updated>2008-08-01T17:49:30Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
Claims tested iPhone 3G operation.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1198</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1198"/>
		<updated>2008-08-01T17:49:12Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
(Sorted Alphabetically)&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===RebelSim===&lt;br /&gt;
Claims tested iPhone 3G operation.&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Update: Yessim and a fresh new UK O2 PAYG appears working in very early initial 2G call and SMS testing. Testing has only been done for 2 hours since first try. Overall, conflicting reports on whether this works on various SIMs and networks. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1103</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1103"/>
		<updated>2008-08-01T11:20:46Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1102</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1102"/>
		<updated>2008-08-01T11:20:07Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* StealthSim */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and possibly 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1101</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1101"/>
		<updated>2008-08-01T10:30:59Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Yessim / Furiousim */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used. The company mentions that unfortunately instead of USB cables, RJ45 cables were provided to testers due to a &amp;quot;shipping error&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1100</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1100"/>
		<updated>2008-08-01T10:29:45Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
The most expensive variant of the SIM hacks on sale now. Initial reports on Hackint0sh Forums indicate full 2G and 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used.&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1099</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1099"/>
		<updated>2008-08-01T10:27:50Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Baseband Feedback===&lt;br /&gt;
Currently it is possible to see some information at the baseband level of how the iPhone 3G baseband &amp;quot;interacts&amp;quot; with the SIM and SIM hack co-device. Investigations are ongoing.&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
Initial reports on Hackint0sh Forums indicate full 2G and 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1098</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1098"/>
		<updated>2008-08-01T10:26:32Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
Initial reports on Hackint0sh Forums indicate full 2G and 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1097</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1097"/>
		<updated>2008-08-01T10:26:00Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a [[SIM]] card passthrough to be used. They typically work by spoofing the MCC/MNC. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old SIM Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the SIM card, and this IMSI is used for the network login.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
===Hackint0sh.Org Policy===&lt;br /&gt;
:At this stage due to complications all SIM Hack testing and discussion is merged into one thread: http://www.hackint0sh.org/forum/showthread.php?p=329221&lt;br /&gt;
&lt;br /&gt;
===iPhonix / Juma===&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
===TurboSim===&lt;br /&gt;
Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
===StealthSim===&lt;br /&gt;
Initial reports on Hackint0sh Forums indicate full 2G and 3G function. However these are new posters with small post counts. More information on this is required.&lt;br /&gt;
&lt;br /&gt;
===Yessim / Furiousim===&lt;br /&gt;
Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G SIM Tray Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny [[SIM]] ejector button. You have been warned. Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1015</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1015"/>
		<updated>2008-07-31T19:29:03Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
'''iPhonix / Juma'''&lt;br /&gt;
:MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
'''TurboSim'''&lt;br /&gt;
:Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
'''StealthSim'''&lt;br /&gt;
:Initial reports on Hackint0sh Forums indicate full 2G and 3G function. However these are new posters with small post counts. The main company website is http://www.stealthsim.com and they mention minimum orders of 250 pieces if dealing directly with them. Retail is done through their dealer in Canada, apparently, through http://www.iphonestealth.com. More information on this is strongly requested. StealthSim also appears to be also available on eBay.&lt;br /&gt;
&lt;br /&gt;
'''Yessim / Furiousim'''&lt;br /&gt;
:Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;. It is recommended that if ordering, the USB &amp;quot;YesUP&amp;quot; or &amp;quot;FuriousUP&amp;quot; cable is used.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1014</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1014"/>
		<updated>2008-07-31T19:28:02Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
'''iPhonix / Juma'''&lt;br /&gt;
:MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
'''TurboSim'''&lt;br /&gt;
:Indications are that no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
'''StealthSim'''&lt;br /&gt;
:Initial reports on Hackint0sh Forums indicate full working. However these are new posters with small post counts. The main company website is http://www.stealthsim.com and they mention minimum orders of 250 pieces if dealing directly with them. Retail is done through their dealer in Canada, apparently, through http://www.iphonestealth.com.&lt;br /&gt;
&lt;br /&gt;
'''Yessim / Furiousim'''&lt;br /&gt;
:Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1013</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1013"/>
		<updated>2008-07-31T19:27:26Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples include TurboSIM, XSim, SuperSIM, Yessim, Furiousim, StealthSim.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
'''iPhonix / Juma'''&lt;br /&gt;
:MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
'''TurboSim'''&lt;br /&gt;
:The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK. According to Zf_ of the DevTeam, no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
'''StealthSim'''&lt;br /&gt;
:Initial reports on Hackint0sh Forums indicate full working. However these are new posters with small post counts. The main company website is http://www.stealthsim.com and they mention minimum orders of 250 pieces if dealing directly with them. Retail is done through their dealer in Canada, apparently, through http://www.iphonestealth.com.&lt;br /&gt;
&lt;br /&gt;
'''Yessim / Furiousim'''&lt;br /&gt;
:Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1012</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1012"/>
		<updated>2008-07-31T19:26:35Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
'''iPhonix / Juma'''&lt;br /&gt;
:MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
'''TurboSim'''&lt;br /&gt;
:The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK. According to Zf_ of the DevTeam, no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
'''StealthSim'''&lt;br /&gt;
:Initial reports on Hackint0sh Forums indicate full working. However these are new posters with small post counts. The main company website is http://www.stealthsim.com and they mention minimum orders of 250 pieces if dealing directly with them. Retail is done through their dealer in Canada, apparently, through http://www.iphonestealth.com.&lt;br /&gt;
&lt;br /&gt;
'''Yessim / Furiousim'''&lt;br /&gt;
:Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1011</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=1011"/>
		<updated>2008-07-31T19:23:41Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
'''iPhonix / Juma'''&lt;br /&gt;
:MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
'''TurboSim'''&lt;br /&gt;
:The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK. According to Zf_ of the DevTeam, no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
'''StealthSim'''&lt;br /&gt;
Initial reports on Hackint0sh Forums indicate full working. However these are new posters with small post counts. The main company website is http://www.stealthsim.com and they mention minimum orders of 250 pieces if dealing directly with them. Retail is done through their dealer in Canada, apparently, through http://www.iphonestealth.com.&lt;br /&gt;
&lt;br /&gt;
'''Yessim / Furiousim'''&lt;br /&gt;
:Conflicting reports on whether this works. Samples have been provided to various users on Hackint0sh Forums. Initial challenges faced because of a RJ45 type connector that is needed to set &amp;quot;Boost Mode&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=840</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=840"/>
		<updated>2008-07-30T20:47:33Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
&lt;br /&gt;
iPhonix / Juma:&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
TurboSim:&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK. According to Zf_ of the DevTeam, no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
StealthSim: &lt;br /&gt;
Awaiting reports, if any.&lt;br /&gt;
&lt;br /&gt;
Yessim / Furiousim:&lt;br /&gt;
Conflicting reports on whether this works.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=839</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=839"/>
		<updated>2008-07-30T20:47:19Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
Yessim / Furiousim:&lt;br /&gt;
Conflicting reports on whether this works.&lt;br /&gt;
&lt;br /&gt;
iPhonix / Juma:&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
TurboSim:&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK. According to Zf_ of the DevTeam, no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
StealthSim: &lt;br /&gt;
Awaiting reports, if any.&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=838</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=838"/>
		<updated>2008-07-30T20:46:50Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* SIM Hacks for iPhone 3G */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==Old Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==SIM Hacks for iPhone 3G==&lt;br /&gt;
Yessim / Furiousim:&lt;br /&gt;
Conflicting reports on whether this works.&lt;br /&gt;
&lt;br /&gt;
iPhonix / Juma:&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
TurboSim:&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK. According to Zf_ of the DevTeam, no stable TurboSIM exploit is available at this time. For some providers in Germany there appears to be some success, see [[Unlock iphone-3G with TurboSim|TurboSIM Unlock]].&lt;br /&gt;
&lt;br /&gt;
==iPhone 3G Warning==&lt;br /&gt;
The iPhone 3G SIM tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
Should you not apply tape beforehand, you can still eject the simtray with an L-shaped pin and a quick but forceful yank.  It sounds scary but it's just plastic, after all.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=320</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=320"/>
		<updated>2008-07-28T09:19:52Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Reports */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==WARNING==&lt;br /&gt;
The iPhone 3G sim tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==Reports==&lt;br /&gt;
&lt;br /&gt;
Yessim/ Furiousim:&lt;br /&gt;
Conflicting reports on whether this works.&lt;br /&gt;
&lt;br /&gt;
iPhonix/Juma:&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
TurboSim:&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=319</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=319"/>
		<updated>2008-07-28T09:18:48Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Reports */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==WARNING==&lt;br /&gt;
The iPhone 3G sim tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==Reports==&lt;br /&gt;
&lt;br /&gt;
Yessim/ Furiousim &lt;br /&gt;
Conflicting reports on whether this works.&lt;br /&gt;
&lt;br /&gt;
iPhonix/Juma&lt;br /&gt;
MacBug.de reports only 2G mode works with this.&lt;br /&gt;
&lt;br /&gt;
TurboSim&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=318</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=318"/>
		<updated>2008-07-28T09:16:28Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* WARNING */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==WARNING==&lt;br /&gt;
The iPhone 3G sim tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button. You have been warned.&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==Reports==&lt;br /&gt;
&lt;br /&gt;
iPhonix/Juma&lt;br /&gt;
&lt;br /&gt;
TurboSim&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=317</id>
		<title>SIM hacks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SIM_hacks&amp;diff=317"/>
		<updated>2008-07-28T09:16:05Z</updated>

		<summary type="html">&lt;p&gt;Nvidia2008: /* Exploit */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These hacks all require a SIM card passthrough to be used. Some examples are the TurboSIM, the XSim, and the SuperSIM.&lt;br /&gt;
&lt;br /&gt;
==WARNING==&lt;br /&gt;
The iPhone 3G sim tray is very very thin. If using SIM hacks (dual sim, etc.) a long thin tape should be attached in a way that you can easily extract the sim tray without relying on the normal tiny sim ejector button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
This relies on the fact that the IMSI is read twice, once to validate the IMSI and once to connect to the network. So the SIM card spoofs the first IMSI read to trick the device into thinking it is operating on the AT&amp;amp;T network, or whatever network the device is locked to. The second time it allows the IMSI to be read properly from the sim card. That is the IMSI sent to the network.&lt;br /&gt;
&lt;br /&gt;
A slight variant of this exploit uses a silvercard to program the IMSI and ICCID differently. This variant requires your Ki to be known, which can only be extracted from COMPEMU v1 sim cards.&lt;br /&gt;
&lt;br /&gt;
==Reports==&lt;br /&gt;
&lt;br /&gt;
iPhonix/Juma&lt;br /&gt;
&lt;br /&gt;
TurboSim&lt;br /&gt;
The author nvidia2008 describes Turbo Sim on the iPhone 3G White 16GB not working in the UK.&lt;/div&gt;</summary>
		<author><name>Nvidia2008</name></author>
		
	</entry>
</feed>