Difference between revisions of "NitroKey"

From The iPhone Wiki
Jump to: navigation, search
(Undo revision 9948 by Windows Helpdesk (Talk) Don't add opinion to an article.)
(direct link instead of link to redirection page)
Line 3: Line 3:
 
They also released a stolen version of the [[0x24000 Segment Overflow]], the vulnerability that the untethered [[N72ap|iPod Touch 2G]] jailbreak uses, giving Apple enough time to fix the [[N18ap|iPod Touch 3G]] so that it CAN NOT be directly jailbroken from its release. In addition, NitroKey's irresponsible handling gave Apple enough time to add the [[ECID]] tag to the [[IMG3 File Format]] in the [[N88AP|iPhone 3GS]], preventing a permanent untethered [[jailbreak]] without a new [[iBoot]] exploit in every firmware.
 
They also released a stolen version of the [[0x24000 Segment Overflow]], the vulnerability that the untethered [[N72ap|iPod Touch 2G]] jailbreak uses, giving Apple enough time to fix the [[N18ap|iPod Touch 3G]] so that it CAN NOT be directly jailbroken from its release. In addition, NitroKey's irresponsible handling gave Apple enough time to add the [[ECID]] tag to the [[IMG3 File Format]] in the [[N88AP|iPhone 3GS]], preventing a permanent untethered [[jailbreak]] without a new [[iBoot]] exploit in every firmware.
   
NitroKey has also leaked [[AT+FNS]], a [[baseband]] hole which was meant to be kept secret. [http://nitrokey.com/Hash.html] The hash was posted by NitroKey one day after [[User:Oranav|Oranav]] found and shared the exploit with the [[iPhone Dev Team]], making things very suspicious. Apple has now patched the hole, needlessly burning an exploit that could have been used as an unlock vector for a future firmware.
+
NitroKey has also leaked [[AT+FNS]], a [[Baseband Device|baseband]] hole which was meant to be kept secret. [http://nitrokey.com/Hash.html] The hash was posted by NitroKey one day after [[User:Oranav|Oranav]] found and shared the exploit with the [[iPhone Dev Team]], making things very suspicious. Apple has now patched the hole, needlessly burning an exploit that could have been used as an unlock vector for a future firmware.

Revision as of 18:58, 28 October 2010

NitroKey was a product released in late February of 2009, by the company "NitroKey," in order to aid those with a tethered jailbroken iPod touch 2G to boot their iPods. It consisted of a small dongle that looked EXACTLY like the end of an iPod cable, with no cord on it. The product was being sold for an outrageous price of $55.00 to those unfortunate enough to have made the decision to purchase one, as it went obsolete not two weeks after its release.

They also released a stolen version of the 0x24000 Segment Overflow, the vulnerability that the untethered iPod Touch 2G jailbreak uses, giving Apple enough time to fix the iPod Touch 3G so that it CAN NOT be directly jailbroken from its release. In addition, NitroKey's irresponsible handling gave Apple enough time to add the ECID tag to the IMG3 File Format in the iPhone 3GS, preventing a permanent untethered jailbreak without a new iBoot exploit in every firmware.

NitroKey has also leaked AT+FNS, a baseband hole which was meant to be kept secret. [1] The hash was posted by NitroKey one day after Oranav found and shared the exploit with the iPhone Dev Team, making things very suspicious. Apple has now patched the hole, needlessly burning an exploit that could have been used as an unlock vector for a future firmware.