Where did these pictures come from? ~geohot
Chronic found these pictures from a guy at hackint0sh who sent in his 3G for repair. -wEsTbAeR--
geohot, the only flaw with your ramdisk hypothosis is that someone got their iphone back with that on it. plus, could all the needed frameworks for a GUI application fit on a ramdisk? ChronicDev
Chronic, maybe on a 32MB Zibri ZramdiskZ. :P Actually this is a really bad-ass GUI, so it should fit in these 32MB or something.
even this. you need new frameworks that dont come on a vanilla ramdisk
Actually, I wonder what this does to the baseband. Something has to set up each baseband from the factory, and that something contains the private keys!!!
Only the baseband private keys, not the IPSW private keys. But who cares about the IPSW ones.
don't get your hopes up. according to a friend, even builds that are seeded directly to people that work for carriers don't even get this, so this is for people way way way way WAY high up. If only that guy on hackintosh took the iPhone home, the devteam could have helped him pwn and extract the BurnIn application :( I doubt a phone like this will ever be seen in the wild again.
In other words, the likelyhood of us getting this is as likely as us getting the key that Apple uses to sign their ipsws, unless there is another factory slip up.
geohot, as a side note since I am already kind of talking to you :P, would you mind sharing the 114 iboot patches you used to get AES access? thanks to your post, I know how to do it, but I have been trying and I am just not skilled enough to find the correct patches :( I posted them last week, check the page about it ~geohot
It's a stretch, I know, but what about data recovery? If some (all?) devices have this firmware initially, then it is replaced, could some data still be recovered from the device? Or is it zeroed out before it leaves? I guess the real question is, does an OOTB device have data still on-disk other than actual inodes? --Haldo 23:22, 5 August 2008 (UTC)
It would surprise me if the phones had anything on disk. I still believe it is a ramdisk. Although, lets assume I'm wrong. A dump is very easy to do, and if we do it at the iBoot level, I believe we can recover the out of band data too. ~geohot
its an application dude. talk to me on IRC about it for more info. trust me.
and i saw the page, but I get permission denied errors if i use just what is there unfortunately :(
Ah, very nice to see those iPod touch pictures... I remember them being posted to hackint0sh a while back. Beyond the 3G and iPod Touch, has *anyone* else ever had this happen? While it's rare, it seems to not be impossible.
does drag to unlock actually unlock
well does it? this would be a miracle :) i'll see if i can get someone to lend me a brand new device and maybe we can look to to see if it's there assuming apple doesnt zero out everyone iphone
Can I try it?
I really want to try this out on my iPhone 3G with jailbroken 2.2.1 firmware. Is it possible? Please send me an email: 
--Drumthrasher109 13:27, 10 March 2009 (UTC)
Buy one on eBay!
I know we're not the richest group of folks here, but one (or two) iPhone proto units is selling on eBay. It appears to be running burn-in from early 2007.
Seller of that protos has posted the filesystem dump of that proto at MacRumors, so it's not necessary to spend the cash on this. --Pjakuszew 08:00, 12 March 2009 (UTC)
Link to the MacRumors post?
Link to post with NOR dump: http://forums.macrumors.com/showpost.php?p=7249071&postcount=85
SkankPhone on iPod Touch
Is there someone who can try run the SkankPhone.app on iPod Touch? I'm curious how it will work on it. I posted necessary instructions here: http://forums.macrumors.com/showpost.php?p=7295097&postcount=158 --Pjakuszew 09:25, 18 March 2009 (UTC)
Hello iPhoneWiki, Does anyone no anything about BonFire within BurnIn?