[vimeo 2049219]
T-Mobile’s G1 was released last week and there has been at least one Android vulnerability announced already. The New York Times reported on research done by [Charlie Miller], who also helped find one of the first iPhone bugs, so we think the report is fairly credible. Last year, we saw him deliver a seminar on real world fuzzing at ToorCon 9. It covered exactly how they found the iPhone bug.
If you just want to use a G1 without service, you can activate it with any T-Mobile SIM card.
Above is Boing Boing Gadgets’ concise video review of Griffin AirCurve. It’s garbage. We first talked about it in our loaded horn post because it looked like something fun to redesign.
The iphone-dev team published a video today showing access to the iPhone’s baseband processor. They connect to the device over ssh and then use minicom to issue AT commands. They’re writing custom AT commands for full control.
Incorrect video for the post.
scratch that, just a useless video, for the useless part of the post
Useless is hackaday. I hate you now.
somebody is crushed. somewhere. don’t be a hater.
Every time a lamen lexicography fuzzing/pen testing article is published a hundred 4chan morons with automated attack frameworks are born…
oh no she at it again this is to EASY !!!!!! hahahaha
fa realz? g00diez let me see
Where is kander when you need him lmao
YEAH!!!! we watched… Last night dude…. I think she was talking to her…. B/F. Don’t forget fellers.
Yeah… But don’t get excited…it’s not like she was doing any thing she kind of just sat there…. Like she knew we was watching!?
u kinda look like adam from mythbusters
Interested and useful article. Already bookmarked this site, worth to visit again.
The quantity of Blackberry and iPhone user is keep growing day by day. Let’s stay in touch. Who will be the winner at the end?