IPhone 2.1 Firmware Jailbroken

The iphone-dev team seems to still be on top of their game. Only a day after the iPhone 2.1 firmware update was released, they’ve updated both the PwnageTool and QuickPwn to deal with the release. They haven’t begun work on the iPod Touch 2G yet, since no one on the team has one yet.

We tend to agree with Engadget; jailbreaking is becoming less and less important to casual users. Now average users can buy an iPhone in their own country and run apps from the official store. A much different place than we were only a year ago. We know most of our audience are power users though and definitely want out of Apple’s walled garden, but that’s only a small percentage of iPhone users.

Bypassing The IPhone Passcode Lock In Live Webcast

[Jonathan Zdziarski], a data forensics expert and iPhone hacker, will demonstrate in a live O’Reilly webcast on September 11, 2008, how to bypass the iPhone passcode lock security. Although the presentation is targeted towards law enforcement, it will probably viewed by a lot of hackers and geeks, who could use the information for good or evil. It also doesn’t strike us as very good security if the iPhone passcode is easily bypassed. Then what’s the point of having one?

[via Gizmodo]

The Phone Phreaking Files

[Jason Scott] curated a nice collection of links related to [Phil Lapsley]’s work on phone phreaking. [Lapsley]’s book, The History of Phone Phreaking, will be released in 2009. Meanwhile phone phreak enthusiasts can peruse his site and bone up on some interesting material, including documents that revealed the inner workings of the telephone switchboard(PDF), and the Youth International Party Line (YIPL)/Technological American Party (TAP) FBI files(PDF), which is really intriguing for the various doodles and conversations that were documented. If you have some spare time, we definitely recommend sifting through it.

[via Waxy]

Macro Photography With An IPhone


The camera lens on the iPhone is much like any other cameraphone lens in the fact that the lens has a fixed minimum and maximum focus length. If you want to get a little closer to your subject, you just might want to give [eastrain’s] macro camera mod a try.

According to [eastrain] both first and second generation iPhone cameras have a screw type focus ring that has been glued to infinity from the factory. This was probably set so that 99% of your photos were roughly in focus.

Gaining access to the camera lens requires the disassembly of your phone and will undoubtedly void any type of warranty you may have had. Once the lens is in view you will need to break the 2 glue points that hold the lens at its current position.

Using needle nose pliers you can then rotate the lens counter clockwise to increase the zoom or clockwise to decrease it. Enabling the built in camera app allows you to see in real time your changes. When you’re satisfied, just put everything back together. Of course the next step should be an externally mounted ring to allow manual zooming on the fly.

Security Flaw Allows Full Access To Locked IPhones

[greenmymac] on the MacRumors forums recently exposed a security flaw that allows anyone full access to a locked iPhone running firmware version 2.0.2. The flaw works by entering the emergency call menu of a locked iPhone, and double tapping the home button. This opens the iPhone’s Favorites menu, allowing anyone in your Favorites to be called. From here, an attacker has access to your SMS messages and potentially your email or Safari browser. While we are sure that Apple has a patch for this flaw on the way in the next firmware update, there is a temporary way to secure your locked iPhone. Simply enter the Settings menu on your iPhone and enter General > Home Button and select “Home” or “iPod”. Now when you double tap your home button, it will navigate to either your home screen or the iPod screen. While this fix might be annoying for some, as of right now it seems like the only way to secure your locked iPhone.

[photo: Refracted Moments™]

[via Gizmodo]

FEMA Phone System Hacked


Over the weekend, a hacker broke into FEMA’s new PBX voicemail system, made over 400 overseas phone calls to Asia and the Middle East, and ran up a $12,000 bill. The low tech hack took advantage of a “hole” that was not covered when a contractor upgraded the voicemail system. FEMA is currently conducting its own internal investigation, but FEMA spokesman [Tom Olshanski] did not have any information about the contractor responsible or what specific hole was the cause of the breach. Ironically, Homeland Security, of which FEMA is a part, had issued a warning in 2003 about the very same vulnerability.

[photo: silas216]