25C3: Hacking The IPhone

[googlevideo=http://video.google.com/videoplay?docid=713763707060529304]

As promised in their yellowsnow demo, [pytey], [MuscleNerd], and [planetbeing] from the iphone-dev team presented at 25C3 on their work Hacking the iPhone. The team originally formed in 2007 and this is the most comprehensive presentation on how the iPhone was compromised to date. You can find the full talk embedded above.

Continue reading “25C3: Hacking The IPhone”

Flash For Jailbroken IPhones

flashiphone

Hackers are continuing to outpace Apple with feature additions. The team at iMobileCinema has created a flash plugin for the Mobile Safari browser. It’s a beta release and still a bit buggy. This app is only available to people who have jailbroken their iPhones. You just need to add d.imobilecinema.com to your sources in Cydia to get the package to appear. While it can crash from time to time, it’s certainly better than no support at all.

[via Gizmodo]

IPhone Controlled Dog Treat Dispenser

[youtube=http://www.youtube.com/watch?v=8L3hdPxMa_o]

[Stephen Myers] has been toying around with some beta ioBridge hardware. He decided to build a remote control dog treat dispenser. ioBridge‘s hardware is built specifically to make web enabling projects easy. The main controller board has four I/O channels that speak to addon modules. It has an ethernet port on the main board and an easy to configure website.

[Stephen] used a servo addon board for his project. The dispenser is built from a scrap CD spindle attached to a servo. He can issue commands from his iPhone, which shows live video of the kennel. He’ll be building several other automation projects based on this system.

[via TUAW]

IPhone Linux

[vimeo 2373142]

Embedded above is a demo video of an iPhone running a Linux 2.6 kernel. The iphone-dev team has created a new bootloader called OpeniBoot. The bootloader lets you boot into a Linux console, which you can talk to over a USB serial device. They’ve got busybox working, but there is no touchscreen support yet. The instructions are not that difficult and include how to back up your settings. It works on first and second gen iPhones and first gen iPod Touch. This is a very early port, but the future is wide open… Android iPhone?

DuiPhone Hack

[vimeo http://vimeo.com/2286835%5D

Tellart turned an iPhone into a duiPhone with its latest Sketchtools kit. Combine a 3G iPhone, an ordinary store-bought breathalyzer, and the NADA Mobile, which consists of a communication board, sensors, and actuators, and get a useful iPhone application. Blow into the mouthpiece, and the iPhone will inform you if you can safely drive, or if you should call a cab.

We’d like to find out more about the NADA Mobile, since it looks like it could be the start of a lot of fun projects. It’s the latest of Tellart’s Sketchtools line, which can only be accessed if you work with Tellart as a consultant, or if you work with them to organize a workshop for your organization.

[via Digg]

Iphone-dev Team 3G Soft Unlock Coming Soon

[vimeo 2291914]

The iphone-dev team has officially stated “all that remains is implementation“. They’ve developed all the pieces they need to perform a software unlock for the iPhone 3G, now it’s just a matter of putting them together in user friendly fashion. They’ve managed to run unsigned code on the baseband, developed custom AT tools, and are now showing injection of a background task. They will combine all of these techniques to override the carrier lock baseband code. As usual, they warn against performing any official firmware updates to the phone.

Reversing Google’s IPhone Voice Search

Google recently updated their Google Mobile App with a couple new features. Voice Search automatically starts listening when you raise the phone to your ear. Just say what you’re looking for, and it will poll Google and return the results. The app leverages Google’s voice recognition engine, which they’ve been training with Goog-411. [Andy Baio] has been experimenting with audio transcription and was curious what the new app was doing behind the scenes. He started by sniffing the packets as they traversed his network. Unfortunately, the size of the data packets transmitted is so small that he’s almost certain he’s missing something. He’d appreciate any help in this endeavor. Part of the problem might be Google getting special treatment and using undocumented iPhone SDK features.