As we all know, the iPhone 4 was released back in Augest and it had the signal drop issue when holding the iphone's antenna gate...Apple, stated that the bumper they created can stop that issue and they are avaiable for free...After a couple of months the iPhone 4 was released again a different network which is Verizon and the antenna has moved from the bottom left to the top left (just above the silent switch) but the iPhone still suffers from signal drop and something new which is "Death Hug" and its when holding the iPhone 4 into landscape you cover both antennas so the signal drop and the celluar data stalls at a very minium speed of loading sites.
Watch the video below demonstrating the issues on the Verizon iPhone 4...
Stay tuned for more information at www.YouTube.com/TheStraightMusic
www.Tech-it.net
www.Twitter.com/TheStraightM
TheStraightMusic
Wednesday, February 9, 2011
Saturday, January 8, 2011
Annoucing BootUtility!
iPhone 3Gs(New Bootrom), iPhone 4 users have jailbroke their iPhones on iOS 4.2.1 but its tethered, BootUtility is a software that im working on that will be very useful for those users!
The Software Im Working On Is The Windows Version...
The Mac Version Will Be Avaiable 1 Week After The Official Release Of The Windows Version!
All Information Are Available On WWW.BootUtility.TK!
The Software Im Working On Is The Windows Version...
The Mac Version Will Be Avaiable 1 Week After The Official Release Of The Windows Version!
All Information Are Available On WWW.BootUtility.TK!
Saturday, October 2, 2010
How SHAtter Exploit Was Made!
In April 2010,
pod2g wrote a USB fuzzer and tested every single USB control message that could possibly be on his iPod touch 2G. The fuzzer found 2 vulnerabilities:
a heap overflow caused by usb_control_msg(0xA1, 1)
a way to dump the bootrom using USB descriptors request.
The team tested these two vulnerabilities on newer devices (iPhone 3GS, iPod touch 3G, iPad) and both were already fixed by Apple right away...but posixninja continued the fuzzing on these devices and found that with a particular sequence of USB messages it was possible to dump the BSS+Heap+Stack (on new devices only). Having a memory dump is a very helpful way in making exploits and it was also the first time we had this kind of dump. (Previous bootrom exploits like the 0x24000 Segment Overflow were done blind!)
Also, his first attemps to dump the memory resulted in rebooting the device. Interesting! This reboot is the basically the base of the SHAtter exploit.
Research began to figure out why the device would reboot. posixninja found the reason and proposed different ideas to exploit this. He also reversed tons of assembly code of the bootrom in this period, giving a support discussion to the team. We're not talking about days, but months of work. So, major props to posixninja: SHAtter would not have been possible without the clever vulnerability he found and the research he did on the bootrom.
In the meanwhile, pod2g helped on the USB reversing side and found a way to have more control over the size of the USB packets sent. The finer-grained control of the packet sizes is the key of SHAtter exploit arriving.
posixninja and pod2g worked on exploiting the vulnerability for days. Every attempt was a failure because the idea to attack the stack and bypass the IMG3 control routines was just impossible. It took them weeks to understand why they failed and why they couldn't exploit it this way.
They both gave up in July and focused on other subjects.
SHAtter exploit is known to be a tethered jailbreak. It is also known that SHAtter exploit is not a software exploit in-fact its a "Hardware" exploit that could allow you to jailbreak your device for life but tethered...Maybe after still working on the exploit it could turn into an Untethered exploit..but thats a possibility.
This is so far what we know of how SHAtter exploit arrived :-)
Stay tuned for more updates here at www.TheStraightMusic.blogspot.com!
pod2g wrote a USB fuzzer and tested every single USB control message that could possibly be on his iPod touch 2G. The fuzzer found 2 vulnerabilities:
a heap overflow caused by usb_control_msg(0xA1, 1)
a way to dump the bootrom using USB descriptors request.
The team tested these two vulnerabilities on newer devices (iPhone 3GS, iPod touch 3G, iPad) and both were already fixed by Apple right away...but posixninja continued the fuzzing on these devices and found that with a particular sequence of USB messages it was possible to dump the BSS+Heap+Stack (on new devices only). Having a memory dump is a very helpful way in making exploits and it was also the first time we had this kind of dump. (Previous bootrom exploits like the 0x24000 Segment Overflow were done blind!)
Also, his first attemps to dump the memory resulted in rebooting the device. Interesting! This reboot is the basically the base of the SHAtter exploit.
Research began to figure out why the device would reboot. posixninja found the reason and proposed different ideas to exploit this. He also reversed tons of assembly code of the bootrom in this period, giving a support discussion to the team. We're not talking about days, but months of work. So, major props to posixninja: SHAtter would not have been possible without the clever vulnerability he found and the research he did on the bootrom.
In the meanwhile, pod2g helped on the USB reversing side and found a way to have more control over the size of the USB packets sent. The finer-grained control of the packet sizes is the key of SHAtter exploit arriving.
posixninja and pod2g worked on exploiting the vulnerability for days. Every attempt was a failure because the idea to attack the stack and bypass the IMG3 control routines was just impossible. It took them weeks to understand why they failed and why they couldn't exploit it this way.
They both gave up in July and focused on other subjects.
SHAtter exploit is known to be a tethered jailbreak. It is also known that SHAtter exploit is not a software exploit in-fact its a "Hardware" exploit that could allow you to jailbreak your device for life but tethered...Maybe after still working on the exploit it could turn into an Untethered exploit..but thats a possibility.
This is so far what we know of how SHAtter exploit arrived :-)
Stay tuned for more updates here at www.TheStraightMusic.blogspot.com!
Saturday, August 21, 2010
iOS 4.1 Will Fix The iPhone 3G Performance issues!
Steve Jobs has reportedly responded to an email about performance issues with iOS 4 on the iPhone 3G.
-----
I've waited patiently through 4.0.1 and 4.0.2, looking for a fix that will make my phone work again. I've read the forums that advise me to jailbreak my phone or use some other method so I can downgrade back to a version of iPhone 3, however I'm not prepared to use a method that is not supported by Apple.
-----
Software update coming soon.
Sent from my iPhone
-----
It's likely that Jobs is referring to the iOS 4.1 firmware which is currently being tested by developers. This firmware is also thought to bring a fix for the iPhone 4 proximity issues.
-----
I've waited patiently through 4.0.1 and 4.0.2, looking for a fix that will make my phone work again. I've read the forums that advise me to jailbreak my phone or use some other method so I can downgrade back to a version of iPhone 3, however I'm not prepared to use a method that is not supported by Apple.
-----
Software update coming soon.
Sent from my iPhone
-----
It's likely that Jobs is referring to the iOS 4.1 firmware which is currently being tested by developers. This firmware is also thought to bring a fix for the iPhone 4 proximity issues.
Subscribe to:
Posts (Atom)