SMART PHONE HACKING ROUNDUP

T-Mobile’s G1 was released last week as well as there has been at least one Android vulnerability announced already. The new York Times reported on research study done by [Charlie Miller], who likewise helped discover one of the very first iphone bugs, so we believe the report is relatively credible. Last year, we saw him provide a seminar on genuine world fuzzing at ToorCon 9. It covered precisely exactly how they discovered the iphone bug.

If you just want to utilize a G1 without service, you can activate it with any type of T-Mobile SIM card.

Above is Boing Boing Gadgets’ concise video evaluation of griffin AirCurve. It’s garbage. We very first talked about it in our loaded horn publish since it appeared like something fun to redesign.

The iphone-dev team published a video today showing gain access to to the iPhone’s baseband processor. They link to the gadget over ssh as well as then utilize minicom to problem AT commands. They’re composing customized AT commands for full control.

Leave a Reply

Your email address will not be published. Required fields are marked *