Firmware decryption: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
mNo edit summary |
||
| Line 1: | Line 1: | ||
Understanding how the iPhone and iPod touch is encrypted and cracked is crucial to cracking the Nano's encryption. Apple is likely to have used very similar methods on the iPhone and iPod touch to the Nanos, especially the 4G. The 4G Nano is extremely similar to the iPod Touch 2G, sharing the same processor. | Understanding how the iPhone and iPod touch is encrypted and cracked is crucial to cracking the Nano's encryption. Apple is likely to have used very similar methods on the iPhone and iPod touch to the Nanos, especially the 4G. The 4G Nano is extremely similar to the iPod Touch 2G, sharing the same processor. | ||
==Helpful pages== | ==Helpful pages== | ||
http://home.gna.org/linux4nano/download/crypto_synth-1.0.pdf | |||
http://wikee.iphwn.org/ | http://wikee.iphwn.org/ | ||
http://iphonejtag.blogspot.com/ | http://iphonejtag.blogspot.com/ | ||
Revision as of 23:37, 13 March 2009
Understanding how the iPhone and iPod touch is encrypted and cracked is crucial to cracking the Nano's encryption. Apple is likely to have used very similar methods on the iPhone and iPod touch to the Nanos, especially the 4G. The 4G Nano is extremely similar to the iPod Touch 2G, sharing the same processor.
Helpful pages
http://home.gna.org/linux4nano/download/crypto_synth-1.0.pdf