Difference between revisions of "Firmware decryption"
Line 4: | Line 4: | ||
http://code.google.com/p/iphone-elite/w/list | http://code.google.com/p/iphone-elite/w/list | ||
+ | |||
+ | http://code.google.com/p/chronicdev/w/list | ||
http://wikee.iphwn.org/ | http://wikee.iphwn.org/ | ||
http://iphonejtag.blogspot.com/ | http://iphonejtag.blogspot.com/ |
Revision as of 02:43, 27 March 2009
Understanding how the iPhone and iPod touch is encrypted and cracked is crucial to cracking the Nano's encryption. Apple is likely to have used very similar methods on the iPhone and iPod touch to the Nanos, especially the 4G. The 4G Nano is extremely similar to the iPod Touch 2G, sharing the same processor.
Helpful pages
http://home.gna.org/linux4nano/download/crypto_synth-1.0.pdf
http://code.google.com/p/iphone-elite/w/list