[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTinTRkF0ImyduXZ5atzV6LcoC5VQqF8jGC7SEYVk@mail.gmail.com>
Date: Wed, 21 Jul 2010 11:47:42 -0400
From: Tyler Borland <tborland1@...il.com>
To: Michael Neal Vasquez <mnv@...mni.princeton.edu>
Cc: Full-Disclosure mailing list <full-disclosure@...ts.grok.org.uk>
Subject: Re: "Jailpassing" technique for iphones
Yes, same exact story with different software. Pretty much, the only
difference is the tool they chose to modify. There are a few webcasts
in which I saw when they came out, where that iPhone forensics book
guy does a good hour webcasts on what he did and what more is
possible. Two different modified tools to do forensics (including the
get rid of passcode trick). Even more if you include the Youtube
video that was linked in an earlier reply:
http://oreillynet.com/pub/e/949 - IPhone Forensics Demo
http://oreillynet.com/pub/e/1093 - iPhone Forensics 101: Bypassing the
iPhone Passcode
I still think the video was cool, however it didn't exactly offer
anything that wasn't available before. Just proving possibility with
newer techniques. More videos with more techniques is never a bad
thing.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists