1. What happend?! I thought the unlock for basebands 02.10.01 & 03.10.01 would be released within the next 2 weeks?
As you know the Dev-Team (MuscleNerd) have been working on the unlock for quite a while now. They were making great progress on the unlock, but they found out that they (accidentally) unlocked “one particular SIM card” instead of the baseband itself. Which means that the unlock would only be an unlock you could use with MuscleNerd’s T-Mobile SIM. So, useless. If the unlock would unlock the baseband instead of “the SIM”, it’d probably be out within 2 weeks (reasonable timeframe which they had hoped). But things turned out to be different. Basically these <2 weeks predictions were a lack of information.
2. What is this NCK-key cracking? How does it work?
The NCK-key is the key generated by Apple if you’d officially unlock you iPhone, and with officially I mean, via your carrier. This “NCK-unlock” method is known over a few years now, actually since geohot started working on unlocking the iPhone 2G. He developed a program that could “crack” this 15 digits long key and unique for every device. Geohots NCKBF program could do around 100,000 keys/second which would produce a hit in many years, or complete a search in 317 years. To get to a point where this is actually doable we would need many orders of magnitude of improvement. Even if you use a PS3 (would we still want to use this??) or special hardware (within 1,000 US$ range) you will only get an improvement of 20-100 times.. which doesn’t help much.
Now, luckily, with the exploits they have now, they can’t unlock your baseband, but they *can* capture more information from the baseband to speed up this cracking process. Since the NORID and CHIPID (unique for every device) are known, you’d apparently only have to check 40 more bits (5 digits). A 40 bits key is theoretically crackable on “home hardware” within a week (24/7). The downside of this approach is that you’ll have to keep your computer turned on, and your iPhone has to be connected. And that is the reason why they never tried it before. Please note that this method is completely theorical and has been NOT tried at all till this moment.
New day new hopes!! After the announcement of no unlock for iPhone 4 in coming days, MuscleNerd is confirming that a new exploit (NCK Brute Force) has been discovered which is expected permanently unlock the iPhone 4 basebands. The code is yet to be tested out and currently in very premature stage. If it works out well, we can get a permanent unlock for iPhone 4.
To those patiently ignoring all the chatter from “promises” we never made comes a jewel: NCK unlock code is just 40 bits!NCK is a theoretical exploit which involves brute forcing the NCK from the seczone the CHIPID and the NORID. It cracks the unique NCK key of the device and provides a permanent unlock for the baseband. The concept is discovered by Geohot and it seems that the Dev Team is working on it. Veeence also updates about the new exploit.
(if turns out to be true, it’s unexpected surprise for those w/vuln BB’s. All the data is there for 40-bit brute force)
The NCK @MuscleNerd is talking about is the code that allows to unlock the baseband.Those who are living under the rocks, Musclenerd yesterday announced that Dev Team is going to release any unlock for iPhone 4 in near future. Hope this new exploit really comes out successful to unlock iPhone 4.
The exploit the got now gives you enough information to bruteforce crack your unique NCK key -> gives you an (official) permanent unlock.
Guys, relax, when there’s more info about what’s possible and whats not, I’ll put out a proper explanation. Right now it’s all pretty vague.
If this 40-bit thing is true, it’s (very much so!) the silver lining to all the blame-game stuff of last day’s tweets
@msalahmail 40b is far less than we expected. Given NOR and SGOLD chip ID (obtainable via hacks), 40 bits is trivial BF
@toromand 40 bits brute force is trivial if you can get your NOR and SGOLD chip IDs via current vulnerabilities
(if turns out to be true, it’s unexpected surprise for those w/vuln BB’s. All the data is there for 40-bit brute force)Lets help eachother find a working solution.http://www.guarforum.net/gsmreport/s...M-Get-Together
(if turns out to be true, it’s unexpected surprise for those w/vuln BB’s. All the data is there for 40-bit brute force)To those patiently ignoring all the chatter from “promises” we never made comes a jewel: NCK unlock code is just 40 bits!
No comments:
Post a Comment