Background info:- iPhone 8Gb Week 30, unlocked on firmware 1.0.2 using iUnlock from iphone.unlock.no. Extensive modification were done via Summerboard, Customise and Dock. Customisation include custom bar dialers, sliders, icons and ringer tones. iPhone was not returned to any semblance of the factory default looks/settings when these processes were done.
Here are the workflow for the entire process:-
Unlocked AnySIM/iUnlock 1.02 iPhone
==>Revirginize(either use my own as described here in this thread, or the Idiot-Proof Guide on Virginizing your iPhone at 1.0.2 )
==>Update to 1.1.1 via iTunes
==>Jailbreak(TIFF exploit + TouchFree or Carnaval by Brasuco
==>Unlock using AnySIM 1.1
RUJU's End result = a 1.1.1 updated unlocked iPhone!
Alternatively, you may also want to try this workflow for more automated process. Not tested by me, but reported to work by others. As always, proceed with caution.
Unlocked AnySIM/iUnlock 1.0.2 iPhone
==>Revirginize using the Idiot-Proof Guide on Virginizing your iPhone at 1.0.2 )
==>Update/Shift-Restore/"10-10 Reset" Restore to 1.1.1 via iTunes
==>Jailbreak via [url=http://www.hackint0sh.org/forum/showthread.php?t=12867]Carnaval by Brasuco[/url
==>Unlock using AnySIM 1.1
**I have not tested the Idiot-Proof Guide on Virginizing your iPhone at 1.0.2 OR Carnaval by Brasuco) to vouch for their effectiveness. Use these at your own risk.**
My own step-by-step installation process:-
Seczone Backup Process
This process ASSUMES that you already have an unlocked 1.0.2, in which in that process should already require you to install OpenSSH and BSD Subsystems to enable WinSCP to SSH into your iPhone.
1 - Download the Virginizer Pack from this link.
2 - Extract and copy the entire directory into iPhone. This is done via WinSCP. Place it under /usr/bin directory.
3 - Load up puTTy. Login into your iPhone with the similar login/password as WinSCP.
4 - Change directory to the Virginizer Pack directory by typing "cd /usr/bin/virginizer_pack"
5 - Unload CommCenter, so that you can proceed with the seczone dump by typing "launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist"
6 - Run the norz seczone dumper by typing " norz seczone.backup 0x3FA000 0x2000 ". You should see:-
CODE
# ./norz seczone.backup 0x3FA000 0x2000
geohot's nor dumper
all your norz are belong to us
super fast...just the way i like it
Dumping: A03E0000-A03EFFFF
Waiting for data...
Got Header: 77 0b cc
Increasing baud rate...
02 00 82 00 04 00 00 10 0E 00 A4 00 03 00
02 00 01 08 14 00 00 00 00 00 A4 00 03 00 09 00
00 00 33 2E 39 5F 4D 33 53 32 C3 0A 03 00
02 00 84 00 00 01 01 00 00 00 89 00 00 00 62 88
00 00 03 00 00 00 00 00 00 00 01 00 00 00 02 00
00 00 00 00 40 00 3F 00 00 00 00 00 01 00 08 00
00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 A6 03 03 00
02 00 85 00 02 00 FF FF 85 02 03 00
02 00 02 08 06 00 00 00 01 02 03 00 0E 08 03 00
Wrote: 0xa03e0000
Wrote: 0xa03e1000
Wrote: 0xa03e2000
Wrote: 0xa03e3000
Wrote: 0xa03e4000
Wrote: 0xa03e5000
Wrote: 0xa03e6000
Wrote: 0xa03e7000
Wrote: 0xa03e8000
Wrote: 0xa03e9000
Wrote: 0xa03ea000
Wrote: 0xa03eb000
Wrote: 0xa03ec000
Wrote: 0xa03ed000
Wrote: 0xa03ee000
Wrote: 0xa03ef000
Dumped
resetbaseband
geohot's nor dumper
all your norz are belong to us
super fast...just the way i like it
Dumping: A03E0000-A03EFFFF
Waiting for data...
Got Header: 77 0b cc
Increasing baud rate...
02 00 82 00 04 00 00 10 0E 00 A4 00 03 00
02 00 01 08 14 00 00 00 00 00 A4 00 03 00 09 00
00 00 33 2E 39 5F 4D 33 53 32 C3 0A 03 00
02 00 84 00 00 01 01 00 00 00 89 00 00 00 62 88
00 00 03 00 00 00 00 00 00 00 01 00 00 00 02 00
00 00 00 00 40 00 3F 00 00 00 00 00 01 00 08 00
00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 A6 03 03 00
02 00 85 00 02 00 FF FF 85 02 03 00
02 00 02 08 06 00 00 00 01 02 03 00 0E 08 03 00
Wrote: 0xa03e0000
Wrote: 0xa03e1000
Wrote: 0xa03e2000
Wrote: 0xa03e3000
Wrote: 0xa03e4000
Wrote: 0xa03e5000
Wrote: 0xa03e6000
Wrote: 0xa03e7000
Wrote: 0xa03e8000
Wrote: 0xa03e9000
Wrote: 0xa03ea000
Wrote: 0xa03eb000
Wrote: 0xa03ec000
Wrote: 0xa03ed000
Wrote: 0xa03ee000
Wrote: 0xa03ef000
Dumped
resetbaseband
This creates a file called seczone.backup in your /usr/bin/virginizer_pack directory.
6a- If this does not happen, and you come up to the case where you are waiting for a long time for the seczone dump, try this remedy.Close puTTY, load up WinSCP, set permission to 0766 to the file called "seczone.backup".This is done by right clicking on the file and setting "0766" as the number in the Octal field. Repeat Step 6 AGAIN and make sure you get the expected result as shown.[/color]
7 - Close puTTy, and load up WinSCP , navigate to /usr/bin/virginizer_pack, and copy the seczone.backup to a folder of your choice.
Virginizing: Press Start button!
1 - Run puTTy , log into your iPhone , and change directory by typing "cd /usr/bin/virginizer_pack"
2 - Run iUnlock, together with the .fls file and elliteloader.bin by typing "iUnlock ICE03.14.08_G.fls eliteloader.bin"
You will see:-
CODE
iUnlock v42.PROPER -- Copyright 2007 The dev team
Credits: Daeken, Darkmen, guest184, gray, iZsh, pytey, roxfan, Sam, uns, Zappaz, Zf
* Leet Hax not for commercial uses
Punishment: Monkeys coming out of your ass Bruce Almighty style.
Sending Begin Secpack command
Sending Erase command
Waiting For Erase Completion...
Sending Write command
00%
05%
15%
25%
35%
45%
55%
65%
75%
80%
90%
Sending End Secpack command
Validating the write command
FW are equal!
Completed.
Enjoy!
Credits: Daeken, Darkmen, guest184, gray, iZsh, pytey, roxfan, Sam, uns, Zappaz, Zf
* Leet Hax not for commercial uses
Punishment: Monkeys coming out of your ass Bruce Almighty style.
Sending Begin Secpack command
Sending Erase command
Waiting For Erase Completion...
Sending Write command
00%
05%
15%
25%
35%
45%
55%
65%
75%
80%
90%
Sending End Secpack command
Validating the write command
FW are equal!
Completed.
Enjoy!
3 - Update the baseband by typing this "bbupdater -v"
You will see:-
CODE
Resetting target...
pinging the baseband...
baseband unresponsive to pinging
Done
pinging the baseband...
baseband unresponsive to pinging
Done
Your seczone is now repaired.
4 - Reflash the 3.14.0 baseband firmware by typing this "bbupdater - f ICE03.14.08_G.fls -e ICE03.14.08_G.eep"
You will see this:-
CODE
Preparing to flash using /dev/tty.baseband at 750000 baud
Please reset target
Resetting target...
ProcessDetailUpdated: Boot-loader is active
ProcessDetailUpdated: EBL version: 3.9_M3S2 3..9
ProcessDetailUpdated: Boot mode is: CC
ProcessDetailUpdated: Baud rate set to 750000
ProcessDetailUpdated: Get flash id.
ProcessDetailUpdated: CFI stage 1
ProcessDetailUpdated: Flash ID is: 88620089
ProcessDetailUpdated: CFI stage 2
ProcessDetailUpdated: Boot process finished
ProcessOutlineUpdated: Reading SW version data
ProcessDetailUpdated: Receiving data.
ProgressUpdated: 100
ProcessDetailUpdated: Upload OK
ProcessOutlineUpdated: Process time was 133 msec.
Upgrade from to
Downloading EEP
ProcessOutlineUpdated: Start downloading from file ICE03.14.08_G.eep.
ProcessDetailUpdated: Sending sec-pack.
ProcessDetailUpdated: Load region 0
ProcessDetailUpdated: Sending end-pack.
ProcessDetailUpdated: Checksum OK.
ProcessDetailUpdated: Verify OK
ProcessOutlineUpdated: Process time was 1795 msec.
Downloading FLS
ProcessOutlineUpdated: Start downloading from file ICE03.14.08_G.fls.
ProcessDetailUpdated: Erasing the dynamic eeprom area
ProgressUpdated: 100
ProcessDetailUpdated: Sending sec-pack.
ProcessDetailUpdated: Load region 0
ProcessDetailUpdated: Sending data.
ProgressUpdated: 0
ProgressUpdated: 2
ProgressUpdated: 4
ProgressUpdated: 5
ProgressUpdated: 7
ProgressUpdated: 8
ProgressUpdated: 10
ProgressUpdated: 11
ProgressUpdated: 13
ProgressUpdated: 15
ProgressUpdated: 16
ProgressUpdated: 18
ProgressUpdated: 19
ProgressUpdated: 21
ProgressUpdated: 22
ProgressUpdated: 24
ProgressUpdated: 25
ProgressUpdated: 27
ProgressUpdated: 29
ProgressUpdated: 30
ProgressUpdated: 32
ProgressUpdated: 33
ProgressUpdated: 35
ProgressUpdated: 36
ProgressUpdated: 38
ProgressUpdated: 40
ProgressUpdated: 41
ProgressUpdated: 43
ProgressUpdated: 44
ProgressUpdated: 46
ProgressUpdated: 47
ProgressUpdated: 49
ProgressUpdated: 50
ProgressUpdated: 52
ProgressUpdated: 54
ProgressUpdated: 55
ProgressUpdated: 57
ProgressUpdated: 58
ProgressUpdated: 60
ProgressUpdated: 61
ProgressUpdated: 63
ProgressUpdated: 65
ProgressUpdated: 66
ProgressUpdated: 68
ProgressUpdated: 69
ProgressUpdated: 71
ProgressUpdated: 72
ProgressUpdated: 74
ProgressUpdated: 75
ProgressUpdated: 77
ProgressUpdated: 79
ProgressUpdated: 80
ProgressUpdated: 82
ProgressUpdated: 83
ProgressUpdated: 85
ProgressUpdated: 86
ProgressUpdated: 88
ProgressUpdated: 90
ProgressUpdated: 91
ProgressUpdated: 93
ProgressUpdated: 94
ProgressUpdated: 96
ProgressUpdated: 97
ProgressUpdated: 99
ProgressUpdated: 100
ProcessDetailUpdated: Load region 1
ProcessDetailUpdated: Sending data.
ProgressUpdated: 0
ProgressUpdated: 1
ProgressUpdated: 2
ProgressUpdated: 3
ProgressUpdated: 4
ProgressUpdated: 5
ProgressUpdated: 6
ProgressUpdated: 7
ProgressUpdated: 8
ProgressUpdated: 9
ProgressUpdated: 10
ProgressUpdated: 11
ProgressUpdated: 12
ProgressUpdated: 13
ProgressUpdated: 14
ProgressUpdated: 15
ProgressUpdated: 16
ProgressUpdated: 17
ProgressUpdated: 18
ProgressUpdated: 19
ProgressUpdated: 20
ProgressUpdated: 21
ProgressUpdated: 22
ProgressUpdated: 23
ProgressUpdated: 24
ProgressUpdated: 25
ProgressUpdated: 26
ProgressUpdated: 27
ProgressUpdated: 28
ProgressUpdated: 29
ProgressUpdated: 30
ProgressUpdated: 31
ProgressUpdated: 32
ProgressUpdated: 33
ProgressUpdated: 34
ProgressUpdated: 35
ProgressUpdated: 36
ProgressUpdated: 37
ProgressUpdated: 38
ProgressUpdated: 39
ProgressUpdated: 40
ProgressUpdated: 41
ProgressUpdated: 42
ProgressUpdated: 43
ProgressUpdated: 44
ProgressUpdated: 45
ProgressUpdated: 46
ProgressUpdated: 47
ProgressUpdated: 48
ProgressUpdated: 49
ProgressUpdated: 50
ProgressUpdated: 51
ProgressUpdated: 52
ProgressUpdated: 53
ProgressUpdated: 54
ProgressUpdated: 55
ProgressUpdated: 56
ProgressUpdated: 57
ProgressUpdated: 58
ProgressUpdated: 59
ProgressUpdated: 60
ProgressUpdated: 61
ProgressUpdated: 62
ProgressUpdated: 63
ProgressUpdated: 64
ProgressUpdated: 65
ProgressUpdated: 66
ProgressUpdated: 67
ProgressUpdated: 68
ProgressUpdated: 69
ProgressUpdated: 70
ProgressUpdated: 71
ProgressUpdated: 72
ProgressUpdated: 73
ProgressUpdated: 74
ProgressUpdated: 75
ProgressUpdated: 76
ProgressUpdated: 77
ProgressUpdated: 78
ProgressUpdated: 79
ProgressUpdated: 80
ProgressUpdated: 81
ProgressUpdated: 82
ProgressUpdated: 83
ProgressUpdated: 84
ProgressUpdated: 85
ProgressUpdated: 86
ProgressUpdated: 87
ProgressUpdated: 88
ProgressUpdated: 89
ProgressUpdated: 90
ProgressUpdated: 91
ProgressUpdated: 92
ProgressUpdated: 93
ProgressUpdated: 94
ProgressUpdated: 95
ProgressUpdated: 96
ProgressUpdated: 97
ProgressUpdated: 98
ProgressUpdated: 99
ProgressUpdated: 100
ProcessDetailUpdated: Sending end-pack.
ProcessDetailUpdated: Checksum OK.
ProcessDetailUpdated: Verify OK
ProcessOutlineUpdated: Process time was 1 min 52 sec.
Resetting target...
pinging the baseband...
issuing +cpwroff...
Done
Please reset target
Resetting target...
ProcessDetailUpdated: Boot-loader is active
ProcessDetailUpdated: EBL version: 3.9_M3S2 3..9
ProcessDetailUpdated: Boot mode is: CC
ProcessDetailUpdated: Baud rate set to 750000
ProcessDetailUpdated: Get flash id.
ProcessDetailUpdated: CFI stage 1
ProcessDetailUpdated: Flash ID is: 88620089
ProcessDetailUpdated: CFI stage 2
ProcessDetailUpdated: Boot process finished
ProcessOutlineUpdated: Reading SW version data
ProcessDetailUpdated: Receiving data.
ProgressUpdated: 100
ProcessDetailUpdated: Upload OK
ProcessOutlineUpdated: Process time was 133 msec.
Upgrade from to
Downloading EEP
ProcessOutlineUpdated: Start downloading from file ICE03.14.08_G.eep.
ProcessDetailUpdated: Sending sec-pack.
ProcessDetailUpdated: Load region 0
ProcessDetailUpdated: Sending end-pack.
ProcessDetailUpdated: Checksum OK.
ProcessDetailUpdated: Verify OK
ProcessOutlineUpdated: Process time was 1795 msec.
Downloading FLS
ProcessOutlineUpdated: Start downloading from file ICE03.14.08_G.fls.
ProcessDetailUpdated: Erasing the dynamic eeprom area
ProgressUpdated: 100
ProcessDetailUpdated: Sending sec-pack.
ProcessDetailUpdated: Load region 0
ProcessDetailUpdated: Sending data.
ProgressUpdated: 0
ProgressUpdated: 2
ProgressUpdated: 4
ProgressUpdated: 5
ProgressUpdated: 7
ProgressUpdated: 8
ProgressUpdated: 10
ProgressUpdated: 11
ProgressUpdated: 13
ProgressUpdated: 15
ProgressUpdated: 16
ProgressUpdated: 18
ProgressUpdated: 19
ProgressUpdated: 21
ProgressUpdated: 22
ProgressUpdated: 24
ProgressUpdated: 25
ProgressUpdated: 27
ProgressUpdated: 29
ProgressUpdated: 30
ProgressUpdated: 32
ProgressUpdated: 33
ProgressUpdated: 35
ProgressUpdated: 36
ProgressUpdated: 38
ProgressUpdated: 40
ProgressUpdated: 41
ProgressUpdated: 43
ProgressUpdated: 44
ProgressUpdated: 46
ProgressUpdated: 47
ProgressUpdated: 49
ProgressUpdated: 50
ProgressUpdated: 52
ProgressUpdated: 54
ProgressUpdated: 55
ProgressUpdated: 57
ProgressUpdated: 58
ProgressUpdated: 60
ProgressUpdated: 61
ProgressUpdated: 63
ProgressUpdated: 65
ProgressUpdated: 66
ProgressUpdated: 68
ProgressUpdated: 69
ProgressUpdated: 71
ProgressUpdated: 72
ProgressUpdated: 74
ProgressUpdated: 75
ProgressUpdated: 77
ProgressUpdated: 79
ProgressUpdated: 80
ProgressUpdated: 82
ProgressUpdated: 83
ProgressUpdated: 85
ProgressUpdated: 86
ProgressUpdated: 88
ProgressUpdated: 90
ProgressUpdated: 91
ProgressUpdated: 93
ProgressUpdated: 94
ProgressUpdated: 96
ProgressUpdated: 97
ProgressUpdated: 99
ProgressUpdated: 100
ProcessDetailUpdated: Load region 1
ProcessDetailUpdated: Sending data.
ProgressUpdated: 0
ProgressUpdated: 1
ProgressUpdated: 2
ProgressUpdated: 3
ProgressUpdated: 4
ProgressUpdated: 5
ProgressUpdated: 6
ProgressUpdated: 7
ProgressUpdated: 8
ProgressUpdated: 9
ProgressUpdated: 10
ProgressUpdated: 11
ProgressUpdated: 12
ProgressUpdated: 13
ProgressUpdated: 14
ProgressUpdated: 15
ProgressUpdated: 16
ProgressUpdated: 17
ProgressUpdated: 18
ProgressUpdated: 19
ProgressUpdated: 20
ProgressUpdated: 21
ProgressUpdated: 22
ProgressUpdated: 23
ProgressUpdated: 24
ProgressUpdated: 25
ProgressUpdated: 26
ProgressUpdated: 27
ProgressUpdated: 28
ProgressUpdated: 29
ProgressUpdated: 30
ProgressUpdated: 31
ProgressUpdated: 32
ProgressUpdated: 33
ProgressUpdated: 34
ProgressUpdated: 35
ProgressUpdated: 36
ProgressUpdated: 37
ProgressUpdated: 38
ProgressUpdated: 39
ProgressUpdated: 40
ProgressUpdated: 41
ProgressUpdated: 42
ProgressUpdated: 43
ProgressUpdated: 44
ProgressUpdated: 45
ProgressUpdated: 46
ProgressUpdated: 47
ProgressUpdated: 48
ProgressUpdated: 49
ProgressUpdated: 50
ProgressUpdated: 51
ProgressUpdated: 52
ProgressUpdated: 53
ProgressUpdated: 54
ProgressUpdated: 55
ProgressUpdated: 56
ProgressUpdated: 57
ProgressUpdated: 58
ProgressUpdated: 59
ProgressUpdated: 60
ProgressUpdated: 61
ProgressUpdated: 62
ProgressUpdated: 63
ProgressUpdated: 64
ProgressUpdated: 65
ProgressUpdated: 66
ProgressUpdated: 67
ProgressUpdated: 68
ProgressUpdated: 69
ProgressUpdated: 70
ProgressUpdated: 71
ProgressUpdated: 72
ProgressUpdated: 73
ProgressUpdated: 74
ProgressUpdated: 75
ProgressUpdated: 76
ProgressUpdated: 77
ProgressUpdated: 78
ProgressUpdated: 79
ProgressUpdated: 80
ProgressUpdated: 81
ProgressUpdated: 82
ProgressUpdated: 83
ProgressUpdated: 84
ProgressUpdated: 85
ProgressUpdated: 86
ProgressUpdated: 87
ProgressUpdated: 88
ProgressUpdated: 89
ProgressUpdated: 90
ProgressUpdated: 91
ProgressUpdated: 92
ProgressUpdated: 93
ProgressUpdated: 94
ProgressUpdated: 95
ProgressUpdated: 96
ProgressUpdated: 97
ProgressUpdated: 98
ProgressUpdated: 99
ProgressUpdated: 100
ProcessDetailUpdated: Sending end-pack.
ProcessDetailUpdated: Checksum OK.
ProcessDetailUpdated: Verify OK
ProcessOutlineUpdated: Process time was 1 min 52 sec.
Resetting target...
pinging the baseband...
issuing +cpwroff...
Done
To check if your baseband firmware is flashed properly, type "bbupdater -v"
You will see this:-
CODE
Resetting target...
pinging the baseband...
issuing +xgendata...
firmware: DEV_ICE_MODEM_03.14.08_G
eep version: EEP_VERSION:207
eep revision: EEP_REVISION:7
bootloader: BOOTLOADER_VERSION:3.9_M3S2
Done
pinging the baseband...
issuing +xgendata...
firmware: DEV_ICE_MODEM_03.14.08_G
eep version: EEP_VERSION:207
eep revision: EEP_REVISION:7
bootloader: BOOTLOADER_VERSION:3.9_M3S2
Done
Revirginizing process complete!
Alternatively, there is also an Idiot-Proof Guide on Virginizing your iPhone at 1.0.2 available. Looking at it's pictorial results, looks the same, except it is set in a wizard-like environment, so n00bs will feel more comfortable, rather than playing around with command lines. This may be easier for n00bs , but i cannot vouch for the authenticity or the result of you following this process. As always, proceed at your own discretion/risk.
ADDENDUM: A revirginized 1.0.2 iPhone, at this stage, will not necessary mean that it will look like how it came out of the box when you first got it. You may still have your Summerboard theme installed, with customised icons and other modifications to the looks. What this process does is that it returns the iPhone, particularly its baseband and seczone data, modified during the previous unlocking process, back to how it is when it came out of the box. Do not be alarmed when you see that you still see it looking the same as before, the internal restoration/virginization has been applied. To certify this, your iPhone now will display "Incorrect SIM" after the virginization process, which is reflective of what would happen when you have unlocked your iPhone to an AT&T sim card, but inserted any other sim card instead.
Update to 1.1.1 via iTunes
What you need to do next is go back into iTunes and click that Update button, or Shift-Update if you already have the file on your desktop. Once iTunes has updated your iPhone, it will return you to the Activation screen again, but this time it's already 1.1.1.
Jailbreaking: Prologue
You then follow with the initial part of the jailbreaking.
1. Slide to reach the emergency dial screen
2. Enter *#307# and then press call
3. Your phone will ring itself, make sure the dialed number on top of the screen is "O", then hit call again, press answer.
4. Press hold now and your phone will start ringing again
5. Press Dismiss and your phone will go into the contacts/dial screen
6. Press contacts from the bottom bar and add a contact
7. Add a contact with a random name and homepage as >> prefs://1F <--This is to get into the Settings page
8. Save it and click on the contact's homepage. this will take you straight into the setting menu of the iPhone, and you can take all the time to select a WIFI network! **It is recommended for you to turn on the Auto-Lock to NEVER, so that you get a steady, strong Wifi signal when you are using WinSCP and puTTy.**
Leave your phone like that now for a minute or two. Then shut down your iphone and restart.
8b. After the iPhone restarts it should have the Wifi icon showing at the top...if it does not do steps 1 - 8 again. If you do this right, your iPhone will remember your network and log into it automatically.
9. Once the wifi is working, do steps 1 - 5 again.
9a. For the next step add another contact give it another name and this time add the address as >> http://jailbreak.toc2rta.com/
10. Save the contact and then go to the 2nd url you just saved. Safari will load the page and then close automatically to the home screen (the screen that says activate iphone).
This is the TIFF exploit. You can now proceed to install TouchFree.
Jailbreaking :Touchfree
Get TouchFree (it works on iPhone too) http://www.slovix.com/touchfree/touchfree-setup.exe (Get/Install .Net Framework 3.0 before you move on)
***If you are having trouble with touch free (like it gets stuck at step 2 and stuff, uninstall the old version and use this one : http://www.slovix.com/touchfree/touchfree-alpha.exe)
- Follow the steps on TouchFree (You have to shut down the iPhone 2 times during this process, it will tell you to do it even after the 2nd time you have done it but ignore that and close the program!)
- After touchfree finishes you should restart your iphone and get to the springboard
- Set auto-lock on your phone as "never" (on your iphone: Settings > General > Auto-Lock > Never)
You need to install OpenSSH and BSD Subsystem via Installer before you use WinSCP to SSH into your iPhone. This will enable you to login into your iPhone*many thanks to wideawake.
- Now get WinSCP (http://winscp.net/download/winscp404setup.exe)
You can find your iphone ip by going to (on your iphone) settings > Wi-Fi > "Your selected WiFi" > Look under IP Address
- Connect to your iPhone using WinSCP (user: root password: alpine)

Just press login after your screen on WinScp is like this ^
- Get AnySIM 1.1 (http://conceitedsoftware.com/iphone/anySIM-1.1.zip)
- Upload AnySIM 1.1 to the /Applications folder (Make sure both the folder anySim.app and the file inside that folder named anysim are chmodded to 0755)
Make sure the directory anySim.app and the FILE named "anysim" inside the directory are chmodded to 0755!!
*To "chmod" in WinSCP, log into your iPhone, select the files/folders needed to be "chmodded", and set their permission to "0755".
- Download this file http://rapidshare.com/files/63229501/killall.html
- Upload it to your /usr/bin folder (on the iphone)
- Set permissions to 0655 via WinSCP(if you get problems later, try setting them to 0755)
- Run Installer from your springboard
- Install BSD Subsystem from Installer
- Restart your phone
Unlocking 1.1.1 using AnySim 1.1
- Run anySIM 1.1 (MAKE sure your new simcard in inserted) (IF ANYSIM CRASHES, CHMOD the ANYSIM FILES AS STATED at step marked in gray)
- Restart your phone again
- Get this file: http://rapidshare.com/files/63231299/lockdownds.zip.html
- Upload the three files to your /usr/libexec folder on your iphone
- Set permissions to 0755 via WinSCP to these three files
- Rename the file called lockdownd on your /usr/libexec folder to lockdownd.back
- Rename the file lockdownd.1.0.2 to lockdownd
- Download iAsign (http://rapidshare.com/files/64056361/iasign.zip)
*You may need this dlls to run iAsign http://rapidshare.com/files/63351413/iasign-dlls.zip.html
- There is a file called iphoneactivation.pem under the /iAsign/bin/ folder of the zip you just downloaded
- Uploaded to your iphone, to the folder /System/Library/Lockdown
- Get Putty from here http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe
- Connect to your iPhone using putty (user: root password: alpine)
- Run this command without the quotes "killall lockdownd"
- Extract the iasign folder to your C:/ Drive (That folder can be found in this file >> http://d.turboupload.com/d/2098918/unlock111.zip.html)
- Open a command line in your pc (Start menu > Run > cmd)
- Navigate to the folder where you have iasign.exe (This means you need to point the command prompt to the iasign folder):

- Now run this command from the command line "iasign --automatic iPhoneActivation_private.pem"
- Your iphone should popup a message telling you that it is Activated
- Now rename lockdownd to lockdownd.1.0.2 using WinSCP (This is in /usr/libexec)
- Now rename lockdownd.swap to lockdownd using WinSCP (This is in /usr/libexec)
- Run this command without the quotes "killall lockdownd" on putty
- Restart your phone
- And it should be unlocked by now
Alternate YouTube Activation:
Just upload youtube certificate files (data_ark.plist, device_private_key.pem and device_public_key.pem) to /var/root/Library/Lockdown/
You can find the files here: http://rapidshare.com/files/58461644/youtube.zip.html
After reinstalling, recustomising and syncing everything back, the end result:-

Good luck!
This post has been edited by stringfellow: Nov 2 2007, 12:19 AM
Oct 24 2007, 04:06 PM, updated 19y ago
Quote
0.0279sec
0.31
5 queries
GZIP Disabled