Unlock iPhone 4, iOS 4.3, 4.2.1 On 2.10.04, 3.10.01 Using Gevey SIM Interposer [Demo Video]!

by Jawwad in iPhone, Mobile, News | 0 comments


iPhone 4 Unlock | Unlock iPhone 4, iOS 4.3, 4.2.1 On 2.10.04, 3.10.01 Using Gevey SIM Interposer [Demo Video]!

Well, folks despite the promising clues here & there we are still waiting for an unlock of the iPhone 4 on the baseband 2.10.04 and 3.10.01 for iOS 4.3. It seems that Gevey team has come up with a clever way to unlock the iPhone 4 if you have one of these baseband on iOS 4.3. Basically, it works by forcing the activation of the baseband using the emergency dialer,in iOS 4.3.

@MuscleNerd from iPhone Dev. fame has this to say about this so far:

image34 | Unlock iPhone 4, iOS 4.3, 4.2.1 On 2.10.04, 3.10.01 Using Gevey SIM Interposer [Demo Video]!

There are of course questions about the legality of such an unlocking mechanism.

Singularity has a nice details on the working mechanism of this method:

How did It Work?
SIM card holds many different types of information, but the part most involved with carrier lock is the IMSI number, which is a unique code that corresponds to your account in the mobile carrier’s database. 
A sample IMSI might look like this
310 150 987654321
The first two segments are known as Mobile Country Code (MCC) and Mobile Network Code (MNC) respectively, and in the example above the IMSI indicate the SIM is from USA (310) AT&T (150).
When the iPhone baseband is loaded into memory, it checks the MCC and MNC against its own network lock state stored in the seczone. If the combination is allowed, the cell radio is activated and vice versa.
The earliest iPhone baseband revisions only check IMSI twice following a restart, therefore it is very easy to send spoof information in order to bypass the check. Nevertheless, the baseband was soon updated to validate SIM more aggressively and the method soon became obsolete.

The Long Con
To guard against eavesdropping that plagued pre-GSM cellular networks, the initial connection to a network does not only involve IMSI, but a 4-byte TMSI to identify each handset before IMSI is sent processed.
The base station then send a 16-byte nonce to the handset, where is signed with a 128bit DES key (Ki, stored encrypted on the SIM) and sent back. The network checked the string against their database and allow that number to connect to the network.
You see, the IMSI is not essential; as long as your key is valid, you will be able to get service. This is exactly what the various SIM hacks where a fake IMSI is sent along with the correct key. The IMSI is redirected to another network and lost, and the signed nonce usually allows you to register (without cross-checking IMSI)
With this technique, "Data Roaming" needs to be enabled to allow data connection because the baseband is acting on the assumption that the phone is roaming however the network do correctly recognise the phone as a home user.

What does it mean to unlockers?

  1. It works if A.your network handles 112 calls properly according to the GSM standard; B.they are tolerant to TSMI spoofing and does not actively validate your SIM again for incoming calls.
  2. Unlike its ancestors, the i4 SIM interposer is not a drop-in-and-forget device. The exact precedure must be performed should the device restart, lose reception for an extended period of time or move to another PLMN. In all situations the TMSI expires and has to be obtained again. Theoretically it is possible for a daemon to automate the process similar to ZeroG, but that only makes thing more convoluted.
  3. It is, without question, unethical or downright illegal to use the technique anywhere 112 is a legitmate emergency number. Not a huge issue in China where the number is only used for informative purpose; the providers has no immediate incentive to fix the loophole. 
  4. All firmware/baseband combinations for the i4 up to iOS4.3 are vulnerable, however the exploit may be patched in any future software updates or via the carrier. If apple can influence providers to block Cydia it is not impossible for them to press them to fix the exploit. The only way to permanently unlock your baseband is via NCK.
  5. SIM interposer should not harm your phone hardware, however your network could request IMEI and identify your device during the emergency call. Your identity cannot be faked and it is possible that they will ban your account. There is a reason why SIM cards remain legally the property of the service provider: you are not supposed to tamper with them without breaching contract.
  6. Notwithstanding all the problems, SIM interposer does not cause any battery drain since it is only active transiently, nor would it cause signal loss because it does not change cellular transmission other than the initial validation step.

 

 

Well this method to unlock iPhone 4 is not recommended at all particularly because of it’s legal status unless you are really impatient and can’t wait for a better software solution to the iPhone 4 unlock.

See the embedded video below for more details:

[Source]

You Might Like:




Get Free Email Updates


Inspired Geek is your primary source for latest tech news, guides and articles on Windows software, games, Apple and Android devices.


  • Get extensive coverage on latest tech news.
  • Exclusive guides on rooting, jailbreaking and unlocking mobile devices.
  • Useful apps and tips&tricks for your iOS and Android devices.
  • Exlclusive Top Countdowns for the best software.

This post was written by...

for Inspired Geek.

Hi! We are trying our best to make this spot most interesting and useful for discovering news, articles, tips & tricks and bringing you the latest in Computer, Mobile and Internet technology areas. Please support our efforts by giving your feedback, subscribing to Inspired Geek RSS (Link on top & bottom of the page), by promoting us on social websites (Facebook, Digg, Twitter, StumbleUpon etc.) or any other way you might feel convenient. Thanks for your support!

Previous post:

Next post:

wordpress counter