That purported new iPhone backing has decided to show off its taller, slimmer, self again — this time in a full 360-degree video from parts reseller, ETradeSupply. It doesn’t reveal much more than what we got to see in those initial photos: a relocated headphone socket, two-tone surface and a much smaller dock connector.
We’ve just received word of a spicy strategy change, to be enacted this Sunday, that’s sure to please the AT&T iPhone-loving masses. On Easter, select Ma’ Bell customers with iPhones — those off-contract with accounts in good standing — will be able to request a carrier unlock for their device. Once freed, any micro-SIM can be used — provided its carrier’s frequencies are supported — by the smartphone. An AT&T spokesperson was able to confirm that “a policy change concerning iPhones” would indeed be rolled-out on Sunday, but declined to elaborate further. That sound you hear? International Love, being quietly spun from the corner office of Ralph de la Vega.
Sherif Hashim, the guy who found the exploit to unlock 05.12.01 / 05.13.04 baseband on iPhones running iOS 4 is back with a video, which shows us how to activate iPhone 4, iPhone 3GS and iPhone 3G without the original SIM card. You can use any SIM card you like ! iPhone 4 users though will have to cut SIM to micro-SIM card size before using it.
Sherif Hasim has figured out an easy way to activate iPhone 4, iPhone 3GS and iPhone 3G without needing the official iPhone carrier SIM.
Please note it doesn’t unlock your iPhone but it activates it. But it helps you to hactivate your iPhone without the need to hack your iPhone.
Sherif had also discovered an exploit in the baseband (05.12.01) that was bundled with iPhone OS 3.1.3 earlier in the year.
Uh oh. According to Valleywag, an AT&T security breach led to the exposure of 114,000 email addresses (and associated SIM / ICC identifiers) belonging to Apple iPad owners. A group of hackers calling themselves Goatse Security (be careful looking that one up) figured out a number of ICC-IDs and ran a script on AT&T’s site through a faked iPad UserAgent, which would then return the associated addresses. Some of those affected were actually quite big names, including the CEOs of The New York Times andTime Inc., some higher-ups and Google and Microsoft, and even a number of employees from NASA, FAA, FCC, and the US military.