25C3 - 1.4.2.3
25th Chaos Communication Congress
Nothing to hide
Speakers | |
---|---|
MuscleNerd | |
pytey | |
planetbeing |
Schedule | |
---|---|
Day | Day 1 (2008-12-27) |
Room | Saal 1 |
Start time | 20:30 |
Duration | 01:00 |
Info | |
ID | 2976 |
Event type | lecture |
Track | Hacking |
Language used for presentation | en |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Hacking the iPhone
Pwning Apple's Mobile Internet Device
Apple's iPhone has made a tremendous impact on the smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not approved by Apple.
Since its release, a tremendous amount of effort has been made to remove these restrictions for the benefit of the community. A year later, we have now learned much about its inner workings and have methods to circumvent these restrictions. This talk will summarize what we have learned about the internal architecture of the iPhone platform, its security, and the ways we have found to defeat these security measures.