This website uses cookies to ensure you have the best experience. Learn more

Hacking An I Phone Essay

1837 words - 7 pages

For most people, not having a cell phone is unimaginable and without one we feel disconnected from the world. The leading device that helps us survive and navigate through this current hi-tech world is the Apple iPhone. With features like 3G network capability and remote database access it offers full computer functionality in the palm of a hand. Besides voice calls and text messages, the iPhone allows for full web browsing, email, and allows the installation of applications to further enhance usability through its own AppStore. But what if one wanted to push the iPhone’s capabilities beyond the limit of what Apple is willing to provide? The answer can be found in our other world, the cyber-world.
In this micro-study, I will use tools and information available to the public via internet in attempt to hack the iPhone. Currently the iPhone is only sold to subscribers of the AT&T telecommunication service provider and all applications and updates are installed using Apple’s iTunes software. Using various resources I will focus the two main issues which have put Apple and the iPhone user community into the limelight. First, the “unlocking” of the iPhone, which bypasses the iTunes activations process and allows the device to be used on any SIM (Subscriber Information Module) card cellular phone service provider other than AT&T, in this micro-study I will be using a T-Mobile SIM card. Second, I will attempt to “jailbreak” the device, which will allow me to install third-party applications through underground sources and not directly from Apple. As I attempt to hack the iPhone, I will compare drawbacks and benefits of hacking methods, ease of use, and verify Apple’s claims on affecting functionality and possible damages.
To begin with I have obtained an Apple iPhone, which has not been activated and unaltered (see Figure 1). Although it is not illegal to unlock a device, the five year exclusivity contract held by Apple and AT&T prohibits the device from being offered by other cellular service provider (Vogelstein). According to Apple, for the phone to be used it must be activated using iTunes. By doing so it transmits the device’s IMEI (International Mobile Equipment Identity) number and the ICCID (Integrated Circuit Card ID) serial number of the SIM card provided by AT&T, to Apple’s database to be signed electronically. This then gets sent back to the iPhone and activates the device allowing it to connect to the service provider (DevWiki). By inserting a T-Mobile SIM card, the iPhone does not recognize the T-Mobile SIM card (see Figure 1) and “No SIM” can be seen in the upper left hand corner where AT&T would be displayed.
In order to unlock the iPhone, both hardware and software options are available. The first methods used by hackers like George Hotz, involved manipulating encoded software already provided by Apple and takes a considerable amount of time. In his interview at Associated Press, Hotz reportedly spent...

Find Another Essay On Hacking an iPhone

E-crimes or Cybercrimes Essay

1569 words - 6 pages to recover. There are incidents as simple as a person making an innocent purchase of the Iphone 4 from an EBAY sale. The purchaser thought they were receiving an IPhone 4 with a case, charger, accessories and the manual for a price of $250. After a few weeks had passed and no package had been delivered, the purchaser contacted EBay and was informed that the package had been delivered. Once the package finally arrived, the purchaser opened it and

World of Network Security Infirmities Essay

1708 words - 7 pages answers questions unencrypted on the mobile device (Ante). ViaForensics reported that the IPhone app for Bank of America presented no known security weaknesses. The job industry has changed drastically. Computers handle the responsibility of choosing prospective job candidates, based upon key words found in an electronic resume. Jobseekers and recruiters beware there is new Trojan in town. “The Gameover computer Trojan is targeting job seekers

Mobile Based Applications and Geolocation

3384 words - 14 pages to make a tough decision on which platform they would support, i.e., iPhone, iPad, Windows Phone, or Android. Indeed, one of acquisitions that Adobe made that will help app developers as a result was the purchase of Nitobi Inc. Nitobi makes PhoneGap, an open-source programming tool for creating Web apps that run on a variety of mobile phones and aligns well with the cross-platform approach Adobe has favored with Flash; gives programmers the

Networking and Communication

1433 words - 6 pages forms of resistance. Furthermore, private conversations can become a public affair, which holds severe repercussions. (Pfaff, 2010, para. 14). Stalking can then lead to hacking where people can hack other people’s passwords and intrude into their private accounts. This is a major issue as hackers can change passwords, give out personal information, and pretend to be the person being hacked, thus sending out erroneous messages. When an individual

The Wealthy Man's Crime

1324 words - 6 pages reason that they are selling it is that they have fallen on hard times. Could an auction house even know, with their access to databases that reports all documented works of art, stolen or not. For instance, the Phoebus Auction Gallery in Norfolk, VA on November, 18, 2013 attempted to auction off a British portrait, from the estate of Robert Kittleson of Williamsburg, painted in the 18th century. However 15 minutes before the estate auction began, the

The People of Tomorrow

1063 words - 5 pages technology has done great things for society such as medical research, it also gives society a way to isolate themselves by having access to virtually anything, with the touch of a mouse. I’ve realized that I have become overly dependent on my IPhone. I use it to wake me up in the mornings. I use it to check all my email accounts. I also use it to check the weather and remind me of events that are coming up. It wasn’t until one day when my phone

Smartphones Strike Society

1188 words - 5 pages the age of 34; forty-three percent of all Apple users are under the age of 34 (“Smartphone…” 3, 5). The younger generation is very accepting of the new technology constantly being produced. There is an astonishing amount of smartphone users in the world. Smartphone corporations are permanently competing. Apple is the most popular brand of smartphone with forty percent of all smartphones in circulation. Samsung, also known as Android, comes in

Cyber-Crime is a Serious Problem

2338 words - 9 pages with cybercrime by protecting yourself appropriately. I also was one of those victims who faced a similar problem. This unfortunate truth forces me to understand that computers and the Internet have made our lives easier in many ways. However, it is unfortunate that people also use these technologies to take advantage of others through identity theft, hacking attempts, and malicious use of software. To be able to understand cybercrimes we

Biased Standards of the Apple App Market. - FTCC ENG 111 - Research Paper

1893 words - 8 pages Martin 6 Ramon Martin Mrs. Page ENG 111.1301 22 February 2015 Profit, Biased Standards, and Indirect Manipulations of the Apple Market. Being a Pulitzer Prize winner brings fame, money, respect, and is one of the biggest accomplishments in a writer’s life. Having won said prize is a world-renowned recognition of your hard work, an ultimate proof of your words being worthy. In case of Mark Fiore, a journalist who have recently won a Pulitzer, his

The Art Theft Problem

1378 words - 6 pages that they are selling it is that they have fallen on hard times. Could an auction house even know, with their access to databases that reports all documented works of art, stolen or not. For instance, the Phoebus Auction Gallery in Norfolk, VA on November, 18, 2013 attempted to auction off a British portrait, from the estate of Robert Kittleson of Williamsburg, painted in the 18th century. However 15 minutes before the estate auction began, the oil

The Growing Number of Private Intelligence Corporations

2334 words - 10 pages Pinkerton National Detective Agency. Pinkerton provided these services to Abraham Lincoln. Ever since then the outsourcing of US intelligence services has been an option that is often used. Most generally speaking the type of intelligence that is often outsourced is the OSINT or better known as Open Source Intelligence. The often cited benefit of the contracting of intelligence operations to the private industry is that the private industry is a

Similar Essays

The Smartphones’s Effects In Society Essay

1237 words - 5 pages units by 2008” (Statista). These numbers prove just how big the demand for the iPhone was when it first came out. To this day Apple continues to be number one in mobile sales, after the iPhone 5’s release, According to an article in the New York Times by Nick Windfield revenue from the iPhone “rose sixty percent to $18.12 billion, making up around half of the company’s total revenue. It sold twenty seven million units.” Sales continue to grow

Apple: Privacy Vs Safety Hofstra Business Ethics Essay

963 words - 4 pages 1. What are some of the ethical dilemmas facing Apple and the government? When I after reading the case, I found that there are some ethical dilemmas between Apple and government. Firstly, under the issue which happen on December 2 2015, Apple was asked to help FBI to get into an iPhone used by criminal. However, after that issue, the government ask Apple for something they simply do not have, and something Apple consider too dangerous to

Jailbreaking I Devices: Pushing Limits And Breaking Boundaries

2753 words - 11 pages the destructive consequences. The jailbreaking community continues to grow each year with more and more users hacking their devices. Flurry, an analytic company that tracks the behavior of iPhone users said, “The number of jailbroken devices fluctuates from 5 to 8 percent, which is roughly about three million users.”(Fitzgerald, Thomas. “Breaking Into the Smartphone (Risks Included).”) New York Times. 24 Nov. 2010. Web. 7 Sept. 2011.) When I

A Small Device That Can Hack Vehicles

1032 words - 5 pages a capacity to change a vehicles internal mechanism when connected to it. The parts that are affected by this gadget include the windows, the headlights, the brakes and the steering. The device which is as small as an iPhone needs to be fixed to the CAN (Controller Area Network), afterwards the device gets its power from the cars charging system and relays signals which jam the car. The device goes by the name CHT (CAN Hacking Tool). According to