Results 1 to 2 of 2
Discuss Anybody know how to decrypt the 1.0.2 firmware file? at the General - Hackint0sh.org; Does anyone know how to go about to decrypt the 1.0.2 firmware file in the ...
  1. #1
    Rookie Array

    Join Date
    Sep 2007
    Posts
    25
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default Anybody know how to decrypt the 1.0.2 firmware file?

    Does anyone know how to go about to decrypt the 1.0.2 firmware file in the iPhone1,1_1.0.2_1C28_Restore Folder?



  2. #2
    iPhone DevTeam Array

    Join Date
    Aug 2007
    Location
    Always sunny Los Angeles, California
    Posts
    421
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    34

    Default

    One method is described on the wiki, along with compiled versions of vfdecrypt.

    The key for 1.0.1 and 1.0.2 is 7d5962d0b582ec2557c2cade50de90f4353a1c1de07b742125 13fef9cc71fb890574bfe5 (without that space 3/4 of the way through)

 

 

Similar Threads

  1. Replies: 32
    Last Post: 07-14-2008, 09:04 AM
  2. [Firmware] Decrypt 2.0 Beta 8 (5A345) Ramdisk & RootFS
    By cool_name in forum iPhone Developer Exchange
    Replies: 11
    Last Post: 07-10-2008, 01:21 AM
  3. 1.1.1 Firmware File ??
    By vexta in forum iPhone "2G" (Rev. 1)
    Replies: 2
    Last Post: 11-22-2007, 11:29 AM
  4. Firmware 1.1.1 .eep and .fls file for SMS fix
    By a-max in forum iPhone "2G" (Rev. 1)
    Replies: 0
    Last Post: 10-29-2007, 02:34 PM
  5. I have an idea on how to decrypt the 1.1.1 firmware image
    By ChronicProductions in forum iPhone "2G" (Rev. 1)
    Replies: 27
    Last Post: 10-01-2007, 01:04 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Powered by vBulletin®
Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.
Search Engine Friendly URLs by vBSEO
(c) 2006-2012 Hackint0sh.org
All times are GMT +2. The time now is 03:22 PM.
twitter, follow us!