for those who worship zi are idiots (which i agree). even Mr. George Hotz talks about what ziphone actually is. He also gives a warning as to whom credit actually goes to for the creation of ziphone. (zi for the wrapper, geohot for the gunlock exploit that runs inside ziphone, and to the dev team for the ramdisk exploit).
i'd like to move deeper into zi's dat file, but i don't have decryption and dmg mounting skills (yet). personally, i absolutely hate running a utility with a "closed" dat file for the sake of making an unlock process "simpler".
as I quote my own blog: "It looks like any idiot can unlock their iphone. its upto the sysadmins/hackers to know what to do with it afterwards " I’ll have to google around to get my “skills up” or whatever.
~ a note coming from a 31-yr old system administrator running windows networks (ewwww …)