Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 34
Discuss [1.1.3] How to reverse Geo's IPSF? at the iPhone "2G" (Rev. 1) - Hackint0sh.org; sorry but is this bootloader 4.6 or 3.9 cause im getting scared lol...
  1. #21
    Professional Array

    Join Date
    Jan 2008
    Location
    Miami, Fl
    Posts
    84
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    11

    Default

    sorry but is this bootloader 4.6 or 3.9 cause im getting scared lol


  2. #22
    Rookie Array

    Join Date
    Nov 2007
    Posts
    14
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    Hey,

    I deleted my seczone file, too..
    I read something about Software downgrage a 4.6 bootloader to 3.9..
    Is or could it be possible with this method to rewrite original 3.9 to my / our phone?
    What else options do I have to restore the original bootloader?


    badInder

  3. #23
    Professional Array

    Join Date
    Jan 2008
    Posts
    85
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    11

    Default

    I have done goe ipfs and have a backup of my seczone. I think all tools needed to undo the geo ipfs should be in the geo ipfs directory on my iphone. Can some expert (or geo_ himself) create a script to reverse this ? This will be much safer for all .... I do not think think that this will be much time consuming ?

  4. #24
    Administrator Array

    Join Date
    Oct 2007
    Posts
    4,145
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    10

    Default

    not sure if there is a script available but the reverse steps are not too bad. Here's my note:

    This is what you do (from my notes, I think that it's right).

    - copy everything you have saved back to phone. Say directory /undo

    Now do: (note: the seczone is the original that you backed up)

    - launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
    - cd /undo
    - chmod 755 *
    - cat secloader seczone > fselector_revert
    - ./iUnlock secpack fselector_revert
    - ./norz seczone.ignore 03FA000 02000
    - ./norz seczone.revert 03FA000 02000

    The seczone is now reverted to the original.

    For verification, you can copy the seczone.revert to your computer, and compare it with your original seczone file using a binary tool such as winhex, they should be exactly the same except the last 2 bytes.

    now flashing the baseband

    - ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep
    - launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist

  5. #25
    Professional Array

    Join Date
    Jan 2008
    Posts
    85
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    11

    Default

    Thanks alot dtube. Just to make sure .. Can someone confirm this ?

    Quote Originally Posted by dtube View Post
    not sure if there is a script available but the reverse steps are not too bad. Here's my note:

    This is what you do (from my notes, I think that it's right).

    - copy everything you have saved back to phone. Say directory /undo

    Now do: (note: the seczone is the original that you backed up)

    - launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
    - cd /undo
    - chmod 755 *
    - cat secloader seczone > fselector_revert
    - ./iUnlock secpack fselector_revert
    - ./norz seczone.ignore 03FA000 02000
    - ./norz seczone.revert 03FA000 02000

    The seczone is now reverted to the original.

    For verification, you can copy the seczone.revert to your computer, and compare it with your original seczone file using a binary tool such as winhex, they should be exactly the same except the last 2 bytes.

    now flashing the baseband

    - ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep
    - launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist


  6. #26
    Professional Array

    Join Date
    Jan 2008
    Posts
    85
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    11

    Default

    ** Bump **

  7. #27
    Newbie Array

    Join Date
    Nov 2007
    Posts
    6
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    I just tried this and it did noy work. Running signal app returns the signal and fully functional phone.

  8. #28
    Board Hero Array

    Join Date
    Nov 2007
    Location
    Mustang Ridge, Texas, United States
    Posts
    1,169
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    65

    Default

    yea i say we wait for geo to make a reverse script for us to use

  9. #29
    Senior Professional Array

    Join Date
    Oct 2007
    Posts
    412
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    28

    Default

    The reverse procedure can be found here:
    h**p://rapid_$_hare.com/files/89809356/Revirgin_Pack_BB_04.03.13_G.rar.html

    The guide is found inside the .zip folder as a read-me
    Last edited by Random; 02-16-2008 at 03:08 AM.

  10. #30
    Rookie Array

    Join Date
    Sep 2007
    Posts
    18
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    Quote Originally Posted by Random View Post
    The reverse procedure can be found here:
    h**p://rapid_$_hare.com/files/89809356/Revirgin_Pack_BB_04.03.13_G.rar.html

    The guide is found inside the .zip folder as a read-me
    Does this method work? Anyone tried this already?


 

 
Page 3 of 4 FirstFirst 1234 LastLast

Similar Threads

  1. Replies: 0
    Last Post: 10-15-2007, 07:21 PM
  2. Is there a way to reverse IPSF?
    By hugerobots in forum iPhone "2G" (Rev. 1)
    Replies: 2
    Last Post: 10-14-2007, 09:10 PM
  3. Replies: 1
    Last Post: 09-11-2007, 10:35 PM
  4. Replies: 1
    Last Post: 09-11-2007, 09:59 PM
  5. Replies: 7
    Last Post: 09-10-2007, 09:14 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Powered by vBulletin®
Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.
Search Engine Friendly URLs by vBSEO
(c) 2006-2012 Hackint0sh.org
All times are GMT +2. The time now is 01:47 AM.
twitter, follow us!