They seem to be confusing IPSF unlocking with using the the IPSF program and the server used in the tutorial to virginize your phone. Using IPSF may brick your phone in future updates. The server in the the virginizing tutorials does not zero out anything, it reconstructs what the original AnySim foobared:
Originally Posted by sonic
According to dev-team elite the story is:
Simplified speaking there are three things involved:
The baseband code, the lockstate table and the encryption token (the public RSA key, the private key is only known to Apple). The lockstate table is the same for all phones but encrypted individually, also the token is individual to each phone.
The lockstate table states whether the phone is locked or not.
Theoretically there are two ways to unlock: Hacking the code so that the phone believes it is unlocked (basically the check of the lockstate table is skipped by the hack) or changing the lockstate table and token so it verifies unlocked with the original firmware. As the encryption cannot be broken the IPSF people zeroed out the original token, introduced their own token and created a new lockstate table. Due to a bug in the RSA algorithm that works.
The dev team people though did with anysim 1.0.2 a dirty hack of the firmware code which due to sloppy programming caused the firmware to alter the lockstate table. That causes the bricked firmware on upgrade as the altered lockstate table doesnt verify. The anysim 1.1.1 though doesnt cause the firmware to alter the lockstate table.
What the musclenerd, geohot method does is reverting the lockstate table back to its original state.
The problem with the IPSF method is that the original token has been zeroed out. So if Infineon ever changes the RSA code and closes the bug the lockstate table will not verify, causing a bricked baseband.
However a revirginised 1.02 phone unlocked with anysim 1.1.1 and upgraded to firmware 1.1.1 is again a 1.1.1 virgin as the baseband has been overwritten. So it can be unlocked again with anysim 1.1.1