ja her er "error" jeg får
"
# ieraser
Resetting the Baseband...Done
Opened: /dev/tty.baseband
iEraser: tool by geohot
thanks to gray and the dev team for the implementation
thanks to nightwatch for the awesome toolchain
and thanks to anonymous, iProof, lazyc0der, and dinopio for the idea for this cool trick
this tool erases your main fw, starting at 0x20000. you need this for the testpoint to work
you need a file called secpack matching your current firmware version in this folder
see
http://iphonejtag.blogspot.com for instructions on finding this file
Waiting for data...
Got Header: 77 0b cc
02 00 85 00 02 00 FF FF 85 02 03 00
SECPACK
02 00 04 02 06 00 01 00 00 00 00 00 0B 02 03 00
02 00 02 08 06 00 01 00 00 00 00 00 09 08 03 00
02 00 03 08 20 00 00 20 00 00 FF DF FF FF C8 A3
26 A0 43 4A 4B 54 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 7C 0F 03 00
Erase
02 00 05 08 02 00 00 00 07 08 03 00
02 00 06 08 06 00 01 00 00 00 A0 00 AD 08 03 00
Hopefully the main flash was erased, wait for the next step...
# cd /usr/bin
# iunlocker
Resetting the Baseband...Done
Opened: /dev/tty.debug
iUnlocker: tool by geohot
uploads and runs testcode.bb in the same dir
uploads the nor image in "nor"
make sure your switch is on
thanks to iProof and lazyc0der for finding this method
thanks to the siemens guys for discovering it
and thanks to nightwatch for the awesome toolchain
Spamming AT, waiting for a response
Attempting to read[1]...c0
Connected established to bootrom
File size: 1608
Checksum: 0x37
Attempting to read[1]...c1
Did you erase the flash first?
#
"