The hacker duo claims they can activate thousands of devices every minute, and there is a lot of evidence on their Twitter pages regarding re-activated devices, with pictures from people from around the world of devices and screenshots showing the hack actually working. The hack relies on a man-in-the-middle spoofing technique to make Apple devices actually believe that they have connected to a legitimate iCloud server. The exact line that needs to be added to the hosts file has not yet been published. The hacker team claims that work is in progress to ensure that all iPhone, iPad and iPod models are supported. The device is then purportedly activated without any further action on the user's part. When the user then runs iTunes, it will detect the device plugged in and automatically transmit an activation request, which is then rerouted to doulCi. The hosts file helps direct network traffic from a PC to specific servers. Those who wish to use doulCi have to modify the hosts file on their PC or Mac, and then connect to iTunes. Apple is set to bring some major upgrades to the iPhone 15, iPhone 15 Plus, suggest leaks Apple starts manufacturing iPhone 15 series in China, manufacturing in India to start soon
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |