The iPhone thinks it’s talking to Apple when it’s really talking to DoulCi.Īt this point, the hackers running DoulCi’s servers could capture device info, such as serial numbers and other unique identifiers. The iPhone thinks it’s talking to Apple when it’s really talking to the hackers’ server. iTunes will restore the iPhone to a blank state, and the normal setup process begins while the iPhone is connected to the computer with iTunes open.ģ) This is where things get shady. When the device attempts to contact Apple’s server to see if it needs to be activated, the line added to the hosts file reroutes the ping through DoulCi’s servers instead. Release the Sleep/Wake button but keep holding the Home button until iTunes recognizes your device and Recovery mode begins. ![]() Turn it back on, holding down the Sleep/Wake button for three seconds, and then - without releasing the Sleep/Wake button - begin holding the Home button for an additional 10 seconds. Here’s a good overview of how to edit the hosts file on different Mac and Windows systems.Ģ) The lost/stolen iPhone is then plugged into a Mac or PC running iTunes and put into DFU/Recovery mode. It’s a multistep process that varies depending upon which operating system you are using. ![]() Luckily, modifying the hosts file isn’t super easy. It might not be a good idea to route your data through a shady IP address controlled by a pair of anonymous hackers. Obviously, modifying the hosts file is a potential security risk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |