Fang Talks

It begins.

Hacksploits and custominating.

People want control of the devices they buy and be able to do whatever they want on it. That’s nothing new. It’s been evidenced time and time again, releases of new devices being followed by releases of exploits for them. I fondly remember Apple releasing their new mobile operating system, and “hackers” coming forth with a jailbreak exploit no more than two days later. Grand times. These days, those things tend to take a bit longer, and the average release-exploit time tends to be higher for more “special” pieces of equipment like gaming machines, but vulnerabilities are still discovered sooner or later.

Regardless of the morality of it all (I say it’s fairly okay, but that’s not the point right now), it’s very admirable work those “hackers” do. (I keep putting that term between quotes because, frankly, it has lost all (consistent) meaning.) They search a system for an exploit, a way to run unofficial programs on it. Once they’ve found a hole, they rip it wide open, frequently enabling them to do so much more than the system’s developer would allow them to.

And then they share it with the community! I got much more bang for my buck after jailbreaking that old iPod Touch of mine back in the day. I could run all kinds of software on it, had way easier access to many hidden functionalities, and was more in control over what my device did.

Isn’t that just the grandest thing?
~ Fang


  • 23/01/2015 (1:41 AM)

    My friend won’t jailbreak her iPhone, but I’ve not rooted my Android so I can’t really judge her. Back in the day I had a chipped Playstation and I knew someone who had a chipped Xbox where they could just install the game to the hard drive and run it off the files. You can install games on an Xbox but you still need the disk to play.

    Anyway, I’ve always enjoyed that people are able to do things like that. The only problem I really have is that it causes companies to try harder to stop those efforts, which is something they’ll never be able to do. Ultimately their efforts just end up hampering and disrupting legitimate users. It’s a vicious cycle.

    • 23/01/2015 (6:47 AM)

      Their efforts don’t have to be disruptive. “Always online” policies, for example, are just plain retarded, on both the usability and security level.

Post a comment

Your email will stay hidden, required field are marked with a *.

Experimental anti-spam. You only have to do this once. (Hint: it's "Fang")