000webhost

Web hosting

Saturday, August 22, 2015

Cracking a Combination Lock, Some Counter-Stealth Thoughts, and More Apple Information

Someone was recently trying to sell a safe but they didn't have the combination (they had proof of ownership if you're wondering). Anybody who has been faced with this situation is often torn because sometimes the item in question is valuable but the safe can be of comparable value so it's a lose lose situation. If you remember that the original combination then all is fine and well (I first encountered this situation in a hotel when I locked something but forgot the combination. It took me an agonising amount of time to recall the unlock code). If not, you're left with physical destruction of the safe to get back in, etc...

Tips on getting back in:
- did you use mneumonics of some sort to get at the combination?
- is there a limitation on the string that can be entered (any side intelligence is useful)?
- is there a time lock involved?
- does changing particular variables make it easier to get back in non-descructively?
- keep a log on the combinations that you have tried to ensure you don't re-cover the same territory

In this case, things were a bit odd. It had rubber buttons which when removed exposed membrane type switches which could be interfaced via an environmental sensor acquisition and interface device (something like an Arduino)(if you're curious this was designed and produced by a well known international security firm proving that brand doesn't always equate to quality). Once you program it and wire things up correctly, it's simply a case of letting your robot and program run until you open the safe. Another option is a more robust robot where it pushes buttons but obviously this takes quite a bit more hardware (which can make the project pretty expensive and potentially unworthwhile) to get working.
http://techcrunch.com/2015/05/14/this-robot-cracks-open-combination-locks-in-seconds/

As I covered in my book on 'Cloud and Internet Security' please use proper locks with adequate countemeasures (time locks, variable string lengths, abnormal characters, shim proof, relatively unbreakable, etc...) and have a backup in case something goes wrong.
https://play.google.com/store/books/author?id=Binh+Nguyen
http://www.amazon.com/mn/search/?_encoding=UTF8&camp=1789&creative=390957&field-author=Binh%20Nguyen&linkCode=ur2&search-alias=digital-text&sort=relevancerank&tag=bnsb-20&linkId=3BWQJUK2RCDNUGFY

Been thinking about stealth design and counter measures a bit more.

- when you look at the the 2D thrust vectoring configuration of the F-22 Raptor you think why didn't they go 3D at times. One possible reason may be the 'letterbox effect'. It was designed as an air superiority fighter predominantly that relies heavily on BVR capabilities. From front on the plume effect is diminished (think about particle/energy weapon implementation problems) making it more difficult to detect. Obviously, this potentially reduces sideward movement (paricularly in comparison with 3D TVT options. Pure turn is more difficult but combined bank and turn isn't). Obvious tactic is to force the F-22 into sideward movements if it is ever on your tail (unlikely, due to apparently better sensor technology though)
- the above is a null point if you factor in variable thrust (one engine fires at a higher rate of thrust relative to the other) but it may result in feedback issues. People who have experience with fly by wire systems or high performance race cars which are undertuned will better understand this
- people keep on harping on about how 5th gen fighters can rely more heavily on BVR capabilities. Something which is often little spoken of is the relatively low performance of AAM (Air to Air Missile) systems (Morever, there is a difference between seeing, achieving RADAR lock, and achieving a kill). There must be upgrades along the way/in the pipeline to make 5th gen fighters a viable/economic option into the future
- the fact that several allied nations (Japan, Korea, and Turkey are among them currently)(India, Indonesia, and Russia are among those who are developing their own based on non-Western design) are developing their own indiginous 5th gen fighters which have characteristics more similar to the F-22 Raptor (the notable exception may be Israel who are maintaining and upgrading their F-15 fleet) and have air superiority in mind tells us that the F-35 is a much poorer brother to the F-22 Raptor in spite of what is being publicly said
https://www.rt.com/usa/312220-f-35-flying-saucer-tech/
http://www.news1130.com/2015/08/12/f-35-might-not-meet-performance-standards-of-cf-18s-says-u-s-think-tank/
http://www.defensenews.com/story/defense/air-space/strike/2015/08/10/turkey-upgrade-f-16-block-30-aircraft/31408875/
https://en.wikipedia.org/wiki/Mitsubishi_ATD-X
http://www.businessinsider.in/Indo-Russian-5th-Generation-Fighter-Aircraft-program-Delays-and-the-possible-outcomes/articleshow/47655536.cms
http://www.defenseone.com/technology/2015/02/heres-what-youll-find-fighter-jet-2030/104736/
https://en.wikipedia.org/wiki/Fifth-generation_jet_fighter
https://en.wikipedia.org/wiki/TAI_TFX
https://en.wikipedia.org/wiki/KAI_KF-X
http://www.defenseindustrydaily.com/kf-x-paper-pushing-or-peer-fighter-program-010647/
Warplanes: No Tears For The T-50
https://www.strategypage.com/htmw/htairfo/articles/20150421.aspx
- it's clear that the US and several allied nations believe that current stealth may have limited utility in the future. In fact, the Israeli's have said that within 5-10 years the JSF may lost any significant advantage that it currently has without upgrades
- everyone knows of the limited utility of AAM (Air to Air Missile) systems. It will be interesting to see whether particle/energy weapons are retrofitted to the JSF or whether they will be reserved entirely for 6th gen fighters. I'd be curious to know how much progress they've made with regards to this particularly with regards to energy consumption
- even if there have been/are intelligence breaches in the design of new fighter jets there's still the problem of production. The Soviets basically had the complete blue prints for NASA's Space Shuttle but ultimately decided against using it on a regular basis/producing more because like the Americans they discovered that it was extremely uneconomical. For a long time, the Soviets have trailed the West with regards to semiconductor technology which means that their sensor technology may not have caught up. This mightn't be the case with the Chinese. Ironically, should the Chinese fund the Russians and they work together they may achieve greater progress then working too independently
http://www.abc.net.au/news/2015-08-18/former-spy-molly-sasson-says-soviet-mole-infiltrated-asio/6704096
https://en.wikipedia.org/wiki/Buran_(spacecraft)
- some of the passive IRST systems out have current ranges of about 100-150km mark (that is publicly acknowledged)
http://www.washingtonexaminer.com/the-price-of-stealth/article/2570647
http://aviationweek.com/technology/new-radars-irst-strengthen-stealth-detection-claims
https://en.wikipedia.org/wiki/Stealth_aircraft
http://thediplomat.com/2014/10/how-effective-is-chinas-new-anti-stealth-radar-system-really/
http://www.wired.co.uk/news/archive/2012-10/01/radar-detects-stealth-aircraft
https://en.wikipedia.org/wiki/Radar
http://www.migflug.com/jetflights/p-i-r-a-t-e-versus-raptor.html
http://nationalinterest.org/blog/the-buzz/are-us-fighter-jets-about-become-obsolete-12612
http://nationalinterest.org/feature/are-submarines-about-become-obsolete-12253
http://theminiaturespage.com/boards/msg.mv?id=374487
http://www.navytimes.com/story/military/tech/2015/02/09/greenert-questions-stealth-future/22949703/
http://watchingamerica.com/WA/2015/03/23/the-us-navy-has-already-stopped-believing-in-the-jsf/
- disoriention of gyroscopes has been used as a strategy against UCAV/UAVs. I'd be curious about how such technology would work against modern fighters which often go into failsafe mode (nobody wants to lose a fighter jet worth 8 or more figures. Hence, the technology) when the pilot blacks out... The other interesting thing would be how on field technologies such as temporal sensory deprivation (blinding, deafening, dis-orirentation, etc...) could be used in unison from longer range. All technologies which have been tested and used against ground based troops before)
http://defensesystems.com/articles/2015/08/10/kaist-researchers-take-out-drones-with-sound.aspx
https://en.wikipedia.org/wiki/Brown_note
- I've been thinking/theorising about some light based detection technologies to aircraft in general. One option I've been considering is somewhat like a sperical ball. The spherical ball is composed of lenses which focus in on a centre which is composed of sensors which would be a hybrid based technology based on the photoelectric effect and spectrascopic theory. The light would automatically trigger a voltage (much like a solar cell) while use of diffraction/spectrascopic theory would enable identification of aircraft from long range using light. The theory behind this is based on the way engine plumes work and the way jet fuels differ. Think about this carefully. Russian rocket fuel is very different from Western rocket fuel. I suspect it's much the same for jet fuel. We currently identify star/planet composition on roughly the same theory. Why not fighter aircraft? Moreover, there are other distinguishing aspects of the jet fighter nozzle exhausts (see my previous post and the section on LOAN systems, http://dtbnguyen.blogspot.com/2015/07/joint-strike-fighter-f-35-notes.html). Think about the length and shape of each one based on their current flight mode (full afterburner, cruising, etc...) and the way most engine exhausts are unique (due to a number of different reasons including engine design, fuel, etc...). Clearly, the F-22, F-35, B-2, and other stealth have very unique nozzle shapes when compared to current 4th gen fighter options and among one another. The other thing is that given sufficient research (and I suspect a lot of time) I believe that the benefits of night or day flight will/could be largely mitigated. Think about the way in which light and camera filters (and night vision) work. They basically screen out based on frequency/wavelength to make things more visible. You should be able achieve the same thing during daylight. The other bonus of such technology is that it is entirely passive giving the advantage back to the party in defense and intelligence is relatively easy to collect. Just show up at a demonstration or near an airfield...
https://en.wikipedia.org/wiki/Jet_fuel
http://foxtrotalpha.jalopnik.com/so-what-were-those-secret-flying-wing-aircraft-spotted-1555124270
http://www.globalsecurity.org/military/world/stealth-aircraft-vulnerabilities-contrails.htm
https://en.wikipedia.org/wiki/Electro-optical_sensor
https://en.wikipedia.org/wiki/Optical_spectrometer
https://en.wikipedia.org/wiki/AN/AAQ-37 
- such technology may be a moot point as we have already made progress on cloaking (effectively invisible to the naked eye) technology (though exact details are classified as is a lot of other details regarding particle/energy weapons and shielding technologies)... There's also the problem of straight lines. For practical purposes, light travels in straight lines... OTH type capabilities are beyond such technology (for the time being. Who knows what will happen in the future?)
- someone may contest that I seem to be focusing in on exhaust only but as as you aware this style of detection should also work against standard objects as well (though it's practicallity would be somewhat limited). Just like RADAR though you give up on being able to power through weather and other physical anomalies because you can't use a conventional LASER. For me, this represents a balance between being detected from an attackers perspective and being able to track them from afar... If you've ever been involved in a security/bug sweep you will know that a LASER even of modest power can be seen from quite a distance away
- everybody knows how dependent allied forces are upon integrated systems (sensors, re-fuelling, etc...)
- never fly straight and level against a 5th gen fighter. Weave up and down and side to side even on patrols to maximise the chances of detection earlier in the game because all of them don't have genuine all aspect stealth
- I've been thinking of other ways of defending against low observability aircraft. The first is based on 'loitering' weapons. Namely, weapons which move at low velocity/loiter until they come within targeting range of aicraft. Then they 'activate' and chase their target much like a 'moving mine' (a technology often seen in cartoons?). Another is essentially turning off all of your sensors once they become within targeting range. Once they end up in passive detection range, then you fire in massive, independent volleys knowing full well that low observability aircraft have low payload capability owing to comprimises in their design
- as stated previously, I very much doubt that the JSF is as bad some people are portraying
http://sputniknews.com/military/20150816/1025815446.html
http://news.usni.org/2015/08/13/davis-f-35b-external-weapons-give-marines-4th-5th-generation-capabilities-in-one-plane
- it's clear that defense has become more integrated with economics now by virtue of the fact that most of our current defense theory is based on the notion of deterrence. I beleive that the only true way forward is reform of the United Nations, increased use of un-manned technologies, and perhaps people coming to terms with their circumstances more differently (unlikely given how long humanity has been around), etc... There is a strong possibility that the defense estabilshment's belief that future defense programs could be unaffordable could become true within the context of deterence and our need to want to control affairs around the word. We need cheaper options with the ability to 'push up' when required...
http://www.thephora.net/forum/showthread.php?t=79496
http://breakingdefense.com/2014/04/f-35s-stealth-ew-not-enough-so-jsf-and-navy-need-growlers-boeing-says-50-100-more/
http://theaviationist.com/2013/06/17/su-35-le-bourget/
http://staugustine.com/news/2015-08-18/pentagon-plans-increase-drone-flights-50-percent

All of this is a moot point though because genuine 5th gen fighters should be able to see you from a mile off and most countries who have entered into the stealth technology arena are struggling to build 5th gen options (including Russia who have a long history in defense research and manufacturing). For the most part, they're opting for a combination of direct confrontation and damage limitation through reduction of defensive projection capability through long range weapons such as aicraft carrier destroying missiles, targeting of AWACS/refuelling systems, etc... and like for like battle options...
http://www.businessinsider.com/all-the-weapons-russias-sukhoi-t-50-fighter-jet-is-designed-to-carry-in-one-infographic-2015-8?IR=T
http://www.onislam.net/english/health-and-science/special-coverage/492459-muslim-sibirs-stealth-sukhoi-pak-fa-infographs.html

I've been working on more Apple based technolgy of late (I've been curious about the software development side for a while). It's been intriguing taking a closer look at their hardware. Most people I've come across have been impressed by the Apple ecosystem. To be honest, the more I look at the technology borne from this company the more 'generic' them seem. Much of the technology is simply repackaged but in a better way. They've had more than their fair share of problems.

How to identify MacBook models
https://support.apple.com/en-au/HT201608
How to identify MacBook Pro models
https://support.apple.com/en-us/HT201300

A whole heap of companies including graphic card, game console, and computer manufacturers were caught out with BGA implementation problems (basically, people tried to save money by reducing the quality of solder. These problems have largely been fixed much like the earlier capacitor saga). Apple weren't immune
https://www.ifixit.com/Guide/Yellow+Light+of+Death+Repair/3654
https://www.ifixit.com/Store/Game-Console/PlayStation-3-Yellow-Light-of-Death-YLOD-Fix-Kit/IF213-028-1
http://www.gamefaqs.com/ps3/927750-playstation-3/answers/66227-any-solutions-on-fixing-ylod-yellow-light-of-death

Lines on a screen of an Apple iMac. Can be due to software settings, firmware, or hardware
https://discussions.apple.com/thread/5625161
https://discussions.apple.com/thread/6604981
https://www.ifixit.com/Answers/View/172653/How+to+fix+%22vertical+lines%22+on+my+iMac+27+late+2009
https://www.ifixit.com/Answers/View/349/Vertical+lines+appearing+on+display

Apparently, Macbooks get noisy headjacks from time to time. Can be due to software settings or hardware failure
http://hints.macworld.com/article.php?story=20090729165848939
https://discussions.apple.com/thread/5516994
https://discussions.apple.com/thread/3853844
http://apple.stackexchange.com/questions/8039/how-can-i-make-my-macbook-pros-headphone-jack-stop-humming

One of the strangest things I've found is that in spite of a core failure of primary storage device people still try to sell hardware for almost what the current market value of a perfectly functional machine is. Some people still go for it but I'm guessing they have spare hardware lying around
https://discussions.apple.com/thread/5565827
https://discussions.apple.com/thread/6151526
http://apple.stackexchange.com/questions/158092/a-bad-shutdown-resulting-in-a-flashing-folder-with-question-mark

There are some interesting aspects to their MagSafe power adapters. Some aspects are similar to authentication protocols used by manufacturers such as HP to ensure that that everthing is safe and that only original OEM equipment is used. Something tells me they don't do enough testing though. They seem to have a continuous stream of anomalous problems. It could be similar to the Microsoft Windows security problem though. Do you want an OS delivered in a timely fashion or one that is deprecated but secure at a later date (delivered in a lecture by a Microsoft spokesman a while back). You can't predict everything that happens when things move into mass scale production but I would have thought that the 'torquing' problem would have been obvious from a consumer engineering/design perspective from the outset...
https://en.wikipedia.org/wiki/MagSafe
http://www.righto.com/2013/06/teardown-and-exploration-of-magsafe.html
https://www.ifixit.com/Answers/View/34477/Correct+wiring+of+MagSafe+power+adapter
http://www.instructables.com/id/MacBook-Mag-Safe-Charger-Budget-Repair-Disas/step2/Disassembly-of-Power-Brick-Brute-Force-Attack/
http://apple.stackexchange.com/questions/111617/using-85w-magsafe-inplace-of-60w-magsafe-2-for-mbp-retina-13
https://www.ifixit.com/Answers/View/1855/Definitive+answer+on+using+60w+or+85w+power+adapter+with+Macbook+Air
Macbook power adapter compatibility
https://support.apple.com/en-au/HT201700

Overheating problems on Macbooks quite common
http://www.macworld.co.uk/feature/mac/fix-overheating-macbook-3592266/
https://discussions.apple.com/thread/3278062?start=15&
http://www.macinfo.us/how-to-prevent-your-macbook-from-overheating.php

Upgrading Apple laptop hard drives is similar in complexity to that of PC based laptops
http://www.extremetech.com/computing/58220-upgrade-your-macbook-pros-hard-drive-2
http://www.macinstruct.com/node/130

One thing has to be said of Apple hardware construction. It's radically different to that of PC based systems. I'd rather deal with a business class laptop that is designed to be upgraded and probably exhibits greater reliability to be honest. Opening a lot of their devices has told me that form takes too much in the ratio between form and function
https://www.ifixit.com/Guide/MacBook+Core+2+Duo+Upper+Case+Replacement/515
https://www.ifixit.com/Guide/MacBook+Core+2+Duo+Logic+Board+Replacement/528
https://www.ifixit.com/Guide/MacBook+Pro+15-Inch+Unibody+Late+2011+Logic+Board+Replacement/7518

One frustrating aspect of the Apple ecosystem is that they gradually phase out support of old hardware by inserting pre-requisite checking. Thankfully, as others (and I) have discovered bypassing some of their checks can be trivial at times
https://en.wikipedia.org/wiki/OS_X
http://ask.metafilter.com/276359/How-to-best-upgrade-my-2006-MacBook-Pro
http://osxdaily.com/2011/04/08/hack-mac-os-x-lion-for-core-duo-core-solo-mac/
https://www.thinkclassic.org/viewtopic.php?id=425
http://www.macbreaker.com/2013/06/how-to-install-os-x-109-mavericks-dp1.html
http://apple.stackexchange.com/questions/103054/unsupported-hack-or-workaround-to-get-64-bit-os-x-to-install-on-a-macbook-pro-ha
http://forums.macrumors.com/threads/os-x-yosemite-on-unsupported-macs-guide.1761432/

- as usual thanks to all of the individuals and groups who purchase and use my goods and services
http://sites.google.com/site/dtbnguyen/
http://dtbnguyen.blogspot.com.au/

Friday, August 7, 2015

Apple iCloud Device Locking and General Apple Information

If you work in IT you probably have people ask you random questions out of nowhere from time to time. I was recently asked about how to bypass Apple iCloud device locking.

First of all, my opinion of this. I just try to avoid this space (from any perspective). If it sounds too good/cheap to be true it probably is, yadayada...

There does seem to be some tools online to enable checking prior to purchase but obviously even that isn't full proof. For example, if the seller knows that the goods have been locked but never connects to Apple servers then it is impossible/unlikely that the device in question will be locked prior to be the sale. They could feign ignorance also when confronted, law enforcement and the legal system may offer no avenue for recourse, etc...
https://support.apple.com/en-au/HT201581
http://apple.stackexchange.com/questions/62448/find-original-sales-information-of-macbook-by-serial-number
https://www.powermax.com/stolen/index
http://notebooks.com/2011/05/10/how-to-avoid-buying-a-stolen-mac-apple-store-robbed-of-24-macbooks-in-30-seconds-video/
http://www.reddit.com/r/apple/comments/1lfko4/macbook_pro_got_stolen_how_can_i_access_the/
Safe to give out the serial number of a Mac I'm selling?
http://arstechnica.com/civis/viewtopic.php?f=19&t=93200
https://www.icloud.com/activationlock/
http://apple.stackexchange.com/questions/132478/macbook-pro-locked-with-find-my-mac-and-wont-let-me-boot
http://www.cnet.com/au/news/apples-icloud-lock-for-macs-is-not-very-secure/
iPhone 6 Plus Are "Stolen Goods" from Futu_Online eBay Promotion
https://www.ozbargain.com.au/node/205809
http://www.amta.org.au/pages/amta/Check.the.Status.of.your.Handset

If you've been watching this space for a while you'll know that about the Doucli bypass. This seems to work based on MITM (Man in the Middle Attack) principles (I haven't taken too close a look at this).
http://maypalo.com/2014/05/24/doulci-alternative-method-gadgetwide/
http://howtosifiwiki.com/bypass-icloud-account/
http://apple.stackexchange.com/questions/167978/factory-reset-an-ipad-without-knowing-the-icloud-password

For those who don't know what this is is that any communications that go from Apple to your device now go through a third party (Doucli). Doucli filters out any traffic which relates to iCloud locking or simply inserts a different set of communications which can then unlock the device. For anyone who knows how this is done this can be extremely tedious and difficult especially if the defender has taken extensive counter-measures against attack.

If you are interested in possible avenues of attacking it here goes:
- preventing it from locking your device should be simple enough. Don't connect it to the Internet and allow it to hook up with Apple servers. Earlier versions of the Doucli hack depend on DNS host file hacking. Later version of Apple software seems to block this behaviour though. Easiest way around this is to setup a layered defense/attack with DNS re-directs occuring at multiple points between you and Apple whether it may be via software (relevant configuration files, virtual machines, containers, etc...) and/or hardware (networking hardware, servers, etc...)
- the network/server setup of Apple systems is such that the authentication servers may not be isolated from the store purchases making things slightly more difficult (there are plenty of programs out there to do this). If you must use a second/intermediary system to which downloads music/software and use this to transfer to another system which is never connected online. This allows you to have the benefits of the purchasing online while not having to deal with iCloud authentication issues. Your device can not be locked without relevant identifying information being transferred between yourself and Apple (obviously, if this becomes a widespread means of bypassing iCloud then they'll be counter-measures which are deployed, etc...)
- the game keeps on changing. As cracks in the protocol/system are identified attackers and Apple have to continually change the game. If you really want to understand it, you're best trying to understand live packet manipulation and reverse engineering/cracking or DRM systems
- I've looked at this and for me the easiest way to attack is via direct hardware if your device is locked. It requires no advance knowledge of the software/protocol and is reliant entirely on the way in which data is stored on the device itself (obviously, this only makes the problem slightly easier to deal with). It's similar to the way in which firmware reset mode works on embedded devices such as eBooks and to the way in which bypass is achieved in physical security systems. The only troubling thing may access. They're BGA! Realistically this could mean that this type of attack is neigh on impossible (I think it may be possible though. When I have dead hardware lying around I often play around with it. A single copper fibre and the right type of signal/voltage may be enough to create the type of data corruption that I require). Effectively, the type of attack that I envisage revolves around storage corruption. Since, everything is stored via a combination of encrypted keys at multiple layers my belief is that destroying/corrupting the storage and restoring iOS clean and bypassing Apple servers is easier than engaging in a continual race against Apple (making the assumption that restoration of iOS can be completed independently of iCloud lock checking)
http://dtbnguyen.blogspot.com/2012/07/if-only-reading-were-easier.html
http://dtbnguyen.blogspot.com/2012/08/funky-firmware.html
http://images.apple.com/iphone/business/docs/iOS_Security_Feb14.pdf
https://www.ifixit.com/Answers/View/192220/Is+it+possible+to+transfer+NAND+Flash+from+iPhone+to+another
http://www.datarecovery.net/newsletters/what-kills-flash-drive.html
Toshiba THGBX2G7B2JLA01 16 GB NAND Flash
SK Hynix H2JTDG8UD1BMR 16 GB NAND Flash
- clearly, I'm working on the premise that attacking hardware is easier than attacking software since it is more difficult to change. To change the pin-out structure on a single chip requires re-tooling on a mass scale for chips that may also be used in other devices making it un-economical for both Apple and flash chip manufacturers to engage in. Once a design is out there, we can just figure it out and it should work across that entire design specification/model though... Of course, this could be somewhat of a moot point because a lot of Apple devices aren't easily upgradeable, change layout on each iteration, etc...
- another type of attack revolves around changing identifying information on the device and then clearing iOS. That said, you don't know whether or not Apple may have some sort of unique/class based identification system which may block non-Apple identified systems from accessing their servers. Either way, it requires a second system to act as an intermediary
- insider at Apple who removes gives you a 'clean sheet'
- that said, much of what I'm saying here is theoretical. I don't have access to an iPod/iPad at the moment so I don't know The best I've been able to manage are online teardowns
http://www.techhive.com/article/116572/article.html
http://superuser.com/questions/616033/are-unpowered-ssds-vulnerable-to-an-emp-shock
http://www.survivalistboards.com/showthread.php?t=72855
http://electronics.stackexchange.com/questions/36921/does-magnetism-affect-sd-cards
https://en.wikipedia.org/wiki/Flash_memory

All of the above means nothing if you can simply replace the logic board which is the impression that I'm getting with some repairers who seem to be charging a lot for something like this (in comparison with unlocking phones).

Cracking Open: Apple iPad Air 2
https://www.youtube.com/watch?v=-tZlpBz8WF4
https://www.ifixit.com/Teardown/iPad+Mini+Wi-Fi+Teardown/11423
https://www.ifixit.com/Teardown/iPad+Mini+2+Teardown/19374
https://www.ifixit.com/Teardown/iPad+Mini+3+Wi-Fi+Teardown/30628
https://www.ifixit.com/Teardown/iPad+Wi-Fi+Teardown/2183
https://www.ifixit.com/Teardown/iPad+3+4G+Teardown/8277
https://www.ifixit.com/Teardown/iPad+Air+LTE+Teardown/18907
https://www.ifixit.com/Teardown/iPad+Air+2+Teardown/30592
- just don't get why some groups simply don't release downloadable software which can be used to bypass. A local/loopback proxy would likely have minimal system impact if the protocol break feels as simple as it could possibly be. My guess is that at least some hacker/cracker groups are using the (supposedly) free and altruistic bypasses as a means of gaining access to people's private details. All the more reason to avoid these third party hacks and buy equipment 'clean'...
- if you're used to researching DRM and disassembly/reverse engineering of files some of the above may seem foreign to you. Believe me, it's not that much of a leap up. Conceptually, many of the same techniques and theories are employed. You just have to get used to a new setting. That's all...

Identify your iPod model
https://support.apple.com/en-au/HT204217

Diagnostic mode for Apple iPod devices
https://discussions.apple.com/thread/3110831
http://www.methodshop.com/gadgets/ipodsupport/diagnosticmode/index.shtml

Sources/options for replacement storage on iPod Classics
http://www.ebay.com/bhp/ipod-classic-120gb-hard-drive
http://rockbox.cool.haxx.narkive.com/ibajtp9V/mk1214gah-or-spinpoint-n2
http://blog.macsales.com/28857-give-your-ipod-classic-new-life-with-owc-iflash
http://eshop.macsales.com/item/OWC/TARIPODFLSH/
http://apple.stackexchange.com/questions/89367/were-the-2009-mbps-affected-by-the-nvidia-problem
http://forums.whirlpool.net.au/archive/1123805

Source for replacement of Apple parts locally
https://www.macfixit.com.au/apple-ipad-iphone-ipod-accessories/ipad-iphone-ipod-repair-replacement-parts/ipod-parts.html

Enabling alternative filesystem support on Mac OS X Yosemite
http://www.cnet.com/au/news/how-to-manually-enable-ntfs-read-and-write-in-os-x/
http://apple.stackexchange.com/questions/152661/write-to-ntfs-formated-drives-on-yosemite
http://computers.tutsplus.com/tutorials/quick-tip-how-to-write-to-ntfs-drives-in-os-x-mavericks--cms-21434
http://www.cnet.com/au/how-to/how-to-manage-ext2ext3-disks-in-os-x/
http://osxdaily.com/2014/03/20/mount-ext-linux-file-system-mac/

Booting Live Linux discs on an Apple Macbook
http://askubuntu.com/questions/71189/how-do-i-boot-the-live-cd-on-a-macbook-pro
https://en.wikipedia.org/wiki/List_of_live_CDs

Mac OS X Live discs are an interesting option for those who are interested in testing/trying Mac OS X without wanting to purchase hardware beforehand.
http://www.insanelymac.com/forum/topic/22193-104145-live-and-install-dvd/
http://www.insanelymac.com/forum/forum/109-os-x-livedvd/

How to install latest Mac OS X on iMac without original DVD
https://discussions.apple.com/thread/7006750
Create a bootable installer for OS X Mavericks or Yosemite
https://support.apple.com/en-au/HT201372

Dodgy Job Contract Clauses, Random Stuff, and More

- in this post we'll be going through dodgy job contract clauses. Ironically, many of which are actually unlawful and unenforceable on c...