Notifications
Clear all
Topic starter
12/11/2009 5:57 pm
Just in case some are unaware.
http//
and also at
http//
Perhaps a point examiners may consider useful and that is what polices, practices and procedures do you have in place where
a) you jailbreak and breach its digital signature of the handset to get inside?
b) the handset is already jailbroken (so to speak)?
c) the handset is already jailbroken and carries the hack code?