The guys over at the osx86.hu hackintosh blog have reported that their efforts to run various open-source applications from the iPhone are proving successful.
According to Electronista, the group has built and run several programs for the device, including a functional Apache web server for hosting sites. Other tools such as Python’s programming language, the vim text editor and assorted utilities have been compiled into binaries and run on the device.
In addition to sorting out how to create an ad-hoc network from AT&T’s EDGE network that other computers can user to surf the Internet, the group claims it’s learned more about how the handset handles and locks out non-AT&T wireless services and SIM cards. Attempts to route around this code sets off a function that identifies the effort as “odd behavior” and closes down unlocking techniques.
Though considered a potential barrier, the find helps indentify what mechanisms an iPhone uses. Last week, the same group announced they had been able to bypass iTunes activation and created a program called iActivator, which can purportedly bypass iTunes via a convenient interface.
If you have any thoughts or ideas on this, let us know over in the forums.
The guys over at the osx86.hu hackintosh blog have reported that their efforts to run various open-source applications from the iPhone are proving successful.
According to Electronista, the group has built and run several programs for the device, including a functional Apache web server for hosting sites. Other tools such as Python’s programming language, the vim text editor and assorted utilities have been compiled into binaries and run on the device.
In addition to sorting out how to create an ad-hoc network from AT&T’s EDGE network that other computers can user to surf the Internet, the group claims it’s learned more about how the handset handles and locks out non-AT&T wireless services and SIM cards. Attempts to route around this code sets off a function that identifies the effort as “odd behavior” and closes down unlocking techniques.
Though considered a potential barrier, the find helps indentify what mechanisms an iPhone uses. Last week, the same group announced they had been able to bypass iTunes activation and created a program called iActivator, which can purportedly bypass iTunes via a convenient interface.
If you have any thoughts or ideas on this, let us know over in the forums.