Current location - Quotes Website - Personality signature - Mobile phone certificate, symbian
Mobile phone certificate, symbian
What are certificates and signatures?

In the most popular words, a certificate is an object, a document, and a signature is an action. For example, if you want to install a software for S60 3rd edition system, this system is like a hall. You must have identification to go in. A certificate is an identity document. The software to be installed is like the person who wants to go in, and the signature is the action of putting the identity document on this person!

What is the certificate security mechanism of S60 third edition?

S60, add the third version of the security mechanism to the certificate system. To install a software, you must have a certificate signature to enter the system. S60 3rd Edition System I * * * provides 20 permissions, and a certificate is required to install the software. At present, certificates are generally divided into three types.

1.

Personal certificate (you can provide 13 permission, and you can apply to symbian yourself in the past, but now symbian has stopped applying for personal certificate).

2.

PID certificate (you can provide 17 permission at most, and the owner of PID is willing to make it. The PID account is provided by symbian, and it is 200 USD/year. Today's forums generally do this kind of certificate).

3.

Root certificate (can provide up to 20 items, that is, all permissions. The system already has a symbian root certificate, but we can't get it out. Software signed with a root certificate can provide all functions)

What functions of the software are designed by the designer at the time of writing, that is to say, the maximum number of permissions he needs to run all the functions is also decided after the software is designed. The signature of the certificate only allows the system to give the software the required permissions. For example, a very simple program is beautiful every day. If it only needs 13 permission to run all functions, then even if you sign it with a root certificate, it will have 13 permission at most after installation. For example, the incoming call software needs to be booted. If you sign it with a personal certificate, it will have 13 permission, but it will boot.

What does S60' s security mechanism bring us?

The certificate mechanism of S60 third edition makes the system much safer. Malicious programs can't do whatever they want, such as malicious programs trying to destroy system files. As long as you don't sign this program, it can't run. Stay on your memory card or mobile phone at most. We are not stupid enough to sign a virus or malicious program. Even if we accidentally sign it, it will destroy the system folder, and we have no right. Generally, because everyone goes to the forum to apply for a certificate now, we usually use PID to sign the program, not PID to sign it. This is why it can be said that there is no S60 third edition virus!

Cracking of certificate authentication mechanism

Since the certificate mechanism has brought us so many benefits and made our mobile phones more secure, why crack it? Isn't this asking for trouble and shooting yourself in the foot?

First of all, now symbian has stopped applying for personal certificates, which makes many users who buy or use S60 third edition mobile phones feel very inconvenient and can't install the software. The advantage of smart phones lies in their openness. Without this, what do you mean by intelligence? Without a certificate, many novices lose a lot of fun playing S60.

After I stopped applying for my personal certificate, I began to have a forum to help me with the certificate (you can see how United the players in the third edition of S60 are! ! ) the forum is generally to raise money to apply for PID and help you do the certificate for free.

But the problem is coming again. It's not cool to install some software for a certificate that can provide 17 permissions, and it can't provide all the functions of the software! For example, A4 input method, incoming calls, etc. Although the PID certificate with 17 permission is enough for ordinary people to install software, for some players who hate bondage, it is what they really want to crack the certificate authentication of S60, install full-featured software and install without signature!

What is the cracked S60 system like?

Borrow the metaphor of a former master (I forget who it is, his metaphor is very classic. I hope everyone can understand it again and thank you again! S60 is a big house with 20 small houses, corresponding to 20 rights. After the software is signed by personal certificate, it can enter the big house, and at most it can enter the designated room 13, and at most it can enter 17 with PID signature. After we cracked S60, it was equivalent to unlocking all 20 small houses. In other words, what certificate do you use to sign? Entering the big house, the 20 rooms inside are open to you, that is, your software can enter and exit at will, which is why the file manager of X-Plore with high authority can enter the system folders such as sys after being cracked. But the cracked system does not mean visa-free, because even if you unlock 20 small houses, you have to enter the door of the big house anyway! So after cracking the system, we still need to sign the software, but after loading it into the system, we can enjoy all the permissions that the software can achieve.

On the complete resolution of the root certificate.

Root card, I think many friends have seen the crack tutorial. First of all, the root certificate is not for us to sign with a software, it is different from the certificate we usually say. To put it bluntly, the root certificate is a model, a comparison, a file, placed in a specific position of the system and recognized by the system. As we said above, S60' s system has a root certificate when it is not cracked. The certificates we usually apply for are all software signatures, which are installed as a system. Generally speaking, the system will compare our signature certificate with the root certificate to see how many items there are in a certificate, such as 17, so the system will let you use this software at most!

By importing root certificate, we mean replacing the original root certificate of the system with our own root certificate, so that we can make a certificate with 20 permissions more than the root certificate to sign the software! Then Gao Quanxiang can enjoy all the permissions he wants after installing the software! !

On the opda forum, we can see that many softwares have signed the opda root certificate. If we have cracked and imported the opda certificate according to the method provided by opda before, there is no restriction to install the software with the signature root certificate provided by opda, and we don't have to worry about not using it after installation, even if it is installed, it will not be cracked!

Then some people may ask, if so, if the root certificate of opda used for signing is signed by some uneasy people, then don't worry. In fact, opda has promised never to give the certificate and key to any member or other irrelevant person. What we can get from the internet is the opda root certificate file put in the system for comparison!

In fact, if you are still worried, you can make your own root certificate and put it into the system. If you want to install the software in the future, you can sign the installation with a signing certificate that matches the root certificate that you made yourself and put into the system. It's safer this way If you use this method, as long as your certificate file and key are not leaked, generally speaking, viruses and malicious programs will not hurt your love machine!

After importing the root certificate ...

After importing the root certificate, we can do whatever we want. However, what I want to say is that some programs do not need to be signed and installed with root certificates at all. The certificate applied by the ordinary forum is enough for us to cope with our daily life. Under normal circumstances, in addition to ensuring security, high-level programs are needed, and others can be signed and installed with the certificate applied by the forum. In this way, you can completely remove the anti-virus software that takes up space and memory in your mobile phone! ! ! S60 version 3 machine can be said to be virus-free! Don't let antivirus software take up valuable mobile phone memory!

Finally, if a novice like me still doesn't understand anything, you can ask with the post and help you solve it together.