After cracking: explain the authority, cracking, certificate and virus one by one! (I see, just skip)
S60 V3 system is a treasure, and 20 secret rooms (see the back) are all locked! The so-called cracking is to open all the secret rooms, and everyone can enter freely! This is to turn off permission verification! A program wants to enter this treasure, and the certificate is the key to open these treasures! Some softwares need the 17 key to enter the 17 secret room! And how many keys correspond to how many permissions a certificate contains! For those who have no certificate, we need to change the lock of the treasure (root certificate) into our own lock, and at the same time give this lock a master key, so that we can open all the secret rooms! This is to turn off certificate verification!
To clarify a misunderstanding here, many people regard certificates and signatures as the same thing, probably mainly because certificates are difficult to obtain and keys are easy to obtain, thus ignoring the importance of private keys. In essence, the private key is more important than the public key in terms of encryption principle. A certificate is essentially a public key signed by a certificate authority, which can and should be public. Suitable irreversible encryption algorithm makes it difficult to obtain private key from public key. Theoretically and practically, after cracking the permissions, we get the root certificate signed by NOKIA, but we can't get the private key, which is meaningless from the signature point of view. Replace Nokia's root certificate (lock of treasure) with our own root certificate (lock of our own). Now (we don't need a developer certificate to sign programs), these programs can be used by cracked mobile phones only by signing a universal certificate (master key). After being cracked, you can freely enter and exit the system directory for reading, writing, deleting and modifying, and you can easily extract the original protected mobile phone content. C. Now many softwares, including the long-awaited background sound and random ringtones, can also be used by signing a universal certificate (master key) for the cracked mobile phone!
What's the signature? Signing is to write the serial number of your mobile phone into the software to be installed, one by one. A software signed by mobile phone users cannot be used by other users, and there will be a certificate error prompt. With this key (certificate), you can install software (Jinbao) in the mobile phone system. This key used to be distributed to every mobile phone by Saipan for free. Now, only through publisher ID can you apply for a universal certificate of up to 1000 mobile phones.
Of course, I have given the lock and key. Based on these things, I can certainly write the corresponding virus! (It seems that everyone is most concerned about this! ) There is no S60 V3 virus at present! A virus is also a program. The virus on the computer PC is useless to the mobile phone. The virus of S60 V2 system before N72 has no influence on S60 V3 system! Now the only virus is based on the master key I gave here, which can only be used for the mobile phone I cracked like this! (There is no threat to a mobile phone that has not been cracked! For this problem, of course, it is not impossible, as long as you don't download the software that has not been tested and used in major forums!
Of course, the safest solution is to make this lock yourself.
20 certification body functions:
(1) Network service: used to use the mobile network.
(2)LocalServices: used to send or receive messages through U*, infrared and Bluetooth.
(3)ReadUserData: allows reading user data.
(4)WriteUserData: User data is allowed to be written.
(5) Location: Access to the location information of the mobile phone is allowed.
(6) User environment: access to real-time confidential information of users and their surroundings is allowed.
(7)PowerMgmt: It is allowed to interrupt any process or change the machine state in the system.
(8)SwEvent: It is allowed to generate or capture keyboard and pen input events.
(9)ReadDeviceData: allows reading system device driver data.
(10)WriteDeviceData: allows writing system device driver data.
(1 1) Surround Add: Allows access to logical device drivers that provide input information for peripheral devices.
(12)TustedUI: UI used to distinguish "normal" applications from "trusted" applications.
(13)ProtServ: Allow server applications to register with protected names.
(14) Network control: the right to modify or access network protocol control.
(15)multimedia add: Allow access to all multimedia device drivers.
(16)CommDD: Allow access to communication device drivers.
(17)DiskAdmin: allows hard disk management operations, such as formatting drives.
(18)DRM: Allows access to DRM-protected content.
(19)TCB: Allow access to /*s and /resource directories in the terminal.
(20)AllFiles: All files in the system are allowed to be visible, and files under /private can be written.
"Personal Development Certificate" is a certificate with the previous 13 function. PublisherID Certificate is a certificate with the previous 17 functions. In the past, all the certificates given by Saipan for free were 13 permissions, but now all the major forums and Taobao merchants have issued 17 permissions, and now the A4 version of the first five internal tests is 19 permissions (all permissions except TCB)! The reason is that all programs need input method, so the input method DLL needs all programs to load. The root certificate has 20 permissions.
Reprinted from wjq 135 ice, cold rain and wind
-
The following is about cracking:
/thread-2 174879- 1- 1 . html