It’s important to realize that the iPhone is as powerful as a top-of-the-line late-’90s computer. And thus, the hacking community will continue to push the boundaries of what can be done with the phone. It might just be the future killer application. No matter what Apple adds to its Software Development Kit (SDK), there will always be something important that they left out. The impulse to get the iPod-already the de facto standard MP3 player-to do even more is irresistible. But this iPod surfs the Web, gets email, and maps your location, and new applications are constantly being developed for it. The iPod touch is the heir apparent of the iPod, and once flash memory sizes surpass hard drives, the iPod touch will be the iPod. Unlocking the phone so that it can use SIM cards anywhere is a major industry, and will probably continue to be so even after Apple’s exclusive contracts with mobile carriers are gone. The iPhone is a global device that uses the international standard GSM protocol. There’s this myth that hacking will go away “once Apple adds that one killer feature.” But it’s unlikely, because the iPhone is unlike the earlier iPods or any phone on the market before it. There are a lot of reasons to hack your iPhone or iPod touch. Chapter 1. IPHONE AND IPOD TOUCH HACKING BASICS
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |