Thread: iPhone, iPad & iPod Touch


Páginas : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 [91] 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308

SKOALV
14/11/2011, 16:00
Es la bronca, no hay muestras de vida desde cupertino cal.

Dragoncius
14/11/2011, 19:34
Leí en Engadget que al parecer si quieren apresurar su salida para din de año.
Specs rumoradas que he leído, cámara de 10mpx y muy delgado.

Dudo que salga ahorita, aparte sería super injusto para los early adopters del iPhone 4S.

Sent from my OC'd Motorola™ Atrix®

VAG A4
14/11/2011, 23:11
Leí en Engadget que al parecer si quieren apresurar su salida para din de año.
Specs rumoradas que he leído, cámara de 10mpx y muy delgado.

Dudo que salga ahorita, aparte sería super injusto para los early adopters del iPhone 4S.

Sent from my OC'd Motorola™ Atrix®

Lo mas seguro es que sea el siguiente año como en estas fechas por que iPhone 4 sigue vendiendo y el 4s todavía falta que lo exploten mas

Dracko
15/11/2011, 08:11
Tal vez a muchos no les importe.. pero ya Crackearon Siri, para que pueda funcionar en cualquier dispositivo, hasta en una PC comun y corriente, el problema es que apple verifica la comunicacion con el dispositivo mediante Identificadores por lo que le es posible Bloquear la comunicacion de dispoitivos repetidos.. los que consiguieron el Crack sonlos amigos de Applidium, los mismo desalloradores de VLC para iphone...

Aqui les dejo la noticia:


On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.
Interestingly, Apple explained that Siri works by sending data to a remote server (http://www.apple.com/iphone/features/siri-faq.html) (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.
Today, we managed to crack open Siri’s protocol. As a result, we are able to use Siri’s recognition engine from any device. Yes, that means anyone could now write an Android app that uses the real Siri! Or use Siri on an iPad! And we’re goign to share this know-how with you.
Demo The best demo probably is Siri’s speech-to-text feature. We made a simple recording of us saying “Applidium vous souhaite une bonne journé”, and got a perfect result !
Sample_Siri_speech_to_text.zip 70.78 Ko Download (http://applidium.com/en/news/cracking_siri/Sample_Siri_speech_to_text.zip)
This sound sample never went through any iPhone, but nonetheless we got Siri to analyze it for us.
Understanding the protocol – A brief technical history At Applidium we’re used to building mobile applications. The best way to chat with a remote server is HTTP, as it’s the protocol that is the more likely to work in any case.
The easiest way to sniff HTTP traffic is to setup a proxy server, configure your iPhone to use it, and look at what goes through the proxy. Surprisingly, when we did, we wouldn’t gather any traffic when using Siri. So we ressorted to using tcpdump on a network gateway, and we realised Siri’s traffic was TCP, on port 443, to a server at 17.174.4.4.
Going to https://17.174.4.4/ on a desktop machine we noticed that this server was presenting a certificate for guzzoni.apple.com. So it seemed like Siri was communicating with a server named guzzoni.apple.com over HTTPS.
As you know, the “S” in HTTPS stands for “secure” : all traffic between a client and an https server is ciphered. So we couldn’t read it using a sniffer. In that case, the simplest solution is to fake an HTTPS server, use a fake DNS server, and see what the incoming requests are. Unfortunately, the people behind Siri did things right : they check that guzzoni’s certificate is valid, so you cannot fake it. Well… they did check that it was valid, but thing is, you can add your own “root certificate”, which lets you mark any certificate you want as valid.
So basically all we had to do was to setup a custom SSL certification authority, add it to our iPhone 4S, and use it to sign our very own certificate for a fake “guzzoni.apple.com”. And it worked : Siri was sending commands to your own HTTPS sever! Seems like someone at Apple missed something!
That’s when we realised how Siri’s protocol is opaque. Let’s have a look at a Siri HTTP request. The request’s body is binary (we’ll get into that later), and here are the headers :

ACE /ace HTTP/1.0 Host: guzzoni.apple.com User-Agent: Assistant(iPhone/iPhone4,1; iPhone OS/5.0/9A334) Ace/1.0 Content-Length: 2000000000 X-Ace-Host: 4620a9aa-88f4-4ac1-a49d-e2012910921 A few interesting things :


The request is using a custom “ACE” method, instead of a more usual GET.
The url requested is “/ace”
The Content-Length is nearly 2GB. Which is obviously not conforming to the HTTP standard.
X-Ace-host is some form of GUID. After trying with several iPhone 4Ses, it seems to be tied to the actual device (pretty much like an UDID).

Now let’s move on to the body. The body is some raw binary content. When we first looked at it with an hex editor, we noticed it started with 0xAACCEE. Oh, seems like header ! Unfortunately, we couldn’t understand anything of what was after that.
That’s when we took some time to think. As people who are used to designing mobile application, we know there’s one thing which is very important when talking over a network : compression. The bandwidth is often limited, so it’s usually a very good idea to compress your data. And what is the most ubiquitous compression library around ? zlib:“http://zlib.net/”. It’s a very solid library, really efficient and powerful (makes sense, it’s half french!). So we tried to pipe that binary data through zlib. But nothing came out, we were missing a zlib header. That’s when we thought “hmm, so there’s already this AACCEE header in the request body. Maybe there’s some more ?”. We developpers like to keep things packed. 3 bytes is not a good length for a header. 4 would be. So we tried un-zipping after the 4th byte. And it worked!
Now when we unziped the content, we got onto some new binary data. Not very understandable either, but some parts were text. Among them, one caugh our attention : bplist00. Hurray, it seems like the data is some binary plist. After fiddling a little bit with that binary stream, we figured out it was made out of chunks :


Chunks starting with 0x020000xxxx are “plist” packets, xxxx being the size of the binary plist data that follows the header.
Chunks starting with 0x030000xxxx are “ping” packets, sent by the iPhone to Siri’s servers to keep the connection alive. Here xx is the ping sequence number.
Chunks starting with 0x040000xxxx are “pong” packets, sent by Siri’s server as a reply to ping packets. Without surprise, xx is the pong sequence number.

And deciphering the content of binary plists is very easy, you can do it on Mac OS X with the “plutil” command-line tool. Or in ruby with the CFPropertyList gem on any platform.
What we learned We did really learn a few interesting things about how the iPhone 4S talks to Apple’s servers :
The audio data The iPhone 4S really sends raw audio data. It’s compressed using the Speex (http://www.speex.org/) audio codec, which makes sense as it’s a codec specifically tailored for VoIP.
Signature The iPhone 4S sends identifiers everywhere. So if you want to use Siri on another device, you still need the identfier of at least one iPhone 4S. Of course we’re not publishing ours, but it’s very easy to retrieve one using the tools we’ve written. Of course Apple could blacklist an identifier, but as long as you’re keeping it for personal use, that should be allright!
The actual content The protocol is actually very, very chatty. Your iPhone sends a tons of things to Apple’s servers. And those servers reply an incredible amount of informations. For example, when you’re using text-to-speech, Apple’s server even reply a confidence score and the timestamp of each word.
What’s next ? Here’s a collection of tools (https://github.com/applidium/Cracking-Siri) we wrote to help us understand the protocol. They’re written mostly in Ruby (because that’s a wonderfully simple language), some parts are in C and some in Objective-C. Those aren’t really finished, but should be very sufficient for anyone technically inclined to write a Siri-enabled application.
Let’s see what fun application you guys get to build with it! And let’s see how long it’ll take Apple to change their security scheme! Follow us on twitter for updates on that subject : we’re “@applidium:”http://twitter.com/applidium .





Saludos

Hyundai Rider
15/11/2011, 16:48
Aun no saben de Jailbreak para 4S? Por cierto, acabo de comprarme uno pero me chingaron mi manos libres, alguien que quiera vender uno bara bara....

VAG A4
15/11/2011, 18:52
Aun no saben de Jailbreak para 4S? Por cierto, acabo de comprarme uno pero me chingaron mi manos libres, alguien que quiera vender uno bara bara....

Los audífonos blancos que vienen en la cajita?

Hyundai Rider
15/11/2011, 20:33
Los audífonos blancos que vienen en la cajita?

Asi es we...

SKOALV
15/11/2011, 21:26
En la mac store no pasan de 200 pesitos

Hyundai Rider
15/11/2011, 21:56
En la mac store no pasan de 200 pesitos

Pero el manos libres? No creo o si? Se me olvido poner que fuera manos libres, lo voy a checar, gracias por el dato bro.

Hyundai Rider
15/11/2011, 21:59
No we, 469 en el MacStore y ahora recuerdo que en oficce me parecio verlos al mismo precio, ahi por si alguien no ocupa los suyos y quiere dejarlos bara con envío, saludos.


PDA

Ver la versión completa : Thread: iPhone, iPad & iPod Touch