Monthly Archives: July 2008

Rebel Simcard unlock videos without jailbreak

Part 2

Solutions Point Ltd, UK today announced the world’s first real solution to unlock the iPhone 3G using its newly released product Rebel SimCard (iPhone 3G Version).

Solutions Point Ltd, UK today announced the world’s first real solution to unlock the iPhone 3G using its newly released product Rebel SimCard (iPhone 3G Version).

 

 Rebel Sim card

Solutions Point Ltd, UK, already known for their technological breakthroughs in the mobile phone unlocking industry, are well known and an established players in this industry, today announced the world’s first solution to unlock the iPhone 3G using its newly released product Rebel Sim card (iPhone 3G Version).

Rebel Sim card can unlock almost any mobile phone available in the market, and now the iPhone 3G, the hottest selling product of the year joins its list.
Anyone can buy a Rebel Sim card from http://www.rebelsimcard.com and unlock their iPhone 3G.

A lot of users were already looking for a solution to unlock their phone, with no software yet released to unlock the iPhone 3G, even after using the Rebel Sim card with the iPhone 3G the phone warranty is not lost! and the contract with existing network provider is not breached.

And guess what’s more, the phone is still in warranty and Apple cannot detect it!! therefore users can use another networks simcard to make cheaper calls, without loosing their warranty! , without getting Apple to know about it, without breaching the contract, and last but not the least, users don’t need to have special skills to use Rebel Sim Card, it works Out of the box and it does not require any modification to the iPhone 3G firmware.

Even if you are an amateur, it will just take less than a minute to unlock your new iPhone 3G.

 

iPhone 3G Unlock

 Rebel Sim card Cutter

Rebel Simcard Videos

Apple iPhone 3G unlock using Rebel Simcard Part 1- NO NEED JAILBREAK, NO NEED TO MODIFY FIRMWARE!! – 29/7/2008

Apple iPhone 3G unlock using Rebel Simcard Part 2- NO NEED JAILBREAK, NO NEED TO MODIFY FIRMWARE!! – 29/7/2008

Apple iphone 3G unlocked with Rebel SimCard World First Solution

Apple iphone 3G unlocked with Rebel SimCard World First Solution

the rebel sim R&D Team Hit Jackpot and preview the first unlock solution for the iphone 3G with the 2.0 firmware.

Patience pays of and the Rebel simcard Team show the unlocking of the newest phone on the market the iphone 3G Model

Rebel SimCard unlocks Network Restrictions on Nokia N82

Rebel SimCard unlocks Network Restrictions on Nokia N82

The Launch of Rebel Simcard 17 July 2008

Solutions Point Limited, UK today introduces its flagship product, Rebel Sim card which can bypass network locks on all mobile phones.

Rebel Sim card has been released today by Solutions Point Limited, UK, they claim this product to be in the line of those smart technological solutions who will bring a revolution in the mobile phone unlocking industry, it would revolutionarise the way people use their mobile phones, by bringing in options which were not possible before.

Rebel Sim card can bypass network locks on almost all phones available in the market till date, and it would also support 95% of upcoming phone models out of the box, without making any changes to Rebel Sim card.

Rebel Sim card is used in parallel to the existing sim card as its only 0.10mm thick, therefore can be inserted along with existing simcard in any of the mobile phones available throughout the world.
It can also be removed easily, without causing any damage to the phone and the phone does not lose its warranty!

Rebel Simcard is the World’s first sim card which is fully compatible with UMTS technologies, which means users will get the same quality of service as they would get with a fully unlocked phone.

Rebel Sim card is transparent to the mobile phone, it does not interrupt in any of the existing features the simcard or the mobile phone has to offer either it be emails, Wifi, Bluetooth, 3G, GPS or any other service, rather it enhances the existing features with its proprietary menu which gives the user a whole lot of control over how Rebel Sim card functions for a particular mobile phone.

Rebel Sim card is backed up by experienced and highly skilled development team along with hundreds of beta testers throughout the world, who test Rebel Sim card on almost any new phone which is released in any part of the world.

Rebel Sim card also has a STK menu, Apart from giving better control to the end user on the Rebel Simcard features, This menu enables it to run high security applications like banking services, transactions etc, moreover it enhances the existing network simcard by adding more features to it, like Value Added Services, Telecom applications, Logos, Ringtones etc. This makes it a one and only choice for MVNO’s who are trying to discover new lands and increase their market share.

However the technology behind bypassing of network locks on a mobile phone looks rather complex and is no way a game of a common man, but by bringing the ease of use and simplicity Rebel Sim card provides to unlock a mobile phone to common people who know nothing about this technology, depicts a fine example, how difficult things can be made so simple by people who are behind such technologies and are working hard and writing new rules of the game

Types of Smart Cards

Types of Smart Cards

These Integrated Circuit Cards come in two forms when we categorize them based on the way we use tem, contact and contact-less. The former is easily identified due to its characteristic gold connector plate.

Originally the ISO Standard (7816-2) defined eight contacts, but only 6 are actually used to communicate with the outside world and rest two are marked as RFU (Reserved for future use). The contact-less cards optionally may contain its own power source, however mostly the operating power is provided to the contact-less card by means of an inductive loop that uses low frequency electronic magnetic radiation. The signals needed for communication with the reader devices may be transmitted in a similar way or can use capacitive coupling or even an optical connection (IR).

The Contact card is the most widely used ICC to date largely because of its use as telephone prepayment card. Yes! The SIM card that we you use in our cell phones is just a Smart card without the plastic base. Most contact cards contain only a simple integrated circuit although some also use two chips; the other one is used to perform complex cryptographic computations (which I’ll explain shortly). The chip itself varies considerably between vendors and each takes it own way of programming application for it, but the Java Card™ initiative by Sun has made it a breeze to write Smart Card applications that can be downloaded onto the memory of these cards and can execute on any type of chip which supports the Java Card runtime environment. I’ll come to programming the Smart cards in next article of this series.

Smart Cards

Figure 2

Let us now consider the use of the 6 contacts used by the ICC:

Vcc is the supply voltage that drives the chips and is generally 3 to 5 volts with 10% deviation allowed. It used to be in 5-volt range prior to the recent move towards low power devices to make these cards.

Vss/GND pin is used to provide the substrate or ground reference voltage against which the Vcc potential is measured. It is usually 0 volts.

Reset is the signal line that is used to send the signal to the integrated circuit in order to reset it. This is a complex process that we shall describe later in more detail. There are two ways a card is reset:

  • Warm Reset: When a Signal is sent through this pin to reset the ICC. 
  • Cold Reset: When the supply voltage is turned off and on again. Ejecting the card out and inserting again will have the same effect.

Clock pin is used to drive the logic of the embedded IC and is also used as the reference for the serial communications synchronization. This pin is provided because the ICC doesn’t have any clock generator onboard and needs this as external input. The card reader device provides this clock. The clock frequency is 5MHz generally but many high end ICCs use frequency multipliers to operate at higher frequencies up to 40 MHz.

Vpp pin is now optional and used only in old cards. Previously it was used for the high voltage signal that is necessary to program the EPROM memory. It was provided with two voltage levels. The lower one (or the idle state) is held down by the Card Reader device, until the higher level (or the active state) is required.

I/O pin is the serial input/output (SIO) connector. This is the signal line by which the underlying circuit receives commands and interchanges data with the outside world. This process will be explained in more detail when we talk about programming applications that receive these commands.

What is ATR ?

ATR

ATR is used for conveying parameters that are required by the card to establish a data communication pathway. This message is conveyed as soon as the power in the smart card is set to on and stands for answer to reset (ATR).

It is usually up to 33 bytes, contains the transmission parameters such as T = 0 and T = 1, which are supported by the card. It also carries all the necessary information that is required to be known by the host such as:

  • Data transmission rate
  • Card hardware parameters
  • Chip serial number
  • Mask version number

What is an APDU?

Answer 
The APDU (Application Protocol Data Unit) is the communication unit between a reader and a card. The structure of an APDU is defined by the ISO 7816 standards.

There are two categories of APDUs: command APDUs and response APDUs. As the name implies, the former is sent by the reader to the card: it contains a mandatory 5-byte header and from 0 to up to 255 bytes of data. The latter is sent by the card to the reader: it contains a mandatory 2-byte status word and from 0 to up to 256 bytes of data.

The APDU is an application level protocol as specified in the ISO 7816-4, which takes place between a smart card and a host application for the communication purpose.

APDU consist of two structures, as defined below:

  1. Command APDU (C-APDU: this command is used by the host application to send command to the card.
    1. Header: it consist of 4 bytes:-
      1. Class of instruction (CLA)
      2. Instruction code (INS)
      3. Parameters: P1 and 2
    2. Optional body: varies in length.
      1. Lc = specifies the length of the optional body or the data field (Bytes).
      2. Le = specifies the length of the data or the number of bytes that the host is expecting in response to the command sent.
      3. Data field contains the data that are sent to the card for executing the instruction specified in the header. 
  2. Response APDU (R-APDU): this command is used by the card in order to respond to the command send by the host application.
    1. Optional body: it consist of data field whose length is specified by the Le
    2. Trailer: it consist of two words SW1 and SW2 called as status word, which denotes the processing state in the card after the execution of the command APDU.

Structure of the APDU is given below:

1. Command APDU

 

Mandatory Header Optional body
CLA INS P1 P2 Lc Data Field Le

 

2. Response APDU

 

Optional body Mandatory Trailer
Data Field SW1 SW1

 

Note:

  • A command is always paired with response APDU
  • The data field is optional in both command APDU and response APDU.

The second case further divides the command and response APDU in four categories.

  1. There is no transfer of data to or from the card
    1. C- APDU: contains header only.
    2. R- APDU: contains only the trailer status word. 
  2. There is no transfer of data to the card but data are returned from the card
    1. C- APDU: contains Le only, which specifies the number of data bytes in the corresponding response APDU. 
  3. There is transfer of data to the card but no data is returned from the card
    1. C- APDU: contains Lc and data field, Lc which specifies the length of the data field.
    2. R-APDU: contains the trailer status word SW1 and SW2. 
  4. There is transfer of data to the card and data is returned from the card
    1. C- APDU: contains Lc and data field and Le.
    2. R-APDU: contains both the optional body and the trailer status word SW1 and SW2.

Rebel Simcard update v21 Launched 10-July-2008

Supports mostly
2G Sim cards.

Universal Rebel Simcard support Virtually any phone using the Rebel STK Menu

Support for iPhone 3G firmware 2.1 or below 

Rebel STK Can change between 12 Modes

 

Download here

SIM FILE SYSTEM

The SIM maintains information in a series of “files” that are organized hierarchically, much like the operating system of a personal computer. These files may be for administrative purposes or be specific to the GSM user application. Data in these files are accessed through APDU commands sent to the operating system.

A file is composed of a header and a body. The header contains structure and attribute information and is managed by the operating system. The body, which is optional, contains the actual data. Files are uniquely identified by a two-byte hexadecimal number.

First Byte

GSM file type

3F

Master File

7F

Dedicated File

2F

Elementary File under the Master File

6F

Elementary File under a Dedicated File

GSM file type identifiers (first byte).

There are three different types of files on a SIM: a master file (MF), dedicated files (DF), and elementary files (EF). There is one master file on a SIM, which holds all the other files in a tree-like structure. Dedicated files are headers that hold hierarchical trees of elementary files, but don’t have data of their own. GSM defines two dedicated files immediately under the MF, DFGSM

containing GSM application files and DFTELECOM containing the application service features.

Elementary files (EF) have both a header and a body, and come in three flavors. The first, called transparent, is a binary file that can store information of varying length in any location. This is a raw, unstructured, random access file. The second is called linear fixed and stores data records that all have the same fixed length. The third is termed cyclic and is designed to store records in chronological order. It also uses fixed-length records, but when the last entry is full the next record overwrites the oldest entry.