Hackszine has a great round up of all the iPhone hackery that has begun…

activatemeiphone2.jpg

Hackers have been hard at work on the iPhone from a couple of angles. The iPhone restore image has been making the rounds, and hackers quickly discovered two disk images in it: one is a small ramdisk image (694-5259-38.dmg) that kickstarts the other, larger, and sadly, encrypted image (694-5262-39.dmg). There are a lot of folks trying to brute-force the 694-5262-39.dmg image, but it’s going to take a long time. Could the password be lurking somewhere in the ramdisk image? Perhaps it’s inside iTunes itself? Time and energy will tell. For now, I suggest lurking in #iphone on irc.osx86.hu (please don’t ask general questions about the iPhone; that channel is for iphone reverse engineering only, so if you’re not actively involved, it’s best to lurk).

The other end of things is iPhone JavaScript hacking. Ever since Apple promised that you’d be able to make phone calls and access other iPhone functions from with Ajax widgets, we’ve been wondering where the glue lives. There are a few people exploring the JavaScript capabilities, include Joe Hewitt, who has released Firebug for iPhone, which lets you send debugging messages to your desktop browser and also execute JavaScript commands on the iPhone.

DayLateDon posted a message to the iPhoneWebDev group with a summary of advice that some iPhone web developers got directly from Apple. Definitely worth a read.

Eccentric Cycles has been investigating a number of JavaScript events on the iPhone, and links to some examples you can try out.

Hackszine.com: iPhone-state of the hacks – Link.