Hackers have been hard at work on the iPhone from a couple of angles. The iPhone restore image has been making the rounds, and hackers quickly discovered two disk images in it: one is a small ramdisk image (694-5259-38.dmg) that kickstarts the other, larger, and sadly, encrypted image (694-5262-39.dmg). There are a lot of folks trying to brute-force the 694-5262-39.dmg image, but it’s going to take a long time. Could the password be lurking somewhere in the ramdisk image? Perhaps it’s inside iTunes itself? Time and energy will tell. For now, I suggest lurking in #iphone on irc.osx86.hu (please don’t ask general questions about the iPhone; that channel is for iphone reverse engineering only, so if you’re not actively involved, it’s best to lurk).
DayLateDon posted a message to the iPhoneWebDev group with a summary of advice that some iPhone web developers got directly from Apple. Definitely worth a read.