I also have a script for 3.1. This script will kill the open iPod app, copy the hacked version over it, disable security, prompt the user to launch the iPod, wait 15 seconds, enable security, and copy the unhacked app back. The hacked app seems to be still run out of the iPhone's RAM after the original is copied back, so this gives us the advantage of not having a broken iPod by default on a reboot.
Installation:
Usage options:
If you don't run the script with screen, it will not be able to restore the default app and turn security back on after you've left the terminal.
Installation:
- Install GNU Screen (Screen in Cydia or 'apt-get install screen')
- Rename the hacked app to MobileMusicPlayer_hack
- Rename the original app to MobileMusicPlayer_dist
- Save script code as autoUnlockiPod.sh in /var/root
Usage options:
- Annoying way: Run from root terminal: 'screen sh autoUnlockiPod.sh'
- Easy way: Using iSSH, create a SSH profile that connects to root@localhost and auto-runs "screen sh autoUnlockiPod.sh". This is a two-tap solution from Springboard.
If you don't run the script with screen, it will not be able to restore the default app and turn security back on after you've left the terminal.
Code:
#!/bin/bash
echo "Killing running iPod"
killall MobileMusicPlayer
cp /Applications/MobileMusicPlayer.app/MobileMusicPlayer_hack /Applications/MobileMusicPlayer.app/MobileMusicPlayer
sysctl -w security.mac.proc_enforce=0 security.mac.vnode_enforce=0
echo "iPod Unlocked! Leave terminal and launch iPod. You have 15 seconds!"
sleep 15s
cp /Applications/MobileMusicPlayer.app/MobileMusicPlayer_dist /Applications/MobileMusicPlayer.app/MobileMusicPlayer
sysctl -w security.mac.proc_enforce=1 security.mac.vnode_enforce=1
exit