Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
You may have tried an earlier version of FlickTunes. You can scroll through your songs, playlists, albums and podcasts, just like in iTunes. And it's true you can't go straight from spotlight to FT, but you can search in spotlight, start the music playing in iTunes, then just switch to FT and it works fine.

I haven't figured out the charging issue yet. I just ordered a Griffin adapter. Will let you know how that works.
 
I bought a scorchse power adaptor and when connected to the vw facory ipod connector it charges.
I am currently using flick tunes and it seems to work pretty well.
Only major bummer is steering wheel based controls to change tracks do not work.
I can live with that and the ugliness of the flick tunes screen.
In my opinion way better than the splash screen of death and all the messing about to jailbreak and modify the music player.

All good
 
As an Amazon Associate, MacRumors earns a commission from qualifying purchases made through links in this post.
No jailbreak required and works a treat

Just wanted to add to my earlier post.
The purchased power adapter and flick tunes work seemlessly with the iPhone 3G and the VW factory fit connector.
Full control over the track list is still possible via the steering wheel controls (in my haste I didn't check it was in audio control as opposed to computer/fuel use mode) :rolleyes:

For me this is click, bang done.

It now does everything the piece of crap ipod factory fit connector was supposed to do.

Flick tunes displays the album artwork and stays on (cover flow) the whole time to just one little glance and you can see.

You simply add the track/playlist to flick tunes when you launch it each time and it simply plays the tracks/playlist/albums out of the ipod music folder so it is not doubling up or re-creating tracks.

For 99c it's an absolute WINNER

Thanks for all the tips and downloads to hack the iPhone to work, but from here on in Flick Tunes is the G.O for this little fish

Adious Amigos
 
Bad news folks. The fact that a third-party app like mine (I'm the author of FlickTunes -- Hi!) was working with head units that lock out iPod controls was a "bug" that Apple has closed in OS 3.1. If you want to keep using FlickTunes with your head unit(s), do not update to OS 3.1 or it will break. I've been in contact with Apple over this issue, and it's unlikely they'll change it since they did it on purpose.
 
Bad news folks. The fact that a third-party app like mine (I'm the author of FlickTunes -- Hi!) was working with head units that lock out iPod controls was a "bug" that Apple has closed in OS 3.1. If you want to keep using FlickTunes with your head unit(s), do not update to OS 3.1 or it will break. I've been in contact with Apple over this issue, and it's unlikely they'll change it since they did it on purpose.

So we need to know if the MobileMusicApp Hack still works on fw 3.1

Whenever dev team will release the jailbreak tool I will try :)
 
I just finished hex'ing 3.1 (iPhone 3G), it seemed to be going smoothly until I ran ldid.

Code:
iPhone:/Applications/MobileMusicPlayer.app root# ldid -S /Applications/MobileMusicPlayer.app/MobileMusicPlayer
codesign_allocate: object: /Applications/MobileMusicPlayer.app/MobileMusicPlayer malformed object (unknown load command 4)
util/ldid.cpp(582): _assert(0:WEXITSTATUS(status) == 0)

MobileMusicPlayer will launch after entering 'sysctl -w security.mac.proc_enforce=0 security.mac.vnode_enforce=0', but this does not survive reboots.

It does still eliminate the accessory connect message. We just need to figure out why ldid isn't doing it's thing..

Here's the file post-hex:
http://www.filedropper.com/mobilemusicplayer_1
 
I just finished hex'ing 3.1 (iPhone 3G), it seemed to be going smoothly until I ran ldid.

Code:
iPhone:/Applications/MobileMusicPlayer.app root# ldid -S /Applications/MobileMusicPlayer.app/MobileMusicPlayer
codesign_allocate: object: /Applications/MobileMusicPlayer.app/MobileMusicPlayer malformed object (unknown load command 4)
util/ldid.cpp(582): _assert(0:WEXITSTATUS(status) == 0)

MobileMusicPlayer will launch after entering 'sysctl -w security.mac.proc_enforce=0 security.mac.vnode_enforce=0', but this does not survive reboots.

It does still eliminate the accessory connect message. We just need to figure out why ldid isn't doing it's thing..

Here's the file post-hex:
http://www.filedropper.com/mobilemusicplayer_1

I had the same prob. It was because I incorrectly hexed my file. I d/led one off this forum then everything ran smoothly. For more info, checkout some of my last posts.
 
I think the hex edit was correct. I did another patch just to be sure and I got the same results. The md5sum of the modded file matches - b0a36c69354e119648317e9e50621914. The original md5sum of my MobileMusicPlayer is 08bed76a68118abb962271705dac5da6.

http://www.filedropper.com/mobilemusicplayermod2

This time I did it using HEX search and replace functions. Here are the strings I used:

Code:
ASCII
HEX Before
HEX After

wantsSplashView
77 61 6E 74 73 53 70 6C 61 73 68 56 69 65 77
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

hideSplashView
68 69 64 65 53 70 6C 61 73 68 56 69 65 77
00 00 00 00 00 00 00 00 00 00 00 00 00 00

showSplashView
73 68 6F 77 53 70 6C 61 73 68 56 69 65 77
00 00 00 00 00 00 00 00 00 00 00 00 00 00

setSplashViewImage:
73 65 74 53 70 6C 61 73 68 56 69 65 77 49 6D 61 67 65 3A
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

exitPlayerForAccessorySplash
65 78 69 74 50 6C 61 79 65 72 46 6F 72 41 63 63 65 73 73 6F 72 79 53 70 6C 61 73 68
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

_accessorySplashViewWillAppearNotification:
5F 61 63 63 65 73 73 6F 72 79 53 70 6C 61 73 68 56 69 65 77 57 69 6C 6C 41 70 70 65 61 72 4E 6F 74 69 66 69 63 61 74 69 6F 6E 3A
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

AccessorySplashViewWillAppearNotification
41 63 63 65 73 73 6F 72 79 53 70 6C 61 73 68 56 69 65 77 57 69 6C 6C 41 70 70 65 61 72 4E 6F 74 69 66 69 63 61 74 69 6F 6E
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

splashViewImage
73 70 6C 61 73 68 56 69 65 77 49 6D 61 67 65
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

_splashView
5F 73 70 6C 61 73 68 56 69 65 77
00 00 00 00 00 00 00 00 00 00 00
 
Running 3.1 on iPhone 2g (1st gen).

I did the following in Terminal (after copying the hacked MMP):

ssh root@10.0.0.6
root@10.0.0.6's password:
iPhone:~ root# apt-get install ldid
-sh: apt-get: command not found

None of the commands that Aptitude and Erica Utilities supposedly enable are working. Any thoughts?
 
Bad news folks. The fact that a third-party app like mine (I'm the author of FlickTunes -- Hi!) was working with head units that lock out iPod controls was a "bug" that Apple has closed in OS 3.1. If you want to keep using FlickTunes with your head unit(s), do not update to OS 3.1 or it will break. I've been in contact with Apple over this issue, and it's unlikely they'll change it since they did it on purpose.

Are you serious!?!?!

My car's been in the shop and I haven't driven it for the last 10 days. I can't believe it. I already upgraded to 3.1. I'm going to be so bummed when I plug in and I'm blocked out again.

Can you tell us why Apple does this? It doesn't seem to have any real purpose -- other than to screw up a small number of people's lives.
 
Running 3.1 on iPhone 2g (1st gen).

I did the following in Terminal (after copying the hacked MMP):

ssh root@10.0.0.6
root@10.0.0.6's password:
iPhone:~ root# apt-get install ldid
-sh: apt-get: command not found

None of the commands that Aptitude and Erica Utilities supposedly enable are working. Any thoughts?

You need to either install ldid ("Link Identity Editor") through Cydia, or install "Apt 0.7 Strict" through Cydia and then install via apt-get. I'm curious if you're going to get the same ldid results that I did.
 
You need to either install ldid ("Link Identity Editor") through Cydia, or install "Apt 0.7 Strict" through Cydia and then install via apt-get. I'm curious if you're going to get the same ldid results that I did.

Thanks! Installing ldid through Cydia worked. Oddly, I had Apt 0.7 Strict installed the whole time, but I still could not run apt-get to install ldid through Terminal.

I got the same ldid output as you orion:

iPhone:~ root# ldid -S /Applications/MobileMusicPlayer.app/MobileMusicPlayer
codesign_allocate: object: /Applications/MobileMusicPlayer.app/MobileMusicPlayer malformed object (unknown load command 4)
util/ldid.cpp(582): _assert(0:WEXITSTATUS(status) == 0)

MMP ran after running sysctl -w security.mac.proc_enforce=0 security.mac.vnode_enforce=0

i have not tried a reboot
 
Looks like ldid is broken in 3.1? I'll read up on this here.

Unfortunately disabling proc_enforce and vnode_enforce long-term seems to break some things such as wifi and email until it's enabled again.
 
Looks like ldid is broken in 3.1?

Unfortunately disabling proc_enforce and vnode_enforce long-term seems to break some things such as wifi and email until it's enabled again.

iPhone Settings thinks wifi is missing, but the status bar says wifi is connected (and it is). Email still works fine for me.

Also, I just ran: sysctl -w security.mac.proc_enforce=1 security.mac.vnode_enforce=1

and wifi is back in iPhone Settings and the hacked MMP still runs.
 
iPhone Settings thinks wifi is missing, but the status bar says wifi is connected (and it is). Email still works fine for me.

Also, I just ran: sysctl -w security.mac.proc_enforce=1 security.mac.vnode_enforce=1

and wifi is back in iPhone Settings and the hacked MMP still runs.

Are you sure it wasn't just still running the process started with proc/vnode enforcing disabled? Have you rebooted?
 
I've contacted the author of ldid, he has confirmed that this is an issue with codesign_allocate, not ldid. A new version of codesign_allocate should be out soon.

He has also suggested that we look into developing this hack in a more intelligent way such as MobileSubstrate.
 
I've contacted the author of ldid, he has confirmed that this is an issue with codesign_allocate, not ldid. A new version of codesign_allocate should be out soon.

He has also suggested that we look into developing this hack in a more intelligent way such as MobileSubstrate.

I had some weird behavior on MMP over the weekend (constant cycling of songs when hooked up to my VW). Then, for no apparent reason, MMP refused to load.
 
He has also suggested that we look into developing this hack in a more intelligent way such as MobileSubstrate.

This would be much better but would also take someone who really knows what they're doing....unlike the way we've been making this work. I'd be willing to pay a few bucks for a JB app that would accomplish this.
 
I successfully hacked a JB 3.0.1 3GS using the steps recently mentioned. Also got the assert when trying to do ldid but it still worked (I assume I'm going to have to re sysctl when I restart, haven't tried yet).

I also set the security parameters back to 1 once MobileMusicPlayer was launched, everything seems to be working fine. I guess the security is done on launch and once the program is running you can set it back (MMP runs in the background until you kill it or do something like FreeMemory).

Hopefully a new ldid (or codesign_allocate) will come out soon so as to make the hack perfect!

EDIT: Yes, once you restart you're going to have to re-sysctl. Working on making a script plus springboard icon to auto-do this.
 
For those of you who want to make the process of turning the security on/off easier until a new ldid is available, here is what I did:

1. Install the "sudo" and "nano" console packages in Cydia.
2. Open MobileTerminal.
3. su into superuser mode.

Sudo is a program that lets regular users run a command as root. We are going to change it's config file so that the mobile user can always run commands as root without having to bother with a password.

4. Delete the current config. Type "rm /etc/sudoers".
5. Make a new config. Type "nano /etc/sudoers". Then, type in "%mobile ALL=(ALL)NOPASSWD: ALL"
6. Make a down-right swipe on MobileTerminal, activating Control. Press "x". When asked to save, type "y".
7. Type in "chmod 0440 /etc/sudoers".
8. Type "exit" to leave the su session.

Now, you can always run a program as root (without going into a su session with a password by typing "sudo command").

9. Using nano, create two files in /var/mobile (the default directory when you start MT). The first can be called "security_off.sh". In it, put the command to turn the security off, "sysctl -w security.mac.proc_enforce=0 security.mac.vnode_enforce=0". Do the same for a security_on.sh with the settings =1.
10. Do a chmod 777 filename on both files.

Now, you can open MobileTerminal, put in "sudo security_off.sh" to turn it off, and then leave, run MobileMusicPlayer, then do "sudo security_on.sh" to get WiFi back!

Someone just needs to make a way to have SpringBoard icons that run shell scripts and we'd be all set!
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.