TRNDlabs, a company that launches drone Conveyor released a movie the other day announcing the market introduction of Pokédrone.
Pokedrone role would obviously be catching Pokemon creatures from the game in the most difficult areas for the players entered.
They have already made dozens of tests and game syncs perfectly with the drone’s GPS location so that game enthusiasts to be able to play remotely. Pokedrone has options but automatic landing and take-off so as to focus only player in the game.
However, according to the verbs are a few small problems.
Selling a product with the word “poké” in the name, which I’m pretty sure Nintendo would have some legal issues with. (TRNDlabs views this as a “less urgent” concern at this point in time).
The drone claims to work by spoofing the GPS input from the iPhone to the Pokémon Go app with the drone’s GPS signal, which is not possible to do without jailbreaking your iPhone or using Apple’s dev tools.
Spoofing GPS is against the spirit of the game and my editor, Paul Miller, only approves of it in the case of stunts and Twitch Plays Pokémon Go. (It’s also probably against the terms of service of the game and would probably get you banned.)
The video depicts using the camera input of the drone with Pokémon Go‘s AR mode, which is also not possible to do without jailbreaking your iPhone or using Apple’s dev tools.
TRNDlabs actively working to drone and hopes to send for training with her soon.
Despite the great success that jailbreak iOS 9 enjoyed among the users, there were no few problems with the iOS devices. Most of them were small and due to the efforts of the Team Pangu – the authors of the Pangu untethered jailbreak – they are now fixed. A new update has been introduced both into the Pangu untether package and the jailbreak application. They are now available on Cydia.
The previous procedure to fix the issues was very complicated and involved running scripts and the use of a Secure Shell. Thanks to the PanguTeam, the procedure has become much simpler. Just a few days ago, the Pangu Jailbreak for iOS 9 untether package was updated on Cydia, while today a new update has been released, together with an update of the Pangu jailbreak application itself. It’s more than a welcome help, dealing with many of the existent bugs that troubled the users immediately after the first release.
One of the most important features of the update (identified on Cydia by the version number 0.3-1) is its capacity to block the annoying update system of the iOS 9 which compels users to take notice of the periodical firmware improvements. With the new 0.3-1 jailbreak update you are spared of being immediately bothered by the various software novelties (such as the future release of iOS 9.2). A further advantage is the prompt fixing of date and time issues on all the devices jailbroken with Pangu 9.
The updated Pangu tool is now available for all the major operating systems (Windows, Linux and UNIX). The new Pangu for iOS 9.3.3 version will trigger all these changes on the devices to be jailbroken from now on. Those who preferred to wait for the existing bugs to be fixed can see now that their waiting has paid off. The new jailbroken devices employing the latest Mac, Windows and Unix versions of Pangu will most likely not have to deal with many of the previous bug issues.
The Pangu untether has proved itself successful beyond the most optimistic expectations – there were 100.000 downloads in the first ten minutes after release and used to jailbreak more than seven million devices. Now with many of the initial small issues repaired, everything is set for a smooth jailbreaking experience. Additionally Cydia should be less under the user’s pressure these days, now that the rush of the first days has calmed down. Enter the links below in order to download the desired version of Pangu, and then our complete guide on jailbreaking iOS 9.2 will inform you in detail about all the necessary steps. If your device is already jailbroken with Pangu, then once Cydia starts you can find the updated Pangu package inside the Changes menu.
Changes tab at the bottom of the screen and you should see an update to the Pangu untether package, install, and you’re done.
Apple refuses to cooperate with the authorities when it comes to unlocking terminals iPhone, or iPad tablets, which set a security code and / or a fingerprint and a police station in the US has resorted to a method quite unusual to gain access to a victim’s terminal.
We are talking about a person who was killed, and to get access to data terminal or police in the US called for the creation of a mold 3D finger person, this mold with imprint used to unlock the device and using or trying to get access to data from the device.
Police called for the creation of molds 3D all 10 fingers of the victim, a laboratory in Michigan managed to do this, but unfortunately it is not known how many chances does the police to get access to the device, given the safety measures implemented or by Apple in the iOS.
Specifically, iOS requires a security code if the mark has not been used to unlock more than 48 hours, or if the terminal was restarted, but after three scans wrong the footprint is needed the realization of exactly the same procedure to gain access to data.
A 3D printed finger alone often can’t unlock a phone these days. Most fingerprint readers used on phones are capacitive, which means they rely on the closing of tiny electrical circuits to work. The ridges of your fingers cause some of these circuits to come in contact with each other, generating an image of the fingerprint. Skin is conductive enough to close these circuits, but the normal 3D printing plastic isn’t, so Arora coated the 3D printed fingers in a thin layer of metallic particles so that the fingerprint scanner can read them.
Although police did not know how successful it could be accessing data, death does not attempt, and in the future, if these procedures are done quickly enough, they could indeed allow accessing data from devices.