DISCLAIMER: I do not take ANY responsibility for any damage that is done to your device. This is an unsupported tutorial. Notice #1: This tutorial is for experienced people that KNOW WHAT THEY ARE DOING! If you do not know what hex editing or anything of that nature is, then you risk having to restore your device if you follow this tutorial. Notice #2: This tutorial is based off of you having a patched kernel. Please go to the following pages to find out how to patch your kernel. Another option is Google. I am not providing any support for learning how to patch the kernel. Do not PM me about it. iPod touch 2g- http://theiphonewiki.com/wiki/index.php?title=Kirkwood_7A341_(iPod_touch_2G) No iPod touch 1g support at this time No iPhone support at this time No iPhone 3G support at this time No iPhone 3G support at this time First, You need to download Crypto: http://www.[PIRACY.mf].com/download.php?ylj3wilteyw Now, SSH into your iPod or iPhone and put that Crypto folder in the directory called “/" Now, get your patched kernel and OVERWRITE the kernel called kernelcache.s5l8***x in the folder /System/Library/Caches/com.apple.kernelcaches. After that, reboot your device. Now, you’re going to need to download a “Hex Editor.” Google search for them as they’re easy to find for all platforms. Now, lets take the ipt2g 3.1 beta iBoot file for example. Open the iBoot file in your Hex Editor and type “Ctrl F” or “Command F” on your keyboard, and search for GABK. Once your Hex Editor finds it, there should be a 32 byte long code called a KBAG. The KBAG for the 3.1 iBoot file is: 03 6c 35 5e ab bc 57 95 cc c5 d4 10 c9 7d 3c fb 26 3d 1d 48 7a c9 12 45 6a f0 4f 3f da f9 69 33 Now take away all the spaces from that and it would be: 036c355eabbc5795ccc5d410c97d3cfb263d1d487ac912456af04f3fdaf96933 Now, SSH into your iPod via any command line source. Don’t use MobileTerminal because there is far too much to type. Type “cd /Crypto” and now for the AES funcion. The syntax for the AES function is: ./aes dec GID <KBAG> So, the command for the iBoot file would be: ./aes dec GID 036c355eabbc5795ccc5d410c97d3cfb263d1d487ac912456af04f3fdaf96933 Copy and paste that into your command line source and press enter, it will now give you a 64 character long code such like this: e2d65d1b7c93c72680911f2efd4e3ec246df6b93c9c64e4731cc7cc9afa38908 That code is the IV and Key mashed into one. The IV is the FIRST 32 characters of that long code and the Key is the SECOND 32 characters of that code. So, IV: e2d65d1b7c93c72680911f2efd4e3ec2 Key: 46df6b93c9c64e4731cc7cc9afa38908 There you have it. If you need help, comment on this thread. Thanks.