Hellow, I just jailbroke my iPhone, and I have a very stupid question about OpenSSH.
Can it be used as a hard drive to store data?
Thanks
Since the iPhone is connected via a USB cable, wouldn't the max rate = max USB speed?Also, how fast is the transfer rate for very large files (1gb+)?
Since the iPhone is connected via a USB cable, wouldn't the max rate = max USB speed?
That's why I said the max rate is the rate of the USB connection.Less as SSH is encrypted...
Doesn't OpenSSH use WiFi?![]()
Hellow, I just jailbroke my iPhone, and I have a very stupid question about OpenSSH.
Can it be used as a hard drive to store data?
Thanks
Why not just use Files/Files Lite from the App store? I've got Files Lite and it works pretty well.
Hmm... If you had a Mac you could just install Netatalk and your iPhone will show up in the Finder like a network drive.
I read using Winscp and OpenSSH will take you to the root directory of my iPhone. Mabye I can create a folder?
Also, how fast is the transfer rate for very large files (1gb+)?
The iPhone disk is separated into 2 volumes. User Data (/private/var) and Root (/). The root volume is read-only so I wouldn't try to put files there. It also has a limited size by default of 300MB, unless you increased in your jailbreaking process. "Best" place if you just wanted to SSH into the phone and use SCP to put files, would be creating a folder at the top level on the user partition.![]()
^ Good Info.
Although, there is a free USB alternative for using your phone for file storage.
http://www.digidna.net/diskaid/
ps - no jailbreak needed.
Not too shabby.
Does DiskAid give you access to the complete file system? Root partition and all? I'm doing research on the forensic analysis of the iPhone for grad work. In my readings, it was recommended that AFC (protocol used to communicate via USB through iTunes) not be used since it's proprietary and juries may not understand the process as much as standard protocols such as SSH and WiFi. I wonder if utility could be morphed to capture a complete disk image.![]()
There are only two ways that I can think of to get a bit-for-bit copy of the full FS (which is what you'd need for forensic work):
1) If the phone is jailbroken, using something like 'dd' on the root partition block device.
2) If the phone isn't jailbroken, take out the flash and dump it manually.
2.5) Use JTAG to dump the flash.
Other than that, you're SOL unless MobileDevice has a way to dump the full FS (which, last I checked, it didn't.)