I love my iPod, but apparently so do scores of tenacious hackers. These rogues have created a number of iPod hacks even though Apple hasn’t opened its architecture. The iPod’s closed architecture is good at keeping competitors at bay. But it also limits what users can ultimately do with the device.
But here’s the real […]