The concept of hacking a device to run unauthorized or modified software, or to bypass security measures, has been around since the early days of computing. In the context of Symbian and similar mobile operating systems, this often involved exploiting known vulnerabilities to gain elevated privileges or to install software that wouldn't normally be allowed.