is anybody working to bypass the activation? this is just a block of code that should be possible to isolate and create an executable/library without the block.
The problem here is that Apple servers are involved in the activation lock procedure - someone may be able to patch it on the phone but they can't alter the server-end code so the patch will never be fully operational.
Probably something like:
* the phone comes up with a series of numbers (based on IMEI number, time stamp, etc), hashes or encrypts them and sends that to the server
* the server comes up with the same numbers and hashes or encrypts them
If the hashes/encryption from the phone don't match that of the server, then the security handshake is denied. If the "package" was signed on the iPhone before being sent to the servers, then the first step the server would complete is to check for proper key usage. If the wrong key was used for signing then the server would silently kick that package to the curb and not give it a second thought.
The trouble is that a hacker doesn't know what the server is expecting (hash, encryption algorithm, key signing, etc.), or how the server is going to process the information, so it's difficult to come up with something that will effectively fool the servers.
I'm not sure that is exactly how it works but I would try to use something that isn't easily reverse engineered, such as SHA-512 and/or AES-256, RSA key signing, if I were to create such a system. I'm not a cryptographer or even a security specialist, so I can only imagine what Apple used in this procedure.. they've more resources at their disposal.