Bug Labs, the company that makes modular electronics that allow you to build your own tech doohickeys quickly and easily, has announced five new modules: BUGprojector, a mini DLP projector developed in conjunction with Texas Instruments, which sounds very much like the tiny DLP projector we posted about last week; BUGsound, an audio processing module with four stereo input/output jacks, a microphone, a speaker, and builtin hardware codecs; BUGbee (802.15.4) and BUGwifi (802.11 and Bluetooth 2.0+EDR), which will let you connect wirelessly with your PAN and WLAN, respectively; and BUG3g GSM, for connecting to (you guessed it) 3G GSM networks. In conjunction with Bug Labs’ existing series of modules, especially the highly versatile BUGvonHippel universal module, you’ll be able to create some pretty kickass gadgets. No word yet on pricing, although Bug Labs expects to ship by the end of Q1 2009.
To appease people waiting for the iPhone 3G unlock, iphone-dev team member [MuscleNerd] did a live video demo this afternoon. The video shows him removing the AT&T SIM and putting in a T-Mobile SIM. After the switch, the phone shows no connectivity. He then runs “yellosn0w” in an SSH session with the phone. The phone then unlocks without needing to be rebooted and the signal bars appear. The final test shows the phone receiving a call.
The target for this release is New Year’s Eve and it doesn’t support the most recent baseband. Well be attending the 25C3 talk hosted by [MuscleNerd] and other team members. The VNC screen you see in the video is thanks to [saurik]’s Veency.
iPhone dev team is at it again. They claim to have finally hacked the iPhone 3G. Originally codenamed “yellowsn0w”, it is targeted to be released on December 31st. This should free you from your locked in carrier as long as you have version 2.11.07 or earlier.
Working as quick as ever, the iphone-dev team have updated the PwnageTool and QuickPwn to work with the new iPhone 2.2 firmware update. The trouble with the new firmware is that it updates the baseband of the phone, which could potentially undo any progress made towards an iPhone 3G unlock in the future. If you don’t care about that, you can use QuickPwn to jailbreak your phone after the upgrade, so you can run any app you want. If a future unlock is important to you, use the PwnageTool to strip the baseband update out of the firmware update.
[tnkgrl] is back with part three of her Acer Aspire One hacking. This time she’s adding in 3G. You may look at the picture the above and think, “Cake. She just plugged the card in”. No, the Acer doesn’t ship with the mini-PCIe slot or the SIM card holder. First you have to solder a right angle mini-PCIe connector to the board pads and bridge two others to provide power. The SIM holder was another problem. She wasn’t able to find a pin compatible one. The one she installed is mounted to a riser so she could change the wiring order (let her know if you can find the correct part). This mod definitely requires some good soldering skills and she warns that even she managed to destroy a SIM in the process.
The Dell Mini 9 is another netbook that doesn’t have the appropriate connectors soldered on board, but JKK has a work-around. You need a 3G modem that has the SIM card on board. You plug it into the WiFi slot after taping over a few pins and then use a USB WiFi card instead.
Watch in wonder as forensics expert [Jonathan Zdziarski] takes you step by step through the process of bypassing the iPhone 3G’s passcode lock. Gasp in amazement as he creates a custom firmware bundle. [Jonathan], creator of NES.app a Nintendo emulator for the iPhone, is well respected for his work on opening the iPhone. In this presentation, he sheds some light on the forensics toolkit he helped develop for law enforcement agencies that we covered earlier.
The iphone-dev team hasn’t been resting on their laurels since releasing the iPhone Pwnage Tool 2.0 nearly two weeks ago and decided to update everyone on their progress. Despite the iPhone 2.0 jailbreak, there still isn’t a way to unlock a 3G phone. They’ve managed to do other things like downgrade a 3G to an older baseband firmware, which demonstrates their ability to bypass security checks and run unsigned code on the baseband. A nice side effect of all the downgrade work is that they’ve perfected the percautions they take to prevent bricking. The team has been following threads about using SIM proxy devices for unlocks as well, but concluded that the devices are a kludge at best and reliability can vary wildly depending on the phone’s location. They also pointed out the fine work that RiP Dev has been doing on Installer 4 which will help you install software that isn’t from the AppStore.