Provided you haven’t been toiling away in a secret lair somewhere (we’re looking at you [Jack]), odds are you may have seen the news that [Steve Jobs] stepped down as CEO of Apple this past Wednesday.
This earth-shattering news even eclipsed that of the East Coast Megaquakeapocalypse. It sent the blogosphere into a tizzy, sparking a whirlwind of news posts and retrospectives on his career. It’s been impossible to ignore the coverage (we’ve tried), and since we see everyone else writing about it, we feel the need to be at least somewhat up on our current events as well.
At the end of the day though, we don’t care how many patents [Steve] owns, how many failed products he has dreamed up over the years, or that he and [Woz] used to wear matching thongs to the beach in the 80s*.
Nope, we just care about the hacks. So here’s a trip down memory lane highlighting the Apple-related hacks we’ve seen so far in 2011, which will forever be known as the year [Steve Jobs] gave up the reigns at Apple (again).
XBMC on iOS Devices
Overhauling an old Apple keyboard
Mac Pro serial terminal
Taking secret photos of Apple Store patrons
Apple ][ USB keyboard conversion
Apple ][ Weather Display Parts 1, 2, 3
When you think about hacking laptops, it’s highly unlikely that you would ever consider the battery as a viable attack vector. Security researcher [Charlie Miller] however, has been hard at work showing just how big a vulnerability they can be.
As we have been discussing recently, the care and feeding of many batteries, big and small, is handled by some sort of microcontroller. [Charlie] found that a 2009 update issued by Apple to fix some lingering MacBook power issues used one of two passwords to write data to the battery controllers. From what he has seen, it seems these same passwords have been used on all batteries manufactured since that time as well. Using this data, he was subsequently able to gain access to the chips, allowing him to remotely brick the batteries, falsify data sent to the OS, and completely replace the stock firmware with that of his own.
He says that it would be possible for an attacker to inject malware into the battery itself, which would covertly re-infect the machine, despite all traditional removal attempts. Of course, replacing the battery would rectify the issue in these situations, but he says that it would likely be the last thing anyone would suspect as the source of infection. While using the battery to proliferate malware or cause irreversible damage to the computer would take quite a bit of work, [Charlie] claims that either scenario is completely plausible.
He plans on presenting his research at this year’s Black Hat security conference in August, but in the meantime he has created a utility that generates a completely random password for your Mac’s battery. He says that he has already contacted Apple to in order to help them construct a permanent fix for the issue, so an official patch may be available in the near future.
When Google released their ADK allowing Android smart phones to interact with Arduino-based devices, we’re sure there were at least one or two iPhone users who felt left out. Thanks to the folks over at Redpark, those people can now interact with an Arduino without having to jailbreak their phone.
For anyone looking to do any sort of iPhone/Arduino interaction, this is a good thing – except for the price. The 30-pin to serial cable is currently available over at Make for $59, which honestly seems pretty steep to us. When we first saw this announced, our initial thoughts were that we would see an open-source version in no time.
Unfortunately, that idea was short-lived, as we were quickly reminded of Apple’s MFI program. If you are not familiar, MFI (aka Made for iStuff) program limits what can be connected to an iDevice via licensing fees and a boatload of legal agreements. While we won’t be picking up this dongle any time soon, we’re all ears if someone has done any reverse-engineering of those pesky MFI chips.
Looks like the men in black have paid [Kyle McDonald] a little visit. The United States Secret Service is investigating him for fraud and related activity for his People Staring At Computers project. We just took a look at that one yesterday, and were thankful that all he was doing was taking people’s pictures and not stealing their information. Looks like [Uncle Sam] wasn’t being as lenient–or it could have been Apple that did the complaining since mums the word from the corporate giant. [Kyle’s] also keeping his mouth shut after soliciting the advice of the Electronic Frontier Foundation.
Since details are scarce, it’s time to play armchair lawyer. Let us know in the comments what you think [Kyle] might be up against, and whether we’ll see this thing hit the courts or not. And remember not to take those comments as legal advice since none of us actually know what we’re talking about.
By the way, the gentleman seen above isn’t [Kyle], he’s one of the unsuspecting ‘victims’ with some wikimedia commons slapped in for effect.
[Thanks Craig, David, and others]
Reader [Brett] sent in the build log of his beautiful set of Apple-inspired computer speakers for us to look over. Having seen our recent post on DIY speakers, he thought he would throw his hat into the ring as well, and we’re glad he did.
He wanted a nice set of speakers to complement his iMac, but couldn’t find anything he liked that would provide the sound quality he was looking for while closely matching the design of the computer. The speakers are constructed out of MDF with CNC milled acrylic front and back panels. Hand-built crossovers reside inside the speaker boxes, which provides for a clean, polished look. He originally planned on building a pair of subwoofers into his desk, but ultimately settled on building a single subwoofer to sit on the floor.
The finished product is simply stunning, and we would have a hard time believing they were a DIY project if we didn’t see them come together piece by piece. Do you think you can match [Brett’s] handiwork? If so, feel free to share your speaker builds in the comments.
It seems that the iPhone 2g and 3g are the newest phones to get Android 2.2, codenamed Froyo. The process for installing Froyo if you have a jailbroken device seems to get even easier every time, with this revision being as simple as adding a repository, downloading Froyo, and pressing go. Follow the link for a wonderful step by step guide, complete with screenshots to take out all of the guess work. Android on iPhone sure has come a long way since the first time we covered it.
[Warrior_Rocker] pulled off his own Apple Studio Display hack by removing the cable and adding ports. As we saw in Wednesday’s post, these displays use a cable with a proprietary connector that combines DVI, USB and Power. Instead of altering the cable, [Warrior_Rocker] removed it completely. By wiring up a standard barrel jack for power, a USB type-B socket, and a DVI port, he can now use standard video, power, and USB cables to connect to the monitor.
This project was actually submitted to us on May 25th and we missed it. It’s sad that sometimes tips fall through the cracks, and we’re sorry that we missed this particularly well-executed hack. [Warrior_Rocker] wrote in asking why his project didn’t qualify after seeing the similar post on Wednesday. So please don’t take it personally if your project doesn’t get posted. If you think it fits right in here at Hackaday and haven’t heard anything after two weeks or so, consider sending to us again.