Dry Ice Is Nice For Separating Broken Phone Screens

Smartphones are the opium of the people. If you need proof, just watch the average person’s reaction when they break “their precious”. Repairing smartphones has become a huge business. The most often broken item on phones is of course the front glass. In most cases, the screen itself doesn’t break. On newer smartphones, even the touchscreen is safe. The front glass is only a protective lens.

The easiest way to repair a broken front glass is to swap the entire LCD assembly. For an iPhone 6 plus, this will run upwards of $120 USD. However, the glass lens alone is just $10. The problem is that the LCD, digitizer and front glass are a laminated package. Removing them without breaking the wafer thin LCD glass requires great care. The hardest part is breaking down the optical glue securing the glass to the LCD. In the past that has been done with heat. More recently, companies from China have been selling liquid-nitrogen-based machines that cool the assembly. Now immersing a phone screen in -196° C liquid nitrogen would probably destroy the LCD. However, these machines use a temperature controller to keep a surface at -140° C. Just enough to cause the glue to become brittle, but not kill the LCD.

[JerryRigEverything] doesn’t have several thousand dollars for a liquid nitrogen machine, but he does have a $5 block of dry ice. Dry ice runs at -78.5°C. Balmy compared to liquid nitrogen, but still plenty cold. After laying the phone screens down on the ice for a few minutes, [Jerry] was able to chip away the glass. It definitely takes more work than the nitrogen method. Still, if you’re not opening your own phone repair shop, we think this is the way to go.

Broken phones are a cheap and easy way to get high-resolution LCD screens for your projects. The problem is driving them. [Twl] has an awesome project on Hackaday.io for driving phone screens using an FPGA. We haven’t seen it done with iPhone 6 yet though. Anyone up for the challenge?

Continue reading “Dry Ice Is Nice For Separating Broken Phone Screens”

Smartphone Hacking Without Risk – Plus, Broken Phones Needed

[Adam Outler] and [Rebellos] have been working feverishly to advance the world of mobile device hacking. They’re attacking on two fronts, making it easier for the common hacker to monkey with the phone’s firmware and OS with impunity, and by finding ways to make regular handsets into dev-hardware for low-level hacking.

The Hummingbird Interceptor Bootloader (HIBL) circumvents the chain of trust on smartphones running the Cortex-A8 family of processors. This opens a lot of doors, not the least of which is the ability to run any OS that you’re capable of porting to the hardware. We’re certain that Android builds will come first as they are open-source, but there’s talk of iOS or Windows Phone being run after some heavy assembly hacking.

But the two developers are trying to bring more people into the fold with their recent hacks. [Adam] has put out a call for your broken hardware. He needs your dead smartphone boards to reverse engineer the circuitry. Soldering one wire from the OM5 pin on the processor to the OM1 resistor will make the phones unbrickable (something we heard about back in July) and remove the need for soldering in a JTAG interface. With borked hardware in hand he pops off the processor and traces out this connection as well as the UART pins.

The soldering isn’t an easy process, but it’s a marked improvement that breaks down more barriers that keep people from hacking their coveted hardware. The clip after the break shows how easy it now is to recover your phone if something goes wrong while messing with the firmware or OS.

Continue reading “Smartphone Hacking Without Risk – Plus, Broken Phones Needed”

Broken Smartphones: Laptops In Disguise

Modern smartphones are a dizzying treatise on planned obsolescence. Whether it’s batteries that can’t be removed without four hours and an array of tiny specialized tools, screens that shatter with the lightest shock, or (worst of all) software that gets borked purposefully to make the phone seem older and slower than it really is, around every corner is some excuse to go buy a new device. The truly tragic thing is that there’s often a lot of life left in these old, sometimes slightly broken, devices.

This video shows us how to turn an old smartphone into a perfectly usable laptop. The build starts with a screen and control board that has USB-C inputs, which most phones can use to output video. It’s built into a custom aluminum case with some hinges, and then attached to a battery bank and keyboard in the base of the laptop. From there, a keyboard is installed and then the old phone is fixed to the back of the screen so that the aluminum body doesn’t interfere with the WiFi signal.

If all you need is internet browsing, messaging, and basic word processing, most phones are actually capable enough to do all of this once they are free of their limited mobile UI. The genius of this build is that since the phone isn’t entombed in the laptop body, this build could easily be used to expand the capabilities of a modern, working phone as well. That’s not the only way to get a functioning laptop with parts from the junk drawer, either,  if you’d prefer to swap out the phone for something else like a Raspberry Pi.

Thanks to [NoxiousPluK] for the tip!

Continue reading “Broken Smartphones: Laptops In Disguise”

5G Cellphone’s Location Privacy Broken Before It’s Even Implemented

Although hard to believe in the age of cheap IMSI-catchers, “subscriber location privacy” is supposed to be protected by mobile phone protocols. The Authentication and Key Agreement (AKA) protocol provides location privacy for 3G, 4G, and 5G connections, and it’s been broken at a basic enough level that three successive generations of a technology have had some of their secrets laid bare in one fell swoop.

When 3G was developed, long ago now, spoofing cell towers was expensive and difficult enough that the phone’s International Mobile Subscriber Identity (IMSI) was transmitted unencrypted. For 5G, a more secure version based on a asymmetric encryption and a challenge-reponse protocol that uses sequential numbers (SQNs) to prevent replay attacks. This hack against the AKA protocol sidesteps the IMSI, which remains encrypted and secure under 5G, and tracks you using the SQN.

The vulnerability exploits the AKA’s use of XOR to learn something about the SQN by repeating a challenge. Since the SQNs increment by one each time you use the phone, the authors can assume that if they see an SQN higher than a previous one by a reasonable number when you re-attach to their rogue cell tower, that it’s the same phone again. Since the SQNs are 48-bit numbers, their guess is very likely to be correct. What’s more, the difference in the SQN will reveal something about your phone usage while you’re away from the evil cell.

A sign of the times, the authors propose that this exploit could be used by repressive governments to track journalists, or by advertisers to better target ads. Which of these two dystopian nightmares is worse is left as comment fodder. Either way, it looks like 5G networks aren’t going to provide the location privacy that they promise.

Via [The Register]

Header image: MOs810 [CC BY-SA 4.0].

Flexiphone Rises From The Ashes Of Broken Instruments

The mechanics of an old Rhodes Piano, and a set of chromatic saucer bells rescued from a reed organ. What do these two things have to do with each other? If you’re [Measured Workshop], they are the makings of a new instrument. The Flexiphone is a transposable instrument with a piano keyboard and interchangeable sound source.

The Rhodes is a great stage instrument. Unlike a piano with strings, it uses tines mounted above the key mechanism. It is also relatively compact for an analog instrument. This made it perfect as a donor for the Flexiphone’s keyboard. [Measured Workshop] cut they mechanism down to 30 keys, just under 2 octaves. The key mechanism was also cleaned up and restored with new felt.

The sounding portion of the Flexiphone is a set of chromatic saucer bells. The bells are mounted on a felt covered threaded rod, which itself sits in a wood frame. The bell frame sits on top of the base in one of three slots. Each slot is a halftone transposed from the last. Simply moving the bells allows the player to transpose the entire instrument. The bells and their rod frame can also be completely removed and replaced with any other sound source.

The Flexiphone sounds great — sometimes. As [Measured Workshop] says, bells contain many harmonics. playing single or double notes sounds rather sweet, but chords can sometimes become a shrill assault on the ears. Still, it’s an awesome hack with plenty of potential for future mods.

Continue reading “Flexiphone Rises From The Ashes Of Broken Instruments”

Flash For Jailbroken IPhones

flashiphone

Hackers are continuing to outpace Apple with feature additions. The team at iMobileCinema has created a flash plugin for the Mobile Safari browser. It’s a beta release and still a bit buggy. This app is only available to people who have jailbroken their iPhones. You just need to add d.imobilecinema.com to your sources in Cydia to get the package to appear. While it can crash from time to time, it’s certainly better than no support at all.

[via Gizmodo]

IPhone 2.1 Firmware Jailbroken

The iphone-dev team seems to still be on top of their game. Only a day after the iPhone 2.1 firmware update was released, they’ve updated both the PwnageTool and QuickPwn to deal with the release. They haven’t begun work on the iPod Touch 2G yet, since no one on the team has one yet.

We tend to agree with Engadget; jailbreaking is becoming less and less important to casual users. Now average users can buy an iPhone in their own country and run apps from the official store. A much different place than we were only a year ago. We know most of our audience are power users though and definitely want out of Apple’s walled garden, but that’s only a small percentage of iPhone users.