BlackBerry Storm 2 Teardown

blackberry_storm_2

Photos of the BlackBerry Storm 2, both inside and out, have been leaked. Engadget provides us with the specifics, going into detail about the four large piezoelectric pressure sensors that sit underneath the screen. It looks as though the screen will still function as a button, just without the physical movement of the previous model that received mixed reviews. For a better explanation of the technology behind the phone’s innovative screen, here’s a video describing it in more detail and a writeup over at the CrackBerry forums.

BlackBerry Storm Click Screen Teardown

clickscreen

RIM has decided to venture into the touchscreen phone market with the new BlackBerry Storm. Unlike other companies’ offerings, the Storm has a touchscreen that clicks when you press it. phoneWreck disassembled the Storm to see what magic was involved in the device. There’s not much too it, it’s just a big button. pW notes that the entire phone board is very compact mostly due to RIM using Qualcomm’s latest MSM7600 chip. Items like bluetooth, GPS, and USB are all included in the processor instead of appearing on the board as discrete components.

phoneWreck recently launched and promises many future teardowns. They’ll be adding to their archive which already includes the Motorola Krave and the venerable Nokia N95. We’ll definitely be watching for their future releases.

[via Engadget]

Gizmodo’s Guide To Smartphone OSes

Gizmodo’s in-depth look at smartphone OSes provides you with the pros and cons of each, allowing you to make an educated decision, if you’re in the market for a phone that also has email, a web browser, a calendar, and a decent contacts manager. If you’re attracted to the open source Linux-based Android by Google, you’ll also have to keep in mind that there aren’t that many business features. Other contenders include the Blackberry by RIM, which is great for email, but is completely closed and proprietary. The Apple iPhone is very pretty but lacks some basic features. They cover Symbian, Windows Mobile, and Palm Garnet too. It’s certainly a handy guide since most people haven’t used all six.

44% Of Used Phones Contain Sensitive Data

In a recent study, researchers were able to garnish all kinds of sensitive data from second hand mobile devices.  Of the units tested, 44% contained information such as salary details, bank account information, business plans, personal medical details, personal insults, and address book data.  Next time you get a used device, take a good look around. You never know what you may find.

[via Zero Day]

22C3 Day 10 And 11 Round Up

bb
Now that the CCC is over, we finally dug ourselves out of a ginormous pile of cables (Kabelsalat ist gesund!) to bring you this round up post about the best stuff from the last two days of the con.

First up on day 10 was I See Airplanes!, Eric Blossom’s excellent speech on creating hardware for making homebrew radars and software using the GnuRadio project. He uses bistatic passive receivers in the 100 MHz range doing object detection using other peoples’ transmitters. The project has a lot yet to accomplish including the use of helical filters (if there are any antenna freaks reading this, contact Eric, he’s looking for a bit of help).

Next on the third day we attended Ilja van Sprundel‘s huge fuzzing  extravaganza. Fuzzers generate bad data that is designed to look like good data and will hopefully break something in an interesting way. Our fav part? When the list of irc clients broken by his ircfuzz tool was so long he had to use 10pt font to get it all on one slide (see slide 53)! His paper can be found here and the slides here.

We then wandered to Harald Welte‘s talk on hacking the Motorola EZX series phones (which we’ve reported on here before). In case you forgot, the EZX series has a linux kernel. Incidentally the phone runs lots of stuff it really doesn’t need (like glibc, 6 threads for just sound processes, and even inetd). He presented the project for the first time in an official context since we saw him at 0Sec in October. Apparently lots of kinks have been worked out and there’s an official code source tree here.

The clincher for day 11 was FX and FtR of Phenoelit‘s semi-controversial talk on Blackberry security (covering both handheld devices and server based RIM products). This talk was a bit of a wake up call for RIM and thus the slides are still not available online so keep a sharp eye out for the video when it’s released by the CCC.

Also available from the CCC are the full proceedings in a downloadable pdf (also available in paper format for you physical-space-doodle-in-the-margin freaks).

Continue reading “22C3 Day 10 And 11 Round Up”