BlackBerry Storm Click Screen Teardown

clickscreen

RIM has decided to venture into the touchscreen phone market with the new BlackBerry Storm. Unlike other companies’ offerings, the Storm has a touchscreen that clicks when you press it. phoneWreck disassembled the Storm to see what magic was involved in the device. There’s not much too it, it’s just a big button. pW notes that the entire phone board is very compact mostly due to RIM using Qualcomm’s latest MSM7600 chip. Items like bluetooth, GPS, and USB are all included in the processor instead of appearing on the board as discrete components.

phoneWreck recently launched and promises many future teardowns. They’ll be adding to their archive which already includes the Motorola Krave and the venerable Nokia N95. We’ll definitely be watching for their future releases.

[via Engadget]

IPhone Jailbreaks Updated For 2.2 Release

Working as quick as ever, the iphone-dev team have updated the PwnageTool and QuickPwn to work with the new iPhone 2.2 firmware update. The trouble with the new firmware is that it updates the baseband of the phone, which could potentially undo any progress made towards an iPhone 3G unlock in the future. If you don’t care about that, you can use QuickPwn to jailbreak your phone after the upgrade, so you can run any app you want. If a future unlock is important to you, use the PwnageTool to strip the baseband update out of the firmware update.

[photo: edans]

G1 Multitouch Proof Of Concept

[youtube=http://www.youtube.com/watch?v=pSBYqmWVqeM]

[RyeBrye] has been trying to get multitouch working on the Android based T-Mobile G1. He hacked the Synaptics touchscreen driver so that it would dump raw event info to a character device. The demo above is using example code from Google for a fingerpaint program. Polling the device is not the fastest method, but [RyeBrye] just wanted to get a demo out there to prove it could be done.

DuiPhone Hack

[vimeo http://vimeo.com/2286835%5D

Tellart turned an iPhone into a duiPhone with its latest Sketchtools kit. Combine a 3G iPhone, an ordinary store-bought breathalyzer, and the NADA Mobile, which consists of a communication board, sensors, and actuators, and get a useful iPhone application. Blow into the mouthpiece, and the iPhone will inform you if you can safely drive, or if you should call a cab.

We’d like to find out more about the NADA Mobile, since it looks like it could be the start of a lot of fun projects. It’s the latest of Tellart’s Sketchtools line, which can only be accessed if you work with Tellart as a consultant, or if you work with them to organize a workshop for your organization.

[via Digg]

Iphone-dev Team 3G Soft Unlock Coming Soon

[vimeo 2291914]

The iphone-dev team has officially stated “all that remains is implementation“. They’ve developed all the pieces they need to perform a software unlock for the iPhone 3G, now it’s just a matter of putting them together in user friendly fashion. They’ve managed to run unsigned code on the baseband, developed custom AT tools, and are now showing injection of a background task. They will combine all of these techniques to override the carrier lock baseband code. As usual, they warn against performing any official firmware updates to the phone.

Reversing Google’s IPhone Voice Search

Google recently updated their Google Mobile App with a couple new features. Voice Search automatically starts listening when you raise the phone to your ear. Just say what you’re looking for, and it will poll Google and return the results. The app leverages Google’s voice recognition engine, which they’ve been training with Goog-411. [Andy Baio] has been experimenting with audio transcription and was curious what the new app was doing behind the scenes. He started by sniffing the packets as they traversed his network. Unfortunately, the size of the data packets transmitted is so small that he’s almost certain he’s missing something. He’d appreciate any help in this endeavor. Part of the problem might be Google getting special treatment and using undocumented iPhone SDK features.

Google Explains Android Patches

g11

Google has been trickling out info about what they’re actually fixing in the G1 firmware updates. Before RC29, users were able to bypass the phone lock using safe mode. RC29 also brought WebKit up to date, presumably patching the bug [Charlie Miller] found. RC30 takes care of root console problem. Unfortunately there are very few details as to what or how particular items were broken. This release method leaves much to be desired; having the official Android Security Announcements group be the absolute last place to get security news is asinine.

[photo: tnkgrl]