X-Ray Sleuthing Unveils The Fake In Your Adaptors

Lets face it, the knock-off variety of our favourite adaptors, cables and accessories are becoming increasingly challenging to spot. We would be the first to admit, to have at some point, been stooped by a carefully crafted counterfeit by failing to spot the tell-tale yet elusive indicators such as the misplaced font face, the strategically misspelled logo or perhaps the less polished than expected plastic moulding and packaging. When you finally come around to using it, if you are lucky the item is still more or less functionally adequate, otherwise by now the inferior performance (if not the initial cost!) would have made it pretty obvious that what you have is infact a counterfeit.

[Oliver] recently found himself in a similar situation, after acquiring a seemingly original Lightning to Headphone Adaptor. Rather than dismay, [Oliver] decided to channel this energy into an excellent forensic investigation to uncover just what exactly made this imitation so deceptive. He began by comparing the packaging, printed typeface and the plastic moulding, all of which gave very little away. [Oliver] concluded that atleast superficially, the clone was rather good and the only way to settle this was to bring out the X-ray, of course!  

The resulting images of the innards make it blatantly obvious as to why the adaptor is indeed very fake. For a start, compared to the original adaptor, the clone hosts a far more thin BOM count! If you are really serious in getting some training to better spot counterfeits, check out a post we featured earlier on the subject!

Changing System Architectures And The Complexities Of Apple’s Butterfly Approach To ISAs

Apple computers will be moving away from Intel chips to its own ARM-based design. An interesting thing about Apple as a company is that it has never felt the need to tie itself to a particular system architecture or ISA. Whereas a company like Microsoft mostly tied its fortunes to Intel’s x86 architecture, and IBM, Sun, HP and other giants preferred vertical integration, Apple is currently moving towards its fifth system architecture for its computers since the company was formed.

What makes this latest change possibly unique, however, is that instead of Apple relying on an external supplier for CPUs and peripheral ICs, they are now targeting a vertical integration approach. Although the ARM ISA is licensed to Apple by Arm Holdings, the ‘Apple Silicon’ design that is used in Apple’s ARM processors is their own, produced by Apple’s own engineers and produced by foundries at the behest of Apple.

In this article I would like to take a look back at Apple’s architectural decisions over the decades and how they made Apple’s move towards vertical integration practically a certainty.

Continue reading “Changing System Architectures And The Complexities Of Apple’s Butterfly Approach To ISAs”

Faux Vintage Radio Gets AirPlay Upgrade

There’s plenty of vintage-styled hardware out these days, with quality and functionality being mixed at best. [Huan] found such a device in the form of an attractively-styled Bluetooth speaker. Deciding he could improve on the capabilities while retaining a stock look, he got down to hacking.

The aim of the project was to keep the original volume knob, buttons and screen, while replacing the internals with something a bit more capable. A Raspberry Pi Zero was sourced as the brains of the operation, with the Google Voice AIY hardware used as the sound output after early attempts with a discrete amplifier faced hum issues. An Arduino Pro Micro was pressed into service to read the volume encoder along with the buttons and drive the charlieplexed LED screen. Shairport Sync was then installed on the Pi Zero to enable Airplay functionality.

It’s a basic hack that nonetheless gives [Huan] an attractive AirPlay speaker, along with plenty of useful experience working with Arduinos and Raspberry Pis. We’ve seen similar hacks before, too. If you’re working on your own stereo resurrection at home, be sure to drop us a line!

iPhone pictured with a lock

Is Anything Really Private Anymore?

In the connected age, every day it appears privacy is becoming more and more of an idealistic fantasy as opposed to a basic human right. In our latest privacy debate per [TechCrunch], apparently the FBI is taking some shots at Apple.

You may recall the unfortunate events, leading the FBI to ask Apple to unlock an iPhone belonging to a person of interest. Apple did not capitulate to the FBI’s request on the basis of their fundamental commitment to privacy. The FBI wasn’t really thrilled with Apple’s stance given the circumstances leading to the request. Nevertheless, eventually, the FBI was able to unlock the phone without Apple’s help.

You may find it somewhat interesting that the author of the news piece appears to be more upset with the FBI for cracking the phone than at Apple (and by extension other tech companies) for making phones that are crackable to begin with.

Maybe we should take solace in knowing that Apple stood their ground for the sake of honoring their privacy commitment. But as we saw, it didn’t really matter in the end as the FBI was able to hire a third party to help them unlock the phones and were later able to repeat the process in-house. The article also noted that there are other private companies capable of doing exactly what the FBI did. We understand that no encryption is 100% safe. So it begs the question, “Is anything really private anymore?” Share your thoughts in the comments below.

Ditching X86, Apple Starts An ARM Race

At its annual World Wide Developer Conference, Apple dropped many jaws when announcing that their Mac line will be switching away from Intel processors before the year is out. Intel’s x86 architecture is the third to grace Apple’s desktop computer products, succeeding PowerPC and the Motorola 68000 family before it.

In its place will be Apple’s own custom silicon, based on 64-bit ARM architecture. Apple are by no means the first to try and bring ARM chips to bear for general purpose computing, but can they succeed where others have failed?

Continue reading “Ditching X86, Apple Starts An ARM Race”

IMac G4 Reborn With Intel NUC Transplant

Released in 2002, Apple’s iMac G4 was certainly a unique machine. Even today, its hemispherical case and integrated “gooseneck” display is unlike anything else on the market. Whether or not that’s a good thing is rather subjective of course, but there’s no denying it’s still an attention grabber nearly 20 years after its release. Unfortunately, it’s got less processing power than a modern burner phone.

Which is why [Tom Hightower] figured it was the perfect candidate for a retrofit. Rather than being little more than a display piece, this Intel NUC powered iMac is now able to run the latest version of Mac OS. He even went as far as replacing the display with a higher resolution panel, though it sounds like it was dead to begin with so he didn’t have much choice in the matter.

Somewhere, an early 2000s Apple engineer is screaming.

The retrofit starts off with a brief teardown, which is quite interesting in itself. [Tom] notes a number of unique design elements, chief among them the circular motherboard. The two banks of memory also use different form factors, and only one of them is easily accessible to the end user. Something to think about the next time somebody tells you that Apple’s “brave” hardware choices are only a modern phenomena.

There was plenty of room inside the iMac’s dome to fit the NUC motherboard, and some extension cables and hot glue got the computer’s rear panel suitably updated with the latest-and-greatest ports and connectors. But the conversion wasn’t a total cakewalk. That iconic “gooseneck” put up quite a fight when it was time to run the new wires up to the display. Between the proprietary screws that had to be coerced out with a Dremel to the massive spring that was determined to escape captivity, [Tom] recommends anyone else looking to perform a similar modification just leave the wires on the outside of the thing. That’s what he ended up doing with the power wires for the display inverter.

If you like the idea of reviving old Apple hardware but don’t want to anger the goose, you could start on something a little easier. Like putting an iPad inside of a Macintosh Classic shell.

DIY Magsafe Charger Feeds Off 12 V Solar Battery

[Steve Chamberlin] has a spiffy solar-charged 12 V battery that he was eager to use to power his laptop, but ran into a glitch. His MacBook Pro uses Apple’s MagSafe 2 connector for power, but plugging the AC adapter into the battery via a 110 VAC inverter seemed awfully inefficient. It would be much better to plug it into the battery directly, but that also was a problem. While Apple has a number of DC power adapters intended for automotive use, none exist for the MagSafe 2 connector [Steve]’s mid-2014 MacBook Pro uses. His solution was to roll his own MagSafe charger with 12 VDC input.

Since MagSafe connectors are proprietary, his first duty was to salvage one from a broken wall charger. After cleaning up the wires and repairing any frayed bits, it was time to choose a DC-DC converter to go between the MagSafe connector and the battery. The battery is nominally 12 volts, so the input of the DC-DC converter was easy to choose, but the output was a bit uncertain. Figuring out what the MagSafe connector expects took a little educated guesswork.

The original AC adapter attached to the charger claimed an output of 20 volts, another Apple adapter claimed a 14.85 V output, and a third-party adapter said 16.5 volts. [Steve] figured that the MagSafe connectors seemed fine with anything in the 15 to 20 V range, so it would be acceptable to use a 12 V to 19 V DC-DC boost converter which he had available. The result worked just fine, and [Steve] took measurements to verify that it is in fact much more efficient than had he took the easy way out with the inverter.

MagSafe has been displaced by USB-C nowadays, but there are plenty of MagSafe devices still kicking around. In a pinch, keep in mind that a little bit of filing or grinding is all that’s needed to turn MagSafe 1 into MagSafe 2.