IPhone 3G: Under The Hood


TechOnline has cracked open the iPhone 3G to find out what makes it tick. They’ve released detailed diagrams as well as some videos of the dissection.

Calling this an incremental update, they note that the changes seem to be additions and improvements rather than a total rebuild of the original platform. They get into the nitty gritty, discussing not only the layout and structure, but even the importance of each chip manufacturer.

Some of the improvements are obvious, like 3G. Others include the battery not being permanently attached, and the headphone jack being flush mounted. Most of the changes were in who manufactured each chip.

[via TUAW]

IPhone Dev Team Shows Ssh Access

They still haven’t released the jailbreak yet, but the iPhone dev team hasn’t been sitting idly by either. They recently posted this video of ssh access on the iPhone 3G. Not only have they succeeded in hacking into the phone, they say that apple can’t fix it without a hardware change. Having root level access to the device opens up many more possibilities than just hooking an API.

IGiveUp Bluetooth Handset


Instructables user [ManaEnergyPotion] has posted a rather humorous Bluetooth handset hack. He simply took apart an airsoft handgun and a Bluetooth headset, and then placed the components neatly within the case. The earpeice is actually in the barrel of the gun, while the microphone is in the handle. You pull the trigger to answer a call, or to end a call. The best part is that they took this to the iPhone product launch, and posted a video of people’s reaction to this as an actual product concept. You can check it out after the break.

Continue reading “IGiveUp Bluetooth Handset”

IPhone Dev Team Releases Jailbreak Video

[youtube=http://www.youtube.com/watch?v=R63lKICiWfg&hl=en&fs=1]
The iPhone dev team, notorious for jailbreaking the iPhone has just released a video of the iPhone 3G hacked. Keep up to date with it and watch for a release on their blog. This is a major update to the PwnageTool which is already available for previous versions of the iPhone.

They have added a lot of new features such as: canned web searches, custom installer configuration, and custom root partitions. They promise to release it soon, but state that it will not be this weekend. You can get a the high resolution version of the video from our mirror.

Engadget Goes In Depth With The IPhone 3G


Over at Engadget, they’ve taken some time to completely review the iPhone 3G. Take a few moments to stop reading about all the trouble activating them and read about the phone itself.

In short, they hit the following points:

  • The case feels thinner than it is.
  • The shape of the case makes it wobble on a hard surface.
  • Call quality is greatly improved.
  • Speeds are greatly increased.
  • Battery life is underwhelming.

They seem positive in their conclusion, we’ll have to wait and see how they feel after a little more time with it.

IPhone: 2.0 Firmware Jailbroken, 3G Taken Apart


Oh, iPhone Dev Team, you are a hoot. It isn’t that you managed to jailbreak the iPhone 2.0 firmware on the day of its release, although we can’t help but smirk at that. It isn’t even that you revealed your handiwork in a playful way. We simply love that you expertly work us into a frenzy for the new jailbreak installer with few casual images and some aloof words. Now give us the installer before we get too antsy, please.

Not to be outshined, though, iFixit has posted a full iPhone 3G teardown, stripping away the sleek casing to feast on the goodness inside. They found some interesting changes from the last model: the glass screen, for example, is no longer glued to the LCD, which will no doubt make repairs less expensive. The battery is also unsoldered, meaning you won’t have to send the phone in for repair if the only battery needs maintenance.

ARDAgent.app Still Vulnerable


When Apple pushed their most recent security update, the first thing we checked was whether the ARDAgent issue was fixed. It’s not. This vulnerability lets anyone execute code as a privileged user and versions of this attack have already been found in the wild. While several Ruby, SMB, and WebKit issues were addressed it, ARDAgent is still unpatched. [Dino Dai Zovi] has published the method by which ARDAgent actually becomes vulnerable: when it starts, it installs its own Apple Event handlers and calls AESetInteractionAllowed() with kAEInteractWithSelf. This should restrict it only to its own events, but for some reason that’s not the resulting behavior. He also pointed out that SecurityAgent has displayed similar weirdness; it is vulnerable to Apple Events even though it doesn’t calls an Apple Events function. We can see how this unexpected behavior could make patch development take much longer and may end up uncovering an even bigger problem. Check out [Dino]’s post for more information.