This could be interesting, provided you’re willing to jailbreak your iPhone or iPod touch handset.
Ralf Ackerman has just posted a blog entry demonstrating a jailbroken iPhone using an Apple Bluetooth wireless keyboard. Details are still sketchy, but it’s an interesting proof of concept that makes one wonder when Apple will officially support this?
Stay tuned for additional details as they become available and let us know what you think in the comments or forums.
Whether you feel it’s right or not, successful iPhone hardware hacks have been reported around the world. Some of these hacks have worked and the users seem pretty happy with the results.
Others have backfired and caused damage that’s nothing less than impossible to explain to the nice person behind the Genius Bar as accidental or the dog’s fault (such as the Wi-Fi or Bluetooth now refusing to work or the iPhone itself refusing to power up).
According to iPhone Atlas, a more severe example has arisen.
A relatively anonymous post to the Hackintosh forums provided this comment and showed this picture:
‚ÄúWe were so happy, all the software part was done, so we started opening the iphone. The antenna cover was a bit tricky but eventually it came off. Then we started to open the metal cover (after taking out the 3 screws) and PUFF, up it went in smoke, I think my collegue must have touched something. It literally went up in black smoke. I was so hot that when I tried to pick it up I burnt my fingers. So, this is for sure the most difficult part of the whole process. I don‚Äôt know what he did, as I had just stepped out of the room to fetch something when I heard a scream‚Ä¶they got such a fright.‚Äù
Although the iPhone is severely cool, there are certain provisos to follow when opening it up and trying to modify it: as in, be extremely careful, follow the directions and if you find US$499/US$599 wafting to the ceiling in the form of black smoke, try to have a sense of humor about it after the fact.
If you have any thoughts or feedback, let us know in the comments or forums.
A group working to unlock the iPhone and thus allow it to run on wireless carriers outside of AT&T is claiming success. Contributors to the Finding JTAG blog are citing a successful unlock of the iPhone via a “hardware hack”. According to iPhone Alley, the hack involves removing a piece of hardware that’s temporarily installed in the iPhone that is temporarily installed into the iPhone during the time involved in unlocking the handset. Once the hardware is removed, the iPhone can function normally using any wireless carrier’s SIM card.
The group has provided the following YouTube video as a means of proving the group’s claim and demonstrating the hack in action as a successfully unlocked iPhone accesses the T-Mobile network:
The group has also stated that while their hack currently involves removing hardware through taking apart the iPhone and soldering certain components, they hope to have a software version available soon as well as instructions for the hack posted next Tuesday.
Cool to see this in action and it’ll be interesting to see where this goes. Stay tuned to the PowerPage for more details as they emerge and if you have an idea or feedback about unlocking the iPhone, let us know in the comments or forums.
If you’ve been determined to muck about with your iPhone, possibly violating its warranty and hack it so it can run third-party applications, this might be what you’re looking for.
The guys over at Gizmodo have posted a full tutorial as to how to install third-party applications on your iPhone via a program called Installer.app for the iPhone.
User-friendly but not for the faint of heart, this doesn’t have Apple’s blessing and may require resetting your iPhone if things go south.
That being said, this is also the least techie way of getting to a point where you can place third-party applications on your iPhone.
Be careful. Have fun. And let us know how it works out in the comments or forums.
I was never this optimistic when my iBook G3 croaked a few years back, but a user over on Chaos Blog 2.0 has apparently taken a 500 MHz iBook G3 with a broken screen and turned it both into a book and a server.
After removing the non-functioning screen and trimming down the essentials of the case, the author then wrapped the remaining iBook in a hardcover casing and connected the unit to a Firewire hard drive.
Perhaps the most impressive part is that he was able to retrofit the power supply to another part of the laptop and cut the footprint down by half. The blog posts step by step instructions, complete with pictures, so if you have several free hours, the tools on hand, a somewhat-croaked iBook and a soldering gun, you can pull off a similar feat.
As always, if you have a cool fix, hack or workaround of your own that you’ve done with your Mac laptop, let us know about it.
A picture’s worth a thousand words in this case. Engadget has a story about an iPod that’s been essentially hacked into a handheld/mini-laptop. The story originally appeared over on Hack-A-Day in which Owen McGarry took an out of warranty iPod, installed a swivel device, a protruding hard drive and a Linux operating system.
Unfortunately, details are scarce at this time, although additional photos can be found over here via FaceBook.
Remove the glare factor and you could have a cool portable video unit for flights as well…
Let us know what you think.
While it’s not clear if this is practical or not, a video has been posted of the Apple TV’s operating system having been hacked to boot and run cleanly on a MacBook laptop.
Still, it’s kind of cool and the guys over at Apple TV Hacks have published a full tutorial as to how to find and use hidden files within the kernel file and use them.
If you have any ideas or feedback on this or how to use it for a spiffy new purpose, let us know.
In today’s episode of ‘MacBook Exposed’ fellow ZDNet blogger George Ou has taken a few journalists to task for promoting the HackBook story incorrectly leading to “a vicious orchestrated assault on researcher David Maynor and the company SecureWorks.” The dissenters are upset because they claim that Maynor and SecureWorks falsified their research presented at Black Hat 2006.
Read the rest of the story on my ZDNet Blog: The Apple Core.