A group working to unlock the iPhone and thus allow it to run on wireless carriers outside of AT&T is claiming success. Contributors to the Finding JTAG blog are citing a successful unlock of the iPhone via a “hardware hack”. According to iPhone Alley, the hack involves removing a piece of hardware that’s temporarily installed in the iPhone that is temporarily installed into the iPhone during the time involved in unlocking the handset. Once the hardware is removed, the iPhone can function normally using any wireless carrier’s SIM card.
The group has provided the following YouTube video as a means of proving the group’s claim and demonstrating the hack in action as a successfully unlocked iPhone accesses the T-Mobile network:
The group has also stated that while their hack currently involves removing hardware through taking apart the iPhone and soldering certain components, they hope to have a software version available soon as well as instructions for the hack posted next Tuesday.
Cool to see this in action and it’ll be interesting to see where this goes. Stay tuned to the PowerPage for more details as they emerge and if you have an idea or feedback about unlocking the iPhone, let us know in the comments or forums.
If you’ve been determined to muck about with your iPhone, possibly violating its warranty and hack it so it can run third-party applications, this might be what you’re looking for.
The guys over at Gizmodo have posted a full tutorial as to how to install third-party applications on your iPhone via a program called Installer.app for the iPhone.
User-friendly but not for the faint of heart, this doesn’t have Apple’s blessing and may require resetting your iPhone if things go south.
That being said, this is also the least techie way of getting to a point where you can place third-party applications on your iPhone.
Be careful. Have fun. And let us know how it works out in the comments or forums.
I was never this optimistic when my iBook G3 croaked a few years back, but a user over on Chaos Blog 2.0 has apparently taken a 500 MHz iBook G3 with a broken screen and turned it both into a book and a server.
After removing the non-functioning screen and trimming down the essentials of the case, the author then wrapped the remaining iBook in a hardcover casing and connected the unit to a Firewire hard drive.
Perhaps the most impressive part is that he was able to retrofit the power supply to another part of the laptop and cut the footprint down by half. The blog posts step by step instructions, complete with pictures, so if you have several free hours, the tools on hand, a somewhat-croaked iBook and a soldering gun, you can pull off a similar feat.
As always, if you have a cool fix, hack or workaround of your own that you’ve done with your Mac laptop, let us know about it.
A picture’s worth a thousand words in this case. Engadget has a story about an iPod that’s been essentially hacked into a handheld/mini-laptop. The story originally appeared over on Hack-A-Day in which Owen McGarry took an out of warranty iPod, installed a swivel device, a protruding hard drive and a Linux operating system.
Unfortunately, details are scarce at this time, although additional photos can be found over here via FaceBook.
Remove the glare factor and you could have a cool portable video unit for flights as well…
Let us know what you think.
While it’s not clear if this is practical or not, a video has been posted of the Apple TV’s operating system having been hacked to boot and run cleanly on a MacBook laptop.
Still, it’s kind of cool and the guys over at Apple TV Hacks have published a full tutorial as to how to find and use hidden files within the kernel file and use them.
If you have any ideas or feedback on this or how to use it for a spiffy new purpose, let us know.
In today’s episode of ‘MacBook Exposed’ fellow ZDNet blogger George Ou has taken a few journalists to task for promoting the HackBook story incorrectly leading to “a vicious orchestrated assault on researcher David Maynor and the company SecureWorks.” The dissenters are upset because they claim that Maynor and SecureWorks falsified their research presented at Black Hat 2006.
Read the rest of the story on my ZDNet Blog: The Apple Core.