iJoyPad demoed on iPhone 3GS, full screen PSX games looking rather sweet

The iJoyPad has been floating around for a bit now, but we’ve never seen a full demo of the add-on gamepad. Well, it’s back in a video demoing its performance on an iPhone 3GS, using the psx4iphone emulator in full screen glory. The demo shows off Wipeout XL and Ridge Racer performing quite quickly and smoothly, and the iJoyPad itself seems totally functional — and while it’s a tiny bit clunky looking as far as we’re concerned, we’d still like to swipe one for ourselves. Hit the read link for the video.

Filed under: ,

iJoyPad demoed on iPhone 3GS, full screen PSX games looking rather sweet originally appeared on Engadget on Sat, 01 Aug 2009 10:09:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

How would you change Apple’s iPhone 3GS?

Some might argue it’s the most subtle update in the iPhone family thus far, but Apple’s iPhone 3GS still seems to be moving the sales meter, regardless. The latest and greatest iPhone officially hit the market a few weeks back, and even though Apple claims that demand is still far outpacing supply, we’re of the belief that most everyone who wanted one has managed to snag one by now. During our time with the unit, we definitely didn’t find too many reasons to upgrade from the already solid iPhone 3G, but given that you probably did anyway, we’re eager to hear how things have turned out. Did you upgrade from a prior iPhone to this? Are you joining the iPhone family for the first time? What gripes have you found impossible to ignore? Are you still up in arms about AT&T’s inability to provide MMS / tethering service? Are you, like us, completely roiled by the unit’s lack of multitasking abilities? Go ahead and let it rip in comments below — we’re guessing Apple has about 11 months or so to take your opinions to heart.

Filed under:

How would you change Apple’s iPhone 3GS? originally appeared on Engadget on Sat, 01 Aug 2009 00:31:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Captain Obvious reports: AT&T sees surge in WiFi use post-iPhone OS 3.0

You know, there’s something to be said about making something easy: people usually take advantage. So seems to be the case with AT&T’s WiFi connections after the release of iPhone OS 3.0, which finally became useful when users could seamlessly connect to one of the thousands of AT&T hotspots around the nation rather than having to stumble through a painfully long process on iPhone OS 2.x. According to an AT&T spokesperson speaking with AppleInsider, the amount of iPhone users linking up with AT&T’s WiFi network tripled in June, and overall, it saw a 41 percent increase in connections compared to the prior quarter. It comes as no surprise to hear that AT&T is working feverishly to expand said network in order to relieve strain from its house of cards-styled 3G network, and while we’d definitely prefer a bit more reliability with the latter, we’ll happily accept more WiFi in the meanwhile.

Filed under: ,

Captain Obvious reports: AT&T sees surge in WiFi use post-iPhone OS 3.0 originally appeared on Engadget on Fri, 31 Jul 2009 05:04:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

China Unicom’s iPhone gets regulatory approval, pictured

Still having doubts that an iPhone will ever come to China via legitimate means? Have a gander at this. According to the listing after the break, which was discovered on China’s State Radio Regulatory Commission (SRRC; basically the Chinese version of the FCC) website, we’re looking at a GSM / WCDMA cellphone complete with Bluetooth, an internal model number A1324, a little-known manufacturer called “Apple Inc.” and an approval date of May 7th, 2009. We’re also told that the certificate expires in five years, which should give China Unicom plenty of time to capitalize on its reported three-year deal to offer the phone in mainland China. So, all we need now is what’s we’ve needed for years: a handwritten note from El Jobs himself saying that this whole thing is more than some sick charade.

[Image courtesy of Sina, thanks Joe]

Update: Looks like this may be the first live look at a China Unicom iPhone 3G, complete with no WiFi to speak of.

Continue reading China Unicom’s iPhone gets regulatory approval, pictured

Filed under:

China Unicom’s iPhone gets regulatory approval, pictured originally appeared on Engadget on Fri, 31 Jul 2009 01:59:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Robot with iPhone 3GS head reminds us of a cuter, more magnanimous Steve Jobs

Who’s this little guy? Oh, that’s just Robochan — the Kondo KHR-2HV bot with a fully-functioning iPhone 3GS fused to his head. Not interested? Well, hear us out — because we, too, have seen many an iPhone mod project in our day, leaving us jaded, easily susceptible to waking in the middle of the night to find ourselves shrieking out “fanboy!” for no reason, and finding that in general at this point — merely cranking the word iPhone into your DIY project is the easiest way to send us to Snoresville. But we’ll admit it: Robochan drew us in within ten — nay, five — seconds. His dance moves are killer, and his faces have stolen whatever remnants of a heart we had left. So take our advice: watch the video, which is after the break.

[Via Gearfuse]

Continue reading Robot with iPhone 3GS head reminds us of a cuter, more magnanimous Steve Jobs

Filed under: ,

Robot with iPhone 3GS head reminds us of a cuter, more magnanimous Steve Jobs originally appeared on Engadget on Thu, 30 Jul 2009 10:11:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

China Unicom finally bringing iPhone to world’s most populous country?

Is it really happening? Is the world’s most thickly settled nation finally getting the iPhone in earnest? If a bold (albeit woolly) report from China’s own national news agency is to be believed, China Unicom has just locked down a deal that’ll grant it exclusive rights to sell Apple’s heralded smartphone in mainland China for three whole years. Unfortunately, most of the nitty-gritty details are absent, but we are led to believe that this will be the first-ever iPhone sold with any branding at all outside of logos splashed on at Cupertino. The “Wo” icon you see just below the speaker signifies that this here device is ready to rock on the carrier’s 3G network, though we still can’t say with any amount of certainty if said image is fully legitimate. We’re also waiting to hear whether it’ll be the iPhone 3G or 3GS (or both) that’s sold, and we’re particular curious as to whether or not these handsets will include WiFi modules.

In related news, it does sound as if China Unicom bent over backwards a bit to make this all come together, with the article stating that it signed on to move between one and two million units per year regardless of how many consumers actually show up to buy one. If you’ll recall, an eerily similar agreement has Russian operators in a world of financial hurt, but we get the feeling the reception in China will be quite a bit warmer. At any rate, it’s noted that Unicom will be snapping up the devices from Apple at a cost of around 3,000 Chinese yuan apiece ($439), with end users being asked to pay an undisclosed lesser amount on contract. If all goes well, the units could hit Chinese shops as early as September, though only time will tell how everything shakes out. Oh, and considering that Apple can hardly keep up with iPhone 3GS demand as it is, we suspect it’ll want to wait a few months anyway before stressing its supply channels further.

Update: A China Unicom spokeswoman has now been quoted as saying that “we have made progress but there are still some problems to be resolved.” Really? Another round of this?

Filed under:

China Unicom finally bringing iPhone to world’s most populous country? originally appeared on Engadget on Tue, 28 Jul 2009 03:01:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Hackers scoffing at iPhone 3GS’ hardware encryption

There were other features taking higher billing in the iPhone 3GS’ announcement than its hardware-level encryption — hell, even the magnetic compass was getting more play — but it’s there, and Apple’s actively marketing the bit-scrambling capability to enterprise clients. Problem is, hackers are apparently having a field day with it, rendering it useless in all but name. One iPhone dev (who teaches courses on pulling data off iPhones, coincidentally) goes so far to say that he doesn’t “think any of us have ever seen encryption implemented so poorly before,” noting that it’s no more difficult for him to pull data off a 3GS than it is off an encryption-free 3G. He goes on to point out that RIM — which has far more experience dealing with enterprise-class mobile fleets than Apple does — offers a far more robust remote wipe solution that doesn’t necessarily need to rely on an active wireless connection to clear a phone. The lesson? As overwhelmingly popular as the iPhone may be across every market segment, these guys are still the new kids on the enterprise block — and RIM (and heck, Microsoft, too) would be wise to stand their ground here.

Filed under: ,

Hackers scoffing at iPhone 3GS’ hardware encryption originally appeared on Engadget on Fri, 24 Jul 2009 00:19:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Google Latitude finally makes it over to iPhone, as a web app

The iPhone has finally caught up with its BlackBerry, Windows Mobile 5.0, and S60 competition, at least as far as Google Latitude is concerned. The stalker-centric program is now available for Apple’s smartphone, but instead of coming as an App Store-approved download, it’s actually just a web-hosted app that grabs your location through Safari — a new trick care of iPhone OS 3.0. As to why, the Official Google Blog explains Apple had some concern that people would confuse it for the native Maps app. We still don’t get why it couldn’t simply be added to Maps itself, but we’re not the multibillion dollar company, here. Go ahead, let your privacy cares away and direct your iPhone to the link below to see what all the fuss is about. Now it’s time to wait (im)patiently for Google Voice.

Read – Google Latitude
Read – Official Google Mobile Blog

Filed under:

Google Latitude finally makes it over to iPhone, as a web app originally appeared on Engadget on Thu, 23 Jul 2009 21:32:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

AT&T CEO admits iPhone won’t be exclusive forever

It may not be all that shocking from a common sense point of view, but AT&T CEO Randall Stephenson’s statement that “there will be a day when you are not exclusive with the iPhone” is still quite a departure from anything he’s said in the past and, given the stakes involved, pretty darn notable. That word came at Fortune’s now happening Brainstorm: Tech conference, where Stephenson unsurprisingly didn’t elaborate on any negotiations with Apple, and only went so far as to say that he thinks AT&T’s partnership with Apple “works really, really well — maybe as well as any strategic partnership we have.” Of course, none of that means exclusivity is going away anytime soon, and you can pretty safely bet that AT&T will keep on pushing as long as it can.

Filed under:

AT&T CEO admits iPhone won’t be exclusive forever originally appeared on Engadget on Thu, 23 Jul 2009 16:48:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses

_mg_10531

Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.


“It is kind of like storing all your secret messages right next to the secret decoder ring,” said Jonathan Zdziarski, an iPhone developer and a hacker who teaches forensics courses on recovering data from iPhones. “I don’t think any of us [developers] have ever seen encryption implemented so poorly before, which is why it’s hard to describe why it’s such a big threat to security.”

With its easy-to-use interface and wealth of applications available for download, the iPhone may be the most attractive smartphone yet for business use. Many companies seem to agree: In Apple’s quarterly earnings conference call Tuesday, Apple chief operating officer Tim Cook said almost 20 percent of Fortune 100 companies have purchased 10,000 or more iPhones apiece; multiple corporations and government organizations have purchased 25,000 iPhones each; and the iPhone has been approved in more than 300 higher education institutions.

But contrary to Apple’s claim that the new iPhone 3GS is more enterprise friendly, the new iPhone 3GS’ encryption feature is “broken” when it comes to protecting sensitive information such as credit card numbers and social-security digits, Zdziarski said.

Zdziarski said it’s just as easy to access a user’s private information on an iPhone 3GS as it was on the previous generation iPhone 3G or first generation iPhone, both of which didn’t feature encryption. If a thief got his hands on an iPhone, a little bit of free software is all that’s needed to tap into all of the user’s content. Live data can be extracted in as little as two minutes, and an entire raw disk image can be made in about 45 minutes, Zdziarski said.

Wondering where the encryption comes into play? It doesn’t. Strangely, once one begins extracting data from an iPhone 3GS, the iPhone begins to decrypt the data on its own, he said.

To steal an iPhone’s disk image, hackers can use popular jailbreaking tools such as Red Sn0w and Purple Ra1n to install a custom kernel on the phone. Then, the thief can install an Secure Shell (SSH) client to port the iPhone’s raw disk image across SSH onto a computer.

To demonstrate the technique, Zdziarski established a screenshare with Wired.com, and he was able to tap into an iPhone 3GS’ data with a few easy steps. The encryption did not pose any hindrance.

Nonetheless, professionals using the iPhone for business don’t seem to care, or know, about the device’s encryption weakness.

“We’re seeing growing interest with the release of iPhone 3.0 and the iPhone 3GS due in part to the new hardware encryption and improved security policies,” Cook said during Apple’s earnings call. “The phone is particularly doing well with small businesses and large organizations.”

Clearly, the gigantic offering of iPhone applications is luring these business groups. Quickoffice Mobile, for example, enables users to access and edit Microsoft Word or Excel files on their iPhone. For handling transactions, merchants can use apps such as Accept Credit Cards to process a credit card on an iPhone anywhere with a Wi-Fi or cellular connection.

Several employees of Halton Company, an industrial equipment provider, are using iPhones for work, according to Lance Kidd, chief information officer of the company. He said the large number of applications available for the iPhone make it worthy of risk-taking.

“Your organization has to be culturally ready to accept a certain degree of risk,” Kidd said. “I can say we’ve secured everything as tight as a button, but that won’t be true…. Our culture is such that our general manager is saying, ‘I’m willing to take the risk for the value of the applications.’”

Kidd noted that Halton employees are not using iPhones for holding confidential customer information, but rather for basic tasks such as e-mailing and engaging with clients via social networking sites such as Facebook and Twitter. Halton also plans to code apps strictly for use at the company, Kidd said.

According to Kidd, a security expert performed an evaluation of Halton, and he said it was possible for any hacker to find an infiltration no matter the level of security. Therefore, Halton has measures in place to respond to an information security threat rather than attempt to avoid it.

“It’s like business continuity,” Kidd said. “You prepare for disasters. You prepare for if there’s an earthquake and the building breaks down, and you prepare for if there’s a crack in [information] security.”

But Zdziarski stands firm that the iPhone’s software versatility isn’t worth the risk for use in the workforce. He said sensitive information is bound to appear in e-mails or anything that can be contained on the iPhone’s disk, which can be easily extracted by thieves thanks to the new handset’s shoddy encryption.

Zdziarski said it’s up to the app developers to add an extra level of security to their apps because Apple’s encryption feature is so poor.

“If they’re relying on Apple’s security, then their application is going to be terribly insecure,” he said. “Apple may be technically correct that [the iPhone 3GS] has an encryption piece in it, but it’s entirely useless toward security.”

He added that the ability for the iPhone to self-erase itself remotely using Apple’s MobileMe service isn’t very helpful, either: Any reasonably intelligent criminal would remove the SIM card to prevent the remote-wipe command from coming through. (In a past Wired.com report, Zdziarski said the iPhone’s remote-wiping ability pales in comparison to Research In Motion’s BlackBerry, which can self-delete automatically after the phone has been inactive on the network for a preset amount of time.)

On top of that, the iPhone isn’t well protected in general usability, said John Casasanta, founder of iPhone development company Tap Tap Tap. He said though Apple’s approval process scans for malicious code, a developer could easily tweak the app to send a user’s personal data, such as his contacts list, over the network without his knowing.

“Apple can see if something is blatantly doing something malicious in the approval process, but it wouldn’t be very hard to do something behind the scenes,” Casasanta said.

Evidently, it isn’t difficult to sneak unauthorized content into the App Store. In May, Wired.com reported on an exploit demonstrated by the iPhone app Lyrics. Apple initially rejected the app because it contained profane words, and then Lyrics’ developer snuck the profanity into the app with a hidden Easter egg. Apple then approved the application.

Zdziarski added that there are other weaknesses with the iPhone: Pressing the Home button, and even zooming in on a screen, automatically creates a screenshot temporarily stored in the iPhone’s memory, which can be accessed later. And then there’s the keyboard cache: key strokes logged in a file on the phone, which can contain information such as credit card numbers or confidential messages typed in Safari. Cached keyboard text can be recovered from a device dating back a year or more, Zdziarski said.

Though Apple has declined to comment on iPhone security issues, the company has more or less admitted iPhones are vulnerable to security threats, because an emergency measure exists. In August 2008, Apple CEO Steve Jobs acknowledged the existence of a remote kill switch for iPhone apps, meaning if a malicious app made its way onto iPhones, Apple could trigger a command to delete the app from users’ devices. There is no evidence that the kill switch has ever been used.

So, what kind of business should you do with an iPhone if the device is not very secure? Zdziarski said there are some business-savvy apps that have managed to integrate better security (such as secure data fields to prevent key-stroke logging of credit card numbers, for example), but he warned companies to be cautious about investing too much trust in the iPhone and the apps available for it.

“We’re going to have to go with the old imperative of ‘Trust no one,’” he said. “And unfortunately part of that is, don’t trust Apple.”

See Also:

Photo: Jon Snyder/Wired.com