Feeds

iPhone 4 vivisected in 'first legal teardown'

Inside the Fourth Coming

SANS - Survey on application security programs

The intrepid tinkerers at iFixIt now bring us what they refer to as "the first legal teardown of the iPhone 4." And being first wasn't easy.

They first went to the other side of the earth to obtain an iPhone 4 before anyone else in the States. As they explained in an email: "[CEO] Kyle [Wiens] flew to Japan, expecting to take advantage of the 16-hour time difference. He had his camping gear all ready to wait in line outside the Ginza Apple Store tonight."

But he didn't have to rush back to iFixIt HQ in Atascadero, California with his booty. Instead, "in a last-minute twist ... FedEx delivered some iPhone 4 units to customers two days early. One of those customers, an engineer at a Silicon Valley startup, provided us his phone. And we are taking it apart."

And here's what they found — but note that The Reg has taken the liberty of cropping some of their shots due to our somewhat tight layout. To see them in all their high-res glory, check out the 53 photos of the teardown on their site, and click View Huge in the upper lefthand corner of each image:

Inside the iPhone 4

Remove a pair of screws, and the back slides off to reveal a humongous, easily removable battery

iPhone 4 main camera

The main, back-facing five-megapixel camera can capture 720p HD-ish video at 30 frames per second

iPhone 4 secondary front-facing camera

The front-facing camera is a VGA affair designed for Apple's FaceTime videoconferencing scheme

iPhone 4 logic board

On the right of the logic board is the A4 processor, with its 1GHz ARM Cortex A8 compute core

iPhone 4 noise-cancellation microphone

Apple has added a secondary microphone to the top of the iPhone for noise-cancellation purposes

iPhone 4 all components

And that's it. As you can see, by far the most sizable component of the iPhone 4 is its battery

Many, many more details, along with exactly how to take apart the Cupertinian handheld can be found here — and disassembling it appears to be easier to do than with previous iPhones.

And while you're on their site, take a look at iFixIt's line of parts, tools, and services. After all, they do need to recoup the cost of that useless trip to Tokyo. ®

SANS - Survey on application security programs

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.