Feeds

iPhone 4 vivisected in 'first legal teardown'

Inside the Fourth Coming

High performance access to file storage

The intrepid tinkerers at iFixIt now bring us what they refer to as "the first legal teardown of the iPhone 4." And being first wasn't easy.

They first went to the other side of the earth to obtain an iPhone 4 before anyone else in the States. As they explained in an email: "[CEO] Kyle [Wiens] flew to Japan, expecting to take advantage of the 16-hour time difference. He had his camping gear all ready to wait in line outside the Ginza Apple Store tonight."

But he didn't have to rush back to iFixIt HQ in Atascadero, California with his booty. Instead, "in a last-minute twist ... FedEx delivered some iPhone 4 units to customers two days early. One of those customers, an engineer at a Silicon Valley startup, provided us his phone. And we are taking it apart."

And here's what they found — but note that The Reg has taken the liberty of cropping some of their shots due to our somewhat tight layout. To see them in all their high-res glory, check out the 53 photos of the teardown on their site, and click View Huge in the upper lefthand corner of each image:

Inside the iPhone 4

Remove a pair of screws, and the back slides off to reveal a humongous, easily removable battery

iPhone 4 main camera

The main, back-facing five-megapixel camera can capture 720p HD-ish video at 30 frames per second

iPhone 4 secondary front-facing camera

The front-facing camera is a VGA affair designed for Apple's FaceTime videoconferencing scheme

iPhone 4 logic board

On the right of the logic board is the A4 processor, with its 1GHz ARM Cortex A8 compute core

iPhone 4 noise-cancellation microphone

Apple has added a secondary microphone to the top of the iPhone for noise-cancellation purposes

iPhone 4 all components

And that's it. As you can see, by far the most sizable component of the iPhone 4 is its battery

Many, many more details, along with exactly how to take apart the Cupertinian handheld can be found here — and disassembling it appears to be easier to do than with previous iPhones.

And while you're on their site, take a look at iFixIt's line of parts, tools, and services. After all, they do need to recoup the cost of that useless trip to Tokyo. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.