Feeds

Blogger stokes iPhone 4 shatter fears

Antennagate 2?

High performance access to file storage

We're not sure how seriously to take claims that some third-party iPhone 4 cases can cause the handset's rear glass panel to shatter.

To be fair, no one appears to have suggested that this has actually happened. But it is alleged by Gdgt.com that Apple engineers are busy investigating this potential problem, implying that the company is sufficiently worried that broken phones - and, by extension, a broken reputation - are a possibility.

Here's the problem, we're told. Slide-on cases can allow dust and grit to become wedged between case and glass. Said particles then exert pressure on the panel, potentially causing a scratch, or maybe even to crack and then shatter.

It has been said that Apple pulled third-party cases out of its retail stores to avoid this.

Except that the cases are now back on sale, Gdgt.com admits. So Apple can't be too worried about the problem. More to the point, while cases allegedly were being yanked from Apple shops, the company was perfectly happy to mail out third-party cases to punters participating in its antennagate case giveaway. In addition to its own Bumper wraparound, Apple offered a good selection of third-party alternatives.

I know, I've got one. It's an Incase Snap. It clips onto the back of the handset, and being transparent you can see any dust and such. There are some specks in there now, and I know from past iPhone cases that there will be with any such covers.

Surely a more likely reason for the absence of cases in Apple stores has been the only-just-completed giveaway? The freebies stopped coming on 30 September and - guess what - cases are now back in the stores being sold over the counter.

Then there's the fact that Apple claims the "aluminosilicate" glass used on the iPhone 4's front and back is "chemically strengthened to be 20 times stiffer and 30 itmes harder than plastic" and is "more scratch resistant than ever".

Even allowing Apple hyperbole, that doesn't sound like the kind of material to crack or shatter because someone got some crud in their case. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.