Feeds

Pile of fanboi cash taking up space in garage? IPHONE UNDERTAKERS are keen to help you

Seek kickfunds, smashed-up iPhones so they can SELL you smashed-up iPhones

High performance access to file storage

A crafty group of "upcyclers" are looking for funds and phones to start their recycled iPhone craft project and, er, presumably sell it back to you. So if you're struggling to "start a conversation" with a fellow fanboi, this might be for you.

An American firm has launched a bid to turn smashed iPhones into "interesting" bits of furniture, kitchen accessories and even jewellery.

Twice Used has started a Kickstarter campaign to raise awareness and funds for its project to resurrect the ghosts of iPhones past.

"Each screen tells a story of clumsiness and everlasting remorse," wrote Chris Koerner, the man behind the project. "You will not find a better conversation-starter than this."

Twice Used aims to keep dangerous materials out of landfill sites by putting them in your home, which isn't quite as bad an idea as it sounds. The firm has already gathered 2,000 broken bits of iPhone and are hoping to partner with repair firms to source more broken iStuff.

"Twice Used is a project set to serve dual purposes: Eliminate hazardous electronic waste by manufacturing modern household goods by hand in the USA," Koerner continued. "We have designed and prototyped a handful of attractive products that all have one thing in common: They are all made from used iPhone glass and other parts such as home buttons.

"All of this glass comes from iPhones that were in the clumsy hands of individuals all over the world. The phones were dropped, brought into a repair shop to be fixed, and then the glass was sold to us to make this artwork."

So what does this mean for fashion-conscious fanbois and gurlz? Well, it means products that make the Google Glass look positively stylish.

Here's a table made of 100 broken iPhones:

Likewise, have a gander at a picture frame and clock:

Finally, here's some jewellery made from old iPhone home buttons:

The Kickstarter has just launched and has raised about $1,000 of its target of $10,000. Click here to support the project.

"As long as people are dropping phones we will have products to make," Koerner said. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.