The urea times of the fake iPhones have passed just enter the Free Market and see that the offer of options xing-ling copying Ma's smartphones at the most constitutes 95% (my estimate) of the site catalog. This does not mean, however, that this exotic specimen has completely disappeared from the map and, to the contrary effect, its very existence increasingly incites a somewhat masochistic curiosity in technology aficionados.
It was exactly with this feeling that the Motherboard purchased a fake iPhone X on the streets of Shenzhen, China, for an amount equivalent to R $ 380 (or $ 100). The goal? Turn the device up and down, exposing its character, its loyalties, its skills and its shortcomings.
The verdict? Well, you certainly at the You should buy this artifact which does not mean that it is not absolutely fascinating.
In terms of design and hardware, the fake iPhone X even looks like the original handset: people less versed in the look of Ma's most expensive smartphone can certainly confuse the two, though anyone with a little more knowledge about it will notice the most obvious differences immediately and they are, of course, at the front. The device xing-ling It has relatively pronounced edges at the top and bottom, as well as an artificial “cut-out” in the software that makes its interface particularly odd.
It is good to note that the fake iPhone X comes, amazingly, with a fully functional Lightning port for charging and syncing (something I had never seen on any fake iPhone; usually they all come with Micro-USB anyway). The case even has an IMEI number which, when searched for, corresponds to a true iPhone X who knows how or how the manufacturers got this code.
When it turns on the bug shows even more to come: naturally, we have here a brutally altered version of Android (version 6.0, already three years outdated), but the similarity with the scary iOS. Lock / splash screens and a variety of apps (such as Safari, Mail or Calculator) are virtually identical to the real ones; even Device Settings is an almost perfect copy of the iOS app, and you see, by accessing an area of settings that controls something that doesn't really exist on the device (like Apple Pay, for example), you're just doing it. Adjustments that don't fit anything are there to make the copy more realistic. Incredible!
Even more curious to note the copy of Face ID, which in this case was far from the original technology. When you set up the feature, the front (very questionable quality) camera opens and a green square is placed around your face. Ready! From there, your face can now be used to unlock the device just like any other. Just anyone in the universe stands in front of the iPhone X xing-ling so that he may receive you as its owner and master. Unfortunately they did not test the feature with other species it would be nice to see if a fern would also unlock the bug.
Other points of the software are just not very good forks: the Tempo app simply opens Yahoo Tempo, Podcasts opens YouTube ( _ () _ /), and the App Store, while highly tailored to really look real, shows a warning that says “Google Play failed” when it crashes. Ah, at least at one point the iPhone X xing-ling outperforms the original by miles and miles: by opening Maps, you are actually opening Google Maps.
So far, our object of study seems to be just a harmless, considerably slower and reasonably funny copy of a 10x more expensive product, would it then be a reasonable investment? Well no, simply because the security applied here is basically nil and the software is infested with potentially malicious agents.
THE Motherboard He took the device to researcher Chris Evans of the Avengers Trail of Bits security analysis firm, and the findings were pretty bleak. The Android version here is described as a "patchwork" from a number of online sources, making the system a pudding full of privacy holes; applications have absolutely meaningless permissions (Bssola's can read your text messages, for example) and you can't control those permissions. There is no kind of sandboxing.
Worse, when you turn on the fake iPhone X for the first time, it asks you to sign in with your iCloud account, which is obviously just to keep up appearances, since nothing there is authenticated to communicate with Apple's servers. Your credentials then go to a database that is accessible to all applications and whoever is watching system activity (which, I suspect, may be a club of people).
Overcoming the holistic analysis of the pet, all that remained was to shamelessly look at its insides. The first attempt to open the fake iPhone X was unsuccessful, as the two screws flanking the Lightning door are merely aesthetic. Incidentally, opening the device (which was only possible by the crude method of sticking a juice accessory on the screen and pulling it tightly), it is noted that screws in general are a rare element in its construction: almost everything assembled and secured with Rivets, which are cheaper to apply but require that you basically break the entire device to fix it or not fix it, in case.
In the end, the “iPhone X” of the Motherboard it was totally destroyed for the sake of science; now only his memory remains and the certainty that his existence served as a clear advance for humanity. We do not forget his teachings.