THE UNAUTHORIZED GUIDE to IPHONE®, IPAD®, and IPOD® REPAIR a DIY Guide to Extending the Life of Your Idevices!

Total Page:16

File Type:pdf, Size:1020Kb

THE UNAUTHORIZED GUIDE to IPHONE®, IPAD®, and IPOD® REPAIR a DIY Guide to Extending the Life of Your Idevices! THE UNAUTHORIZED GUIDE TO IPHONE®, IPAD®, AND IPOD® REPAIR A DIY Guide to Extending the Life of Your iDevices! Timothy L. Warner 800 East 96th Street, Indianapolis, Indiana 46240 USA ii The Unauthorized Guide to iPhone®, iPad®, and iPod® Repair The Unauthorized Guide to iPhone®, iPad®, Editor-in-Chief and iPod® Repair Greg Wiegand Copyright © 2013 by Pearson Education, Inc. Executive Editor All rights reserved. No part of this book shall be reproduced, stored in Rick Kughen a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from Development Editor the publisher. No patent liability is assumed with respect to the use of the Rick Kughen information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for Technical Editor errors or omissions. Nor is any liability assumed for damages resulting from the Walter Galan, use of the information contained herein. ifi xit.com ISBN-10: 0-7897-5073-2 ISBN-13: 978-0-7897-5073-0 Managing Editor Kristy Hart Library of Congress Cataloging-in-Publication Data is on fi le Printed in the United States of America Senior Project First Printing: May 2013 Editor Lori Lyons Trademarks Copy Editor All terms mentioned in this book that are known to be trademarks or service Charlotte Kughen, marks have been appropriately capitalized. Que Publishing cannot attest to the The Wordsmithery accuracy of this information. Use of a term in this book should not be regarded LLC as affecting the validity of any trademark or service mark. Indexer Warning and Disclaimer Tim Wright Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fi tness is implied. The information provided is on Proofreader an “as is” basis. The authors and the publisher shall have neither liability nor Kathy Ruiz responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. Publishing Coordinators While Que, iFixit, and I have made every effort to ensure that the directions provided in this book are complete and accurate, any attempt on the reader’s Cindy Teeters part to perform an iDevice do-it-yourself upgrade or repair is solely at the Kristen Watterson reader’s risk. Even when our instructions are carefully followed, the slightest misstep in disassembly or reassembly could result in further damage or Book Designer destruction of the iDevice. Also, any attempt to repair or upgrade your iDevice Anne Jones immediately voids any warranty you have through Apple. You’ve been warned! Compositor Bulk Sales Nonie Ratcliff Que Publishing offers excellent discounts on this book when ordered in quantity Manufacturing for bulk purchases or special sales. For more information, please contact Buyer U.S. Corporate and Government Sales Dan Uhrig 1-800-382-3419 [email protected] For sales outside of the U.S., please contact International Sales [email protected] Contents at a Glance iii Contents at a Glance Introduction 1 CHAPTER 1 Why Do it Yourself? 5 CHAPTER 2 The Tools of the Trade 25 CHAPTER 3 Protecting Your iDevice User Data and Settings 43 CHAPTER 4 iDevice Repair Best Practices 59 CHAPTER 5 iPhone 3GS Disassembly and Reassembly 71 CHAPTER 6 iPhone 4S Disassembly and Reassembly 87 CHAPTER 7 iPhone 5 Disassembly and Reassembly 109 CHAPTER 8 iPad 2nd Generation Disassembly and Reassembly 129 CHAPTER 9 iPad 3rd and 4th Generation Disassembly and Reassembly 145 CHAPTER 10 iPad mini Disassembly and Reassembly 159 CHAPTER 11 iPod touch 4th Generation Disassembly and Reassembly 177 CHAPTER 12 iPod nano 5th and 7th Generation Disassembly and Reassembly 193 CHAPTER 13 Sourcing iDevice Replacement Parts 211 CHAPTER 14 Addressing Water Damage 217 CHAPTER 15 Replacing the Front Display and/or Rear Case 225 CHAPTER 16 Replacing the Battery 233 CHAPTER 17 Replacing the Logic Board and/or Dock Connector 243 CHAPTER 18 Recovering Data from Your Broken iDevice 255 CHAPTER 19 Before You Sell, Donate, or Recycle Your iDevice 267 Index 277 iv The Unauthorized Guide to iPhone®, iPad®, and iPod® Repair Table of Contents Introduction 1 Chapter 1 Why Do It Yourself? 5 The Benefits of DIY iDevice Repair 5 Saving Money 6 Fighting Back Against the “Tyranny” of Apple 6 Preparing to Become an Apple Tech 7 Earning Extra Money 9 iDevices—A Roster 10 iPod 10 iPod touch 13 iPhone 13 iPad 15 Limiting Our Scope 17 Apple Warranties and You 18 Apple Hardware Warranty 18 AppleCare+ 19 Finding Old, “Broken” iDevices 21 Pawn or Secondhand Shops 21 eBay or Craigslist 22 Amazon.com 23 Yard Sales or Flea Markets 24 Friends, Family, and Colleagues 24 Bulletin Boards 24 Chapter 2 The Tools of the Trade 25 What Does It Take to Become an iDevice Technician? 25 Character Traits 26 Technical Ability 27 Obtaining iDevice Technician Tools 28 Sources for iDevice Tech Tools 28 ESD Safety Equipment 29 Screwdrivers 31 Spudger 31 Table of Contents v Plastic Opening Tool(s) 32 Heat Gun/Hair Dryer 32 Magnetizer/Demagnetizer 34 Pick-up Tools 34 Work Lamp with Magnifying Glass 34 Magnetic Project Mat 35 Industry Certification 36 Increased Professional Credibility 36 Gaining a Leg Up in the Job Market 36 Meeting Apple’s Certification Requirements 37 Attaining Deeper Access to Apple Tech Resources 37 Increased Confidence 38 Certification Options 38 Apple Certified Macintosh Technician (ACMT) 38 iCracked iTech 39 OnForce Consultant 40 Apple Consultants Network (ACN) 40 Chapter 3 Protecting Your iDevice User Data and Settings 43 What Exactly Do You Need to Back Up? 43 Backing Up an iDevice by Using iTunes 11 44 Where Are the Backup Files Stored? 46 Backing Up an iDevice by Using iCloud 48 Backing Up an iDevice Manually 50 Restoring an iDevice by Using iTunes 11 50 Restoring an iDevice by Using iCloud 51 Jailbreaking and Unlocking iDevices 52 What Is Jailbreaking? 52 What Is Unlocking? 56 Chapter 4 iDevice Repair Best Practices 59 Checking iDevice Warranty Coverage 59 Verifying iDevice Version Info 62 What Are Order Numbers? 64 Deciphering iOS Speak 65 vi The Unauthorized Guide to iPhone®, iPad®, and iPod® Repair How Do Warranty Repair Orders Work? 66 Creating an ESD-Safe Workspace 67 Wear Appropriate Clothing and Protect Your Workspace 67 Handle IC Components Appropriately 68 Condition the Air in Your Workspace 68 Documenting and Securing Your iDevice Components 69 Chapter 5 iPhone 3GS Disassembly and Reassembly 71 iPhone 3GS External Anatomy 73 Disassembly Procedure 75 Reassembly Notes 85 A Few Words About iOS 6 85 Chapter 6 iPhone 4S Disassembly and Reassembly 87 External Anatomy 88 Required Tools 90 Disassembly Procedure 90 Reassembly Notes 107 Chapter 7 iPhone 5 Disassembly and Reassembly 109 External Anatomy 110 Required Tools 113 Disassembly Procedure 113 Reassembly Notes 126 On Material Costs and Profit Margins 127 Chapter 8 iPad 2nd Generation Disassembly and Reassembly 129 External Anatomy 130 Required Tools 133 Disassembly Procedure 133 Reassembly Notes 143 What Exactly Is a Retina Display? 143 Chapter 9 iPad 3rd and 4th Generation Disassembly and Reassembly 145 External Anatomy 146 Required Tools 148 Disassembly Procedure 148 Reassembly Notes 157 Why Do Front and Rear Cameras Have Different Resolutions? 157 Table of Contents vii Chapter 10 iPad mini Disassembly and Reassembly 159 External Anatomy 160 Required Tools 162 Disassembly Procedure 162 Reassembly Notes 174 What Are Benchmarks? 174 Chapter 11 iPod touch 4th Generation Disassembly and Reassembly 177 External Anatomy 178 Required Tools 180 Disassembly Procedure 180 Reassembly Notes 191 Is the iPod touch a “Watered Down” iPhone? 192 Chapter 12 iPod nano 5th and 7th Generation Disassembly and Reassembly 193 External Anatomy 194 Required Tools 198 Disassembly Procedure 198 iPod nano 5th Generation Reassembly Notes 208 iPod nano 7th Generation Quick-Disassembly 208 About the Mysterious Pixo OS 210 Chapter 13 Sourcing iDevice Replacement Parts 211 What Is OEM, and Why Do I Care? 211 Where Can I Find OEM iDevice Parts? 213 No Guarantees 213 Study Buyer Reviews 214 Trust Your Gut 214 But Where Do I Start My Search? 214 Grim Realities 215 Chapter 14 Addressing Water Damage 217 The Problem of Water Damage 217 Warranty Ramifications of Water Damage 218 Liquid Contact Indicators (LCIs) and You 218 viii The Unauthorized Guide to iPhone®, iPad®, and iPod® Repair How to Address a Waterlogged iDevice: Non-Invasive Approach 219 The Rice Method 220 Dedicated Drying Tools 220 How to Address a Waterlogged iDevice: Invasive Approach 221 How to Limit the Possibility of Water Damage 222 Purchase a Specialty Case 222 Limit Exposure to Steam 223 Use a Low-Tech Plastic Baggie 223 Chapter 15 Replacing the Front Display and/or Rear Case 225 Anatomy of the iDevice Front Display 226 Repair Options and DIY Strategies 227 Visit the Apple Store 228 Hire a Third Party to Replace the Display 228 Do It Yourself 229 How to Minimize Damage to the Display/Rear Case 232 Chapter 16 Replacing the Battery 233 What You Need to Know about Lithium-Ion Batteries 234 What Is the “Memory Effect”? 235 Understanding iDevice Battery Specifications 236 Best Practices for iDevice Battery Use 237 Exploding Batteries 238 Maximizing Battery Life 239 Performing Battery Replacements 240 Chapter 17 Replacing the Logic Board and/or Dock Connector 243 About the Logic Board 243 iDevice Connectors 245 Repair Advice 249 Tips and Tricks for Logic Board Replacements 251 iPhone 5 251 iPad 3rd
Recommended publications
  • Managing App Sideloading Threats on Ios Whitepaper
    Whitepaper Enterprise Mobile Security Managing App Sideloading Threats on iOS Whitepaper I. Introduction II. The Path to App Sideloading Through rigorous app review Apple has lowered the risk Signing Certificates of downloading malware from its App Stores to near Apple offers two types of signing certificates for app zero. Companies, however, increasingly rely on an app- distribution outside of their App Stores and both types distribution mechanism called enterprise provisioning allow users to install and execute signed apps on that allows them to distribute apps to employees without non-jailbroken devices: Apple’s review as long as the apps are signed with an Apple-issued enterprise signing certificate. 1) A developer certificate, intended to sign and deploy test apps to a limited number of devices. Unfortunately, attackers have managed to hijack this app-distribution mechanism to sideload apps on 2) An enterprise certificate, intended to sign non-jailbroken devices, as demonstrated in the recent and widely deploy apps to devices within an Wirelurker attack. Organizations today face a real organization. security threat that attackers will continue to abuse To obtain these certificates you must enroll in one of enterprise provisioning and use it to sideload malware, Apple’s two iOS developer programs. Table 1 on the especially since: following page summarizes the enrollment requirements 1) The widespread prevalence of legitimate, for each program and their app provisioning restrictictions. enterprise-provisioned iOS apps in the workplace Both types of signing certificates expire after a year, has conditioned employees to seeing (and ignoring) whereupon developers can apply for new ones. Apple can the security warnings triggered on devices also revoke certificates if it learns of abuse and an app when installing these apps.
    [Show full text]
  • White Paper Arca.Com Apple’S Genius Bar: a Model to Address Declining Bank Traffic
    APPLE’S GENIUS BAR®: a model to address declining bank traffic June 2016 WHITE PAPER ARCA.COM APPLE’S GENIUS BAR: A MODEL TO ADDRESS DECLINING BANK TRAFFIC :: EXECUTIVE SUMMARY The community bank used to be a busy place. Customers stood in line, if not happily, at least willingly, since it was the only way to manage their accounts and conduct their financial transactions. So, it comes as no surprise to those in the banking industry — or even those who still frequent brick-and-mortar banks — that bank traffic has declined precipitously in the last several decades. Statistics support this anecdotal evidence. Research firm, FMSI, reported in its 2015 Teller Line Study1 that bank branch transaction volumes have decreased 45 percent since 1992. So, why the decline? At its roots, this reduction in branch traffic is the result of changing customer demands. Today’s customers want shorter wait times, expert advice and personal, concierge-style service. Banks have responded by upgrading their mobile services and offering more of the traditionally in-branch-only features online. The fact that banks are responding to changing customer behaviors and rolling out new online and mobile services further reduces customers’ need to go to the bank. This flexibility and willingness to innovate, while entirely necessary, only increases the rate at which customers are moving away from traditional banking methods. As banks continue to lose foot traffic, many are seeking an actionable solution to the problem. Perhaps they can take a cue from the nearest Apple® store. By implementing a model that mirrors Apple’s Genius Bar®, banks can satisfy customers by: • Reducing wait time • Providing expert advice • Offering highly trained staff Once just a theory, the benefits of this approach have been proven in practice.
    [Show full text]
  • The Retirement Boom
    THE RETIREMENT BOOM Integration: The Circle Goals Exercise Here is one of our ways to get you thinking and building a plan that will take you to the place you dream about. Now you have a vision; let’s get the goals on paper. Often the New Year’s resolutions that we write are forgotten two weeks later, possibly because they are not realistic or do not relate to real life. Then we go right back to our old habits, whether they are about our health, finances, relationships, or work, thus sustaining lives that are not balanced, and are therefore, unfulfilling. The Circle Goals Exercise is about changing your life and putting it back into harmony and balance. In the exercise section of this chapter, we’re going to ask you to com- plete Circle Goals that will serve as your guidepost for integrating all aspects of your life. Cathy created this activity and used it for several years before we wrote about it in our books Reboot Your Life and Revolutionary Retirement. The purpose of the exercise is to balance your life around its most important aspects for the coming year and to move you closer to realizing your dreams. The simple chart is a circle divided into six or eight pie slices of equal size to remind you to give equal time—at least mental thought— to them. It’s a holistic approach. 1 Planning and Designing Your Reinvention Label the pie slices on the chart with six key aspects of your life. Examples might be: career, financial, travel, philanthropy, spirituality or religion, creativity, friends and family, romantic relationships, health and exercise, or whatever you want to realize over the next year.
    [Show full text]
  • MYOB EXO Onthego Setup Guide
    MYOB EXO OnTheGo Setup Guide Contents Introduction 1 Welcome to MYOB EXO OnTheGo! .......................................................... 1 Installation 2 Pre-Install Requirements .......................................................................... 2 Installing the EXO API .............................................................................................. 2 Installing EXO OnTheGo ............................................................................ 2 Setup 3 Setting up EXO Business ........................................................................... 3 Adding the EXO OnTheGo Licence ........................................................................... 3 Adding EXO OnTheGo Access and Devices .............................................................. 3 Logging in to EXO OnTheGo ...................................................................... 5 Setting up a Connection .......................................................................................... 5 Troubleshooting 7 Frequently Asked Questions ..................................................................... 7 Introduction Welcome to MYOB EXO OnTheGo! The MYOB EXO OnTheGo app communicates with MYOB EXO Business to provide access to the system from your mobile device. This document is intended to get you up and running with the app—it includes the following sections: • Installation – how to download and install the EXO OnTheGo app, and what you need beforehand. • Setup – how to set up EXO Business to use the EXO OnTheGo app, and
    [Show full text]
  • The Secrets of Apple's Retail Success
    The Secrets of Apple’s Retail Success Steve Chazin About the Author Steve Chazin is a product marketing expert, keynote speaker, eCommerce guru, viral growth specialist, seminar leader and prolific blogger at http://MarketingApple.com Steve is currently Vice President for Products at Salesforce.com, the leading cloud computing and social enterprise company. A few days after resigning from Apple in 1997, Steve was asked by Steve Jobs to help rebuild Apple’s product and marketing efforts. Consequently, Steve was part of the team that brought the iMac to market, helped return the company to profitability and created the blueprint for the future product launches of iPod, iPhone & iPad. Steve’s firsthand knowledge of how Apple was saved by better marketing is described in his free eBook and personally told through his engaging keynotes. Steve has delivered over fifty keynotes, seminars and workshops at trade shows, conferences and leadership events in more than 20 countries. An engaging and warm on-stage personality, Steve can adeptly range from traditional lectures to motivational speeches involving audience participation. Because he has built a unique practice applying and describing Apple’s marketing prowess, Steve is a frequent television, radio, and print celebrity and can be seen and heard on BBC, CNBC, ABC News, Fox News, ClearChannel Radio, quoted in the Wall Street Journal, Fortune, New York Times, LA Times, BusinessWeek, MacWorld, and is referenced in popular marketing and education textbooks. Steve can be reached at [email protected] Steve has performed extensive field research, held on site visits, and interviewed dozens of employees, customers and partners of Apple’s retail operations to produce this comprehensive guide detailing the hidden secrets behind Apple’s remarkable retail success.
    [Show full text]
  • Compromised Connections
    COMPROMISED CONNECTIONS OVERCOMING PRIVACY CHALLENGES OF THE MOBILE INTERNET The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and many other international and regional treaties recognize privacy as a fundamental human right. Privacy A WORLD OF INFORMATION underpins key values such as freedom of expression, freedom of association, and freedom of speech, IN YOUR MOBILE PHONE and it is one of the most important, nuanced and complex fundamental rights of contemporary age. For those of us who care deeply about privacy, safety and security, not only for ourselves but also for our development partners and their missions, we need to think of mobile phones as primary computers As mobile phones have transformed from clunky handheld calling devices to nifty touch-screen rather than just calling devices. We need to keep in mind that, as the storage, functionality, and smartphones loaded with apps and supported by cloud access, the networks these phones rely on capability of mobiles increase, so do the risks to users. have become ubiquitous, ferrying vast amounts of data across invisible spectrums and reaching the Can we address these hidden costs to our digital connections? Fortunately, yes! We recommend: most remote corners of the world. • Adopting device, data, network and application safety measures From a technical point-of-view, today’s phones are actually more like compact mobile computers. They are packed with digital intelligence and capable of processing many of the tasks previously confined
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • Developer Bootstrap: Good Control Essentials
    Developer Bootstrap: Good Control Essentials Last updated: Wednesday, December 21, 2016 ©2016 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, BBM, BES, EMBLEM Design, ATHOC, MOVIRTU and SECUSMART are the trademarks or registered trademarks of BlackBerry Limited, its subsidiaries and/or affiliates, used under license, and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. All other trademarks are the property of their respective owners. This documentation is provided "as is" and without condition, endorsement, guarantee, representation or warranty, or liability of any kind by BlackBerry Limited and its affiliated companies, all of which are expressly disclaimed to the maximum extent permitted by applicable law in your jurisdiction. 2 Developer Bootsrap: Good Control Contents Revision history 5 Introduction 6 Background and assumptions 6 Activating Your First GD Application 6 To set up your first GD application and prepare for activation 6 To set up the user's device 7 Add Users 7 Adding A Single User Account via Active Directory 7 Import Users by AD Group 8 Adding Multiple User Accounts via Active Directory 8 Adding User Accounts 9 Importing Multiple User Accounts from CSV File 10 CSV Record Layout and Limits 10 Import Process 11 Possible Error Messages 11 Adding applications 13 Adding a custom application 13 Adding BlackBerry Dynamics app IDand version only 13 Specifying app servers 14 Adding new BlackBerry Dynamics entitlement versions (BlackBerry Dynamics app versions) 14 Entitling end-users to applications or denying them 15 Sequence of app version entitling and denying: entitle, then deny 15 Activating an Application for a User 15 Action by the User 16 3 BlackBerry Dynamics documentation 17 4 Revision history Revision history Date Description 2016-12-19 Version numbers updated for latest release; no content changes.
    [Show full text]
  • Apple Xgrid Runs with the Wolves
    Search Apple Xgrid runs with the wolves Apple Research & Technology Support Profiles in Success: Swedish University of Agricultural Sciences Programme Overview Research Opportunities ARTS Laureate Winners ARTS Institutions Swedish University of Agricultural Sciences Apple Xgrid runs with the wolves Fast results from Xgrid Cost-effective for future research Using Apple technology, the Grimsö Wildlife Research Station in Sweden is learning important techniques for sustainable management of the wolf population. Based at the Swedish University of Agricultural Sciences (SLU), the station is using an Apple Xgrid cluster system – provided by the Apple Research & Technology Support programme (ARTS) – to understand wolf demography and develop optimal management strategies. Its work will have a deep impact on how mankind interacts with these ancient but troublesome Challenges predators. Develop management strategies to “Wolf populations are expanding through natural return to past habitats in Europe, ensure wolf population viability or through reintroduction by Government agencies in the US”, explains Dr Prevent wolf extinction while Guillaume Chapron, Assistant Professor, Grimsö Wildlife Research Station at SLU. allowing for population control “They are posing problems, however - to hunters or sheep farmers, for example. So Address people and decision maker the urgent question is how we ensure wolf populations can survive, while still concerns regarding the place of allowing for some population control. Wolves have a complex ecology and the Xgrid wolves in Sweden cluster will run simulations faster than any other solution. It is critical to our Provide efficient programming and modelling environment to simulate research”. and understand wolf population ecology SLU is a modern university, designed to confront and explore many of today’s most Provide efficient programming and compelling environmental questions, “whether it is the food we eat, or the animals modelling environment to simulate we husband on our farms or love as pets, or the forests that we wander through”.
    [Show full text]
  • Defendant Apple Inc.'S Proposed Findings of Fact and Conclusions Of
    Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 1 of 325 1 THEODORE J. BOUTROUS JR., SBN 132099 MARK A. PERRY, SBN 212532 [email protected] [email protected] 2 RICHARD J. DOREN, SBN 124666 CYNTHIA E. RICHMAN (D.C. Bar No. [email protected] 492089; pro hac vice) 3 DANIEL G. SWANSON, SBN 116556 [email protected] [email protected] GIBSON, DUNN & CRUTCHER LLP 4 JAY P. SRINIVASAN, SBN 181471 1050 Connecticut Avenue, N.W. [email protected] Washington, DC 20036 5 GIBSON, DUNN & CRUTCHER LLP Telephone: 202.955.8500 333 South Grand Avenue Facsimile: 202.467.0539 6 Los Angeles, CA 90071 Telephone: 213.229.7000 ETHAN DETTMER, SBN 196046 7 Facsimile: 213.229.7520 [email protected] ELI M. LAZARUS, SBN 284082 8 VERONICA S. MOYÉ (Texas Bar No. [email protected] 24000092; pro hac vice) GIBSON, DUNN & CRUTCHER LLP 9 [email protected] 555 Mission Street GIBSON, DUNN & CRUTCHER LLP San Francisco, CA 94105 10 2100 McKinney Avenue, Suite 1100 Telephone: 415.393.8200 Dallas, TX 75201 Facsimile: 415.393.8306 11 Telephone: 214.698.3100 Facsimile: 214.571.2900 Attorneys for Defendant APPLE INC. 12 13 14 15 UNITED STATES DISTRICT COURT 16 FOR THE NORTHERN DISTRICT OF CALIFORNIA 17 OAKLAND DIVISION 18 19 EPIC GAMES, INC., Case No. 4:20-cv-05640-YGR 20 Plaintiff, Counter- DEFENDANT APPLE INC.’S PROPOSED defendant FINDINGS OF FACT AND CONCLUSIONS 21 OF LAW v. 22 APPLE INC., The Honorable Yvonne Gonzalez Rogers 23 Defendant, 24 Counterclaimant. Trial: May 3, 2021 25 26 27 28 Gibson, Dunn & Crutcher LLP DEFENDANT APPLE INC.’S PROPOSED FINDINGS OF FACT AND CONCLUSIONS OF LAW, 4:20-cv-05640- YGR Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 2 of 325 1 Apple Inc.
    [Show full text]
  • Executive Summary
    1 Executive summary Welcome to the third edition of the Mobile Security and Risk Review. This bi-annual review provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. This edition includes: Regional data Industry-specific Statistics from Australia, Belgium, France, data for financial services, on the adoption of Apple’s Device Germany, Japan, the Netherlands, government, and healthcare Enrollment Program (DEP) and Spain, the United Kingdom, and the Volume Purchase Program (VPP) United States The most popular The top blacklisted enterprise apps mobile apps Several areas saw little change or improvement over the last six months: only Less than 29% 55% 5% of companies had outdated consistently enforced deployed mobile anti-malware policies security policies To help IT organizations make risk mitigation part of their mobile security routine, we developed the Security Hygiene Priority Checklist. 2 The mobile threat landscape New Threats and Trends Almost immediately after we published the second edition of this report, high profile vulnerabilities and new malware families began appearing. The Godless malware, identified in late June 2016, managed to infect an estimated 850,000 devices.1 Initially discovered in February 2016, Hummingbad was more widely analyzed in July, and it appears it was created by Yingmob, the group behind the YiSpectre iOS malware that made headlines last year. Hummingbad succeeded in infecting nearly 85,000,000 devices.2 The apparent goal of both malware families was to drive fraudulent ad revenue. However, what is more more notable — and sinister — is that they contained exploits that attempt to “root” devices over the air without the user’s knowledge, thus giving attackers full control of an infected device.
    [Show full text]
  • Download Ios 12 Eta Download Ios 12 Eta
    download ios 12 eta Download ios 12 eta. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67d363cfac2d15fe • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Download iOS 12 Beta 1 IPSW for iPhone and iPad. iOS 12 beta 1 IPSW firmware can now be downloaded for installation on iPhone 5s, SE, 6, 6s, Plus, 7, 8, X, and iPad Mini 2 and above, as well as iPod Touch 6G. Introduced at WWDC 2018, it’s available for those on the Apple Developer Program. iOS 12 is the latest update from Apple for iDevices and boasts a number of new features. Its public release is slated for fall, 2018. You can download iOS 12 beta 1 ISPW firmware file for your device right now. iOS 12 Beta 1 IPSW Download Is Now Available for iPhone X, 8, 7+, 7, 6s, 6, SE, 5s, iPod & iPad. Interested in trying out this early beta of iOS 12? Well then, follow the steps we’ve listed below.
    [Show full text]