{"id":171,"date":"2011-02-11T09:54:41","date_gmt":"2011-02-11T00:54:41","guid":{"rendered":"https:\/\/hack.gpl.jp\/2011\/02\/11\/minty-boost%e3%81%ae%e4%bd%9c%e8%80%85%e3%80%80%e3%81%88%e3%82%89%e3%81%84%ef%bc%81\/"},"modified":"2011-02-11T09:54:41","modified_gmt":"2011-02-11T00:54:41","slug":"post-171","status":"publish","type":"post","link":"https:\/\/hack.gpl.jp\/2011\/02\/11\/post-171.html","title":{"rendered":"Minty Boost\u306e\u4f5c\u8005\u3000\u3048\u3089\u3044\uff01"},"content":{"rendered":"
[vimeo http:\/\/www.vimeo.com\/13835359 w=400&h=225] <\/p>\n
Reverse engineering Apple’s secret charging methods<\/a> from adafruit industries<\/a> on Vimeo<\/a>.<\/p>\n iPhone\u304c\u5145\u96fb\u30e2\u30fc\u30c9\u3092USB Pin2,3 \u306e\u96fb\u5727\u3092\u898b\u3066\u6c7a\u3081\u3066\u3044\u308b\u6c7a\u5b9a\u7684\u306a\u8a3c\u62e0\u30d3\u30c7\u30aa\u3002\u30ca\u30a4\u30b9Job\u3067\u3059\u306d\u3002\uff01<\/p>\n \u3059\u3070\u3089\u3057\u3044\u3002\u30d3\u30c7\u30aa\u9014\u4e2d\u3001\u30c1\u30c3\u30d7\u62b5\u6297\u3092\u5916\u3059\u5834\u9762\u304c\u3042\u308b\u3093\u3067\u3059\u304c\u3001\u9593\u63a5\u71b1\u3067\u30d4\u30f3\u30bb\u30c3\u30c8\u3067\u5916\u3057\u3066\u3044\u307e\u3059\u306d\u3002\u3053\u3046\u3044\u3046\u30c6\u30af\u304c\u3042\u308b\u3068\u306f\u3001\u52c9\u5f37\u306b\u306a\u308a\u307e\u3059\u3002 <\/p>\n Apple\u306f\u30cf\u30fc\u30c9\u3068\u30bd\u30d5\u30c8\uff08OS)\u3092\u3001\u4e21\u9762\u304b\u3089\u4f5c\u308b\u4f1a\u793e\u306a\u306e\u3067\u3044\u308d\u3044\u308d\u3068\u3001\u9762\u767d\u3044\u4ed5\u639b\u3051\u3092\u3057\u3066\u304f\u308c\u307e\u3059\u306d\u3002\u898f\u683c\u3092\u5de5\u592b\u3057\u3066\u304f\u308b\u3068\u3053\u308d\u304c\u3059\u3054\u304f\u79c1\u306f\u597d\u304d\u306a\u3093\u3067\u3059\u304c\u3001\u3053\u3046\u3044\u3046\u3068\u3053\u308d\u3092\u5acc\u3046\u65b9\u3082\u3044\u307e\u3059\u3002 <\/p>\n 100\u5186\u30b7\u30e7\u30c3\u30d7\u306eUSB\u5145\u96fb\u5668\u304b\u3089\u3001\u601d\u308f\u306c\u3068\u3053\u308d\u306b\u7d50\u3073\u3064\u3044\u3066\u304d\u305f\u306e\u3067\u3001Hack\u3057\u305f\u7532\u6590\u306f\u3042\u308a\u307e\u3057\u305f\u306d\u3002\u30e2\u30ce\u3065\u304f\u308a\u306e\u539f\u70b9\u3002\u30d0\u30e9\u3057\u3066\u3001\uff11\u3064\uff11\u3064\u3058\u3063\u304f\u308a\u898b\u308b\u3002\u3042\u3042\u3067\u3082\u306a\u3044\u3001\u3053\u3046\u3067\u3082\u306a\u3044\u3068\u8a66\u884c\u932f\u8aa4\u3057\u3066\u624b\u3092\u52d5\u304b\u3059\u3002\u4e00\u898b\u7121\u99c4\u306a\u3088\u3046\u306b\u601d\u3048\u3066\u3082\u5b9f\u306f\u3001\u610f\u5473\u304c\u3042\u308b\u3093\u3067\u3059\u3088\u306d\u3002<\/p>\n <\/p>\n \u96fb\u5b50\u6a5f\u5668\u3001\u5e74\u3005\u3001\u3061\u3063\u3053\u304f\u306a\u3063\u3066\u3001\u30d1\u30fc\u30c4\u304c\u89e6\u308a\u306b\u304f\u3044\u306e\u3067\u3001\u305d\u306e\u3042\u305f\u308a\u304c\u60a9\u307f\u3069\u3053\u308d\u3002\u624b\u304c\u30d7\u30eb\u30d7\u30eb\u3075\u308b\u3048\u3061\u3083\u3046\u3093\u3067\u3059\u3082\u3093\u3002<\/p>\n","protected":false},"excerpt":{"rendered":" [vimeo http:\/\/www.vimeo.com\/13835359 w=400&h=225] Reverse engineering Apple’s secret charging method […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[2,14],"tags":[86,89,90,91,99,115,133,135],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false},"uagb_author_info":{"display_name":"JunkHack","author_link":"https:\/\/hack.gpl.jp\/author\/junkhack\/"},"uagb_comment_info":1,"uagb_excerpt":"[vimeo http:\/\/www.vimeo.com\/13835359 w=400&h=225] R…","_links":{"self":[{"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/posts\/171"}],"collection":[{"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":0,"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/posts\/171\/revisions"}],"wp:attachment":[{"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/media?parent=171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/categories?post=171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hack.gpl.jp\/wp-json\/wp\/v2\/tags?post=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}