Is iPhone X Waterproof or Water Resistant? We Have the Answer

Apple launched the iPhone 7 and 7 Plus, the first water resistant certified iPhone models, back in September of 2016. And though they weren’t the first waterproof smartphones to market (an award owed to Sony’s 2013 Xperia Z), Apple’s previous iPhone flagships nevertheless received one of the International Electrotechnical Commission (IEC’s) highest certification ratings of IP67.

Mumblings from the rumor mill leading up to their launch in September, led us to believe that Apple’s iPhone X would receive a modest boost to IP68 certification. As we’ve come to find out, though, iPhone X along with its iPhone 8 counterparts were ultimately given the same IP67 rating as their predecessors.

Is iPhone X Waterproof?

Not technically. The iPhone X is regarded as water resistant, however it can be fully submerged in shallow water for up to 30 minutes.

According to Apple, “iPhone X is splash, water and dust resistant, and was tested under controlled laboratory conditions with a rating of IP67 under IEC standard 60529. Splash, water and dust resistance are not permanent conditions, and resistance might decrease as a result of normal wear. Do not attempt to charge a wet iPhone; refer to the user guide for cleaning and drying instructions. Liquid damage not covered under warranty”

IP67 vs IP68

An IPXX rating, according to the IEC, is assurance that “ingress of water in harmful quantity shall not be possible when the enclosure is immersed in water under defined conditions of pressure and time.”

  • In the case of an IP67 certified device like iPhone X, complete water submersion is feasible — though not encouraged — for up to 30 minutes at a maximum depth of 3.28 feet (1m). Apple’s iPhone 8, iPhone 8 Plus, iPhone 7, and iPhone 7 Plus are also IP67 certified.
  • An IP68 rating, meanwhile, implies the same 30 minute time restraints while upping the depth threshold to 4.92 feet (1.5m). Samsung’s high-end Galaxy smartphones achieve the IP68 rating.

You can submerge your iPhone X under water for no longer than 30 minutes. Beyond that point, and beyond a depth of 3 feet, you’re running the risk of your device sustaining serious, irreparable water damage.

  • Can I shower with iPhone X? YES
  • Can I drop an iPhone X in the bath or toilet? YES
  • Should I swim or dive with iPhone X? NO

If you were to drop your iPhone X in the toilet, bathtub, or swimming pool full of water, even if you jump in with it still in your pocket, you’ll more than likely be in the clear.

If you were to accidentally spill a water-based beverage like beer, juice, or gatorade on your iPhone X, it will more than likely continue to function — although it’ll likely be a bit sticky from the beverage residue, requiring a bit of wiping up and disinfecting on your end.

If you’re looking for tips on how to clean your sticky or soiled iPhone, be sure to check out our complete guide to cleaning and disinfecting your iPhone the natural way.

Can I Take My iPhone X Swimming?

Owners are strongly advised against taking their iPhone X for a swim. Regardless of the water type — be it a swimming pool, lake, or ocean — both iPhone X, and Samsung’s slightly more submergible Galaxy Note 8, can only go so deep.

And you definitely don’t want to start pushing those limits, particularly because the IEC’s definitive tests were conducted under strictly monitored lab conditions. Meaning it’s unlikely that your real world experience of getting iPhone wet will hold the same precedent.

Final Thoughts

While a depth of 3.26 feet (for a maximum of 30 minutes) might seem stingy to those who dreamed of embarking on a deep-sea ‘iPhone X-ploration’, it’s still deep enough (and certainly long enough) to serve the purpose for which the phone is even IP certified in the first place.

Apple published an exhaustive Support Page outlining the terms, conditions and guidelines for how best to protect your iPhone X, and how to avoid damaging its internal components via water exposure. The guidelines, of course, are meant to serve as a warning against “trying this at home” — and they should be followed in that regard, especially since your warranty depends on it!

Still, the iPhone X is basically waterproof — let’s not dismiss the raw facts over a few technicalities, shall we? While a snorkeling expedition or swim in the deep-end of the pool might be out of the question, that’s not to say you can’t enjoy your iPhone X by the water. Live it up, in fact! And with summer just around the corner, it’s a great time to get your hands on waterproofed accessories for your waterproofed iPhone.

This iPhone compatible Dual-USB Solar Charger features a rugged, water-resistant shell with built in Solar panels to help charge up your waterproof iPhone using the power of the sun. Complete with a 5,000 mAh reserve, dual USB-A ports for simultaneous charging, and LED indicators to keep you informed, this portable, water-resistant powerhouse is your perfect poolside companion. Get it here in one of four unique colors for less than $ 20.

iDrop News

Ohio Man Used Malware to Spy on Thousands of Mac Users for 13 Years

An Ohio man named Phillip Durachinsky, 28, has been charged with allegedly creating and using malware to spy on thousands of Mac users for more than a decade.

The details of how Durachinsky used the malware, dubbed “Fruitfly,” are also incredibly creepy. He not only collected personal and sensitive information from computers, but also used their microphones and webcams to watch and listen to thousands of victims, according to a recently unsealed U.S. District Court indictment.

According to a Justice Department press release, Durachinsky stole personal data such as login credentials, medical records, tax records and banking information. He also logged users’ keystokes, took screenshots, and used some of the audio and video he recorded to produce child abuse imagery.

There’s no end to the creepiness: the 28-year-old saved “millions” of images, kept extremely detailed notes on his victims, and even implemented a measure that alerted him if a user typed in words associated with pornography, the DoJ said.

The victims included individuals, schools, companies, a police department, and even federal government entities — including one connected to the U.S. Department of Energy. And Durachinsky primarily used Fruitfly to infect Mac computers, but the DoJ noted that he wrote variants of the malware that could compromise Windows-based machines, too.

But perhaps the most stunning thing about Fruitfly is how it managed to remain undetected for 13 years. According to Justice Department officials, the malware itself was relatively unsophisticated and easy to catch. And yet, no one did.

Durachinsky wasn’t even arrested for Fruitfly, either. Forbes reported that the Ohio man was charged about a year ago with hacking computers at Case Western Reserve University. He was caught when the university alerted the FBI of the infected computers. The Bureau found that those computers had been compromised for years, and that Durachinsky infected other universities. But the arrest apparently had nothing to do with Fruitfly.

The spyware was discovered last year when former NSA analyst and security researcher Patrick Wardle came across a new strain of Fruitfly. With further analysis, he found at least 400 infected Mac computers — and gave his information to the FBI, Forbes reported in July 2017.

Wardle told CNN that the length of the incredibly invasive hacking campaign was “mind-blowingly long.” He added that, while Mac malware isn’t as prevalent as PC viruses, Apple’s flagship computers can still be infected with malicious programs.

It’s currently unclear how Fruitfly infects computers. But there’s no indication that it exploited any security vulnerabilities, so it’s likely that it gained access to computers by tricking people into clicking on malicious links or email attachments.

Durachinsky is currently in custody. He is being charged with violating both the Computer Fraud and Abuse Act and the Wiretap Act, as well as for aggravated identity theft and production of child pornography.

iDrop News

The Zanco Tiny T1 Is the Smallest Phone in the World

Whether for better or for worse phones are getting bigger and bigger. They have high definition, multitouch displays, high performance CPUs, fantastic cameras, and more. But bigger isn’t always better and there are people who want a more traditional cell phone – as well as others who may enjoy the novelty of a compact phone.

Enter the Zanco Tiny T1. It’s, well… tiny. At just 21mm by 46.7mm, 12mm thin, and weighing only 13 grams, and looks something like a flash drive. It doesn’t have an Internet browser, apps, or a touch screen. In fact, its tiny OLED display measures just 12mm across.

Blast from the Past

As it doesn’t have a data plan, the phone operates on a traditional 2G network. It has a battery that will last up to 3 days in standby and offers up to three hours of talk time. Charging the device takes less than one hour.

You can send and receive text messages, just be prepared for a nostalgic trip back to the 90s. The phone only has enough storage space for 50 text messages.

There is no word yet on whether or not the messages will be threaded. Also, keep in mind you’ll have to peck out messages on a numerical keypad.

Don’t expect to be able to store a lot of contacts either; the phone only has room for 300 contacts.

Zanco says there will be ringtones to choose from, but they don’t know how many at this time.

The device is perfect for a backup device or a hidden phone for safety and emergencies. Its small size lets you transport it easily and a lanyard can be attached.

If you’re worried about not having 3G or 4G network capabilities, don’t be. The phone doesn’t have internet browsing capabilities so 2G is all you need.

The phone is an unlocked, quad band device. It accepts a nano SIM card, so as long as your network supports its 2G capability you should be just fine.

While the Tiny T1 isn’t available yet, it’s currently on Kickstarter and its price is tiny, too. You can back the project for about $ 50. It’s currently surpassed its funding goal of about $ 33K and the campaign ends on January 18.

iDrop News

‘The Home Button’ Is CES’ Most Bizarre iPhone X Accessory

As we’ve heard from the rumor mill already, Apple’s imminent plans could entail a complete axing of the iOS home button — from its upcoming iPhone models and iPad Pro — as part of the company’s broader plan to usher in the next-generation of iOS devices built around Face ID and TrueDepth. And Apple’s decision to remove the Home button from iPhone X may be more well received by some than others.. However those who’ve developed an affinity for the click may be in luck. That is — if your love for the iOS Home button is as bold as you are.

The Home Button

Enter The Home Button, one of CES 2018’s most bizarre iPhone X accessories. It’s a standalone, Lightning-powered Home Button dongle which plugs directly into the bottom of your iPhone X.

The dongle was developed by a small Chinese accessory maker who already produces a wide range of premium accessories for iPhone and iPad, according to 9to5Mac.

How Does It Work?

Unfortunately, while the gizmo is devoid of a Touch ID fingerprint reader, it faithfully reproduces the familiar Home button ‘click’ on iPhone X according to those who’ve tried it out.

“Plug in the Lightning adapter, and you’ll have a fully functional Home button again (sans Touch ID),” 9to5mac’s Michael Steeber reported of The Home Button’s functionality, adding that “it worked” as you’d expect of a non-Touch ID equipped iOS button.

You can single-click to go back to the home-screen, double-click to reveal the iOS multitasking interface, and even summon Siri with a long press as you normally would.

“The dongle even includes a headphone jack and Lightning connector in the base, so you can charge your iPhone and listen to music like the good ol’ days,” Steeber added.

It’s not clear when we might be able to pick up The Home Button (or how much it’ll cost), though in its current functional state, we’d be hard pressed to believe it won’t be very long.

iDrop News

Google Shares High-Performing Solutions to Spectre and Meltdown

Google recently detailed its response to the Spectre and Meltdown security flaws. The company has been rolling out solutions to the flaws since September. And thanks to the efforts of hundreds of engineers, no one has apparently noticed because the fixes haven’t slowed down or degraded popular services like Google search, Google Drive, and Gmail.

While the security engineers at Google were able to address Meltdown and the first variant of Spectre with relative ease, the second variant proved to be more troubling. Not only does the flaw cause significant performance degradation and jump between different instances on the same CPU, fixing Variant 2 required changes to multiple layers of the software stack and significant industry-wide collaboration.

Given the difficulty of solving it, Google’s Project Zero security team made a rare exception to its 90-day disclosure policy, which gives vendors and companies 90 days to solve the problem before it releases details of a vulnerability to the public.

The first approach Google’s engineers took was to switch off CPU features that rendered chips vulnerable to intrusion. The downside was that it noticeably slowed down performance.

“Not only did we see considerable slowdowns for many applications, we also noticed inconsistent performance, since the speed of one application could be impacted by the behavior of other applications running on the same core. Rolling out these mitigations would have negatively impacted many customers,” Ben Traynor Sloss, vice president of Google, wrote.

Eventually, Google took a “moonshot” approach to solving the problem and turned up with Retpoline, a solution that “modifies programs to ensure that execution cannot be influenced by an attacker.” The technique has a “negligible impact on performance”, according to Google, and allows the company to defend against Variant 2 of Spectre without switching off CPU components or modifying many layers of software.

Google rolled out fixes for all three flaws by the end of December and has not received complaints since. Google says Spectre and Meltdown “represent a new class of attack” and that “they’re just a few among the many different types of threats our infrastructure is designed to defend against every day.”

Fortunately, Google has decided to share the details of Retpoline with the rest of the industry.

“We believe that Retpoline-based protection is the best-performing solution for Variant 2 on current hardware. Retpoline fully protects against Variant 2 without impacting customer performance on all our platforms. In sharing our research publicly, we hope that this can be universally deployed to improve the cloud experience industry-wide,” Sloss says.

iDrop News