UPDATED: iPhone Black Screen of Death…

How disappointing… Google can’t seem to find an answer to fix my “iPhone Black Screen of Death“, but at least some guy at C|Net Investor News is seeing the same thing…

So, much to my surprise, starting a couple days ago I noticed what appeared to be a “black screen of death.” Everything stops working. The time bar at top is there, but the rest of the screen is black. No touching. No prodding of the home key. No pressing of the upper right key will get the thing working again.

I guess it’s time to take my iPhone to the friendly neighborhood repair shop for a re-installation of 1.0.2 operating system… Hopefully that doesn’t delete all of my SMS history – and I’ll need to make sure I get iCosta 1.0.4 on there too (中文输入法). Sure would be great if I could upgrade all the way to 1.1.3!

UPDATE… I took my iPhone to the local repair center yesterday and they simply erased the entire operating system in installed a jailbreaked, Chinese Localized version of firmware 1.1.2 and my iPhone is working great. If you get the Black Screen of Death, just reinstall the firmware and you’ll be fine (of course, you’ll loose all notes and SMS’s…) In the last 24+ hours I have not had a single black screen! I love my iPhone!

4 thoughts on “UPDATED: iPhone Black Screen of Death…”

  1. Oh it’s right, File Encryption is the best encryption software to encrypt, lock and hide files, folders, drives in a convenient method. This encryption software is compatible with all popular versions of Windows OS

  2. Nice article, If you would like set the access authorities for those files or programs, such as, to hide or lock them, to deny copy or delete etc, and likewise want to monitor their utilization, the File Encryption will probably be your best choice.

  3. Full disk encryption is encryption in the hard disk level. This software performs by automatically converting data on a hard drive into a form that can not be comprehended by everybody who doesn’t have the essential to “undo” the conversion. Without the correct authentication essential, even when the difficult hard drive is taken away and used in a different machine, the data remains inaccessible.

Leave a Reply

Your email address will not be published. Required fields are marked *