I have an iPad 1. I barely used it when it was given to me and then it more or less sat unused apart from the occasional booting to see if it still works every few years.

I’m fairly sure it would still work today though I haven’t tried for about 3 years. Trouble is, it never got much use because when I got it from my Mum in 2012 it was already becoming obsolete and after about a year I couldn’t do basic web browsing because almost every site just crashed whatever browser I ran, none of the apps in the app store would work anymore and the bookshelf app (think that’s what it was called. Came with the tablet) I tried to use to make it basically an e-reader device stopped working. There were many similar issue I forget the specifics about but basically amounted to the hardware working fine but being mostly unusable even for old software.

I wondered if there were any good ways to make use of or generally rehabilitate this device. I had hoped there’d be a lot Linux options for something like this but it looks like the earliest model anyone made.any progress with was iPad 2.

Any suggestions besides picture frame?

  • @doublejay1999
    link
    121 year ago

    What makes his 13 year old iPad a target for hackers ?

    • amio
      link
      fedilink
      131 year ago

      Software vulnerabilities that aren’t (and never will be) patched.

    • @[email protected]
      link
      fedilink
      111 year ago

      Anything with any computing power an internet connection can be a target. It will likely become a part of a bot net used to ddos, spam, or crack passwords. In addition, it’ll give hackers access to any accounts you’re logged in to, such as apple ID, email bank etc, so it could be further used to steal your identity or money.

      Because it’s so old and full of vulnerabilities, it makes it an easy target. If it gets hacked, it’ll most likely be automatic process, without any intervention from the hacker, and there may be no signs that the device is infected.

      • Rentlar
        link
        fedilink
        51 year ago

        Unethical Idea for OP: create a botnet to ddos, spam, mine crypto or hack passwords! Give life to your old iPad (and other people’s too!)

    • @[email protected]
      link
      fedilink
      English
      4
      edit-2
      1 year ago

      Devices that are no longer supported and kept up to date with security updates contain known, but unpatched, vulnerabilities. Some of them are software based, but some are a function of the hardware itself. Connect these to a network, manage to do something that gets them compromised, and you’ve given bad actors a foothold on your network.

      Because most networks, especially home networks, tend to be configured in a way that trusts local network traffic more than external traffic, such a foothold can further compromise your systems. Very few people have the resources, or technical know-how to properly segregate potentially dangerous or vulnerable devices on a network.

      That’s what.