Disabling Find My already requires AppleID password.7. Disabling Find My Device functionality (which includes the ability to erase a remote device)
Disabling Find My already requires AppleID password.7. Disabling Find My Device functionality (which includes the ability to erase a remote device)
It needs to be solved for devices stuck on iOS/iPadOS 16 and before, too.but Stern and the WSJ are high profile enough that Apple can't and won't ignore them. Sure they won't say anything now or admit flaws but I bet we see changes in how Apple handles these issues perhaps by this fall with iOS 17.
It needs to be solved for devices stuck on iOS/iPadOS 16 and before, too.
Just use Face ID or Touch ID and you should be fine. At times like this, I wish Apple had introduced an In-Display Fingerprint Scanner. The technology is obviously there.
All one has to do is turn on Screen Time > Content & Privacy Restrictions > Passcode Changes > Don't Allow. Be sure to use a different passcode for Screen Time.
Oh, and Account Changes (Don't Allow). Thanks for that tip @ypl.
All good ideas. 👍🏽It's also good idea to disable "Account changes". It blocks access to all iCloud settings. It's hardly ever used by owner (requires enabling in Screen Time settings if access is needed), and thief definietely shouldn't have access to this critical part of Settings.
it might be, apple has certainly done late updates to an old iOS version before. that said, lets call this what is it... very, very rare. it requires social engineering for them to both see your code then after steal the phone. while it happens I believe apple that it is many, many, many times more likely someone just forgets their iCloud password and would lose everything if not for the ability to change it with the phone passcode (which people don't forget because they use it often.) its a tough and RARE problem so I could see apple investing their resources in only fixing it for devices that support iOS 17 which likely represent SIX YEARS worth of phones based on the current rumors, to ask apple to fix the issue on devices more than six years old when the issue is very, very rare might be a bit much to ask.
All good ideas. 👍🏽
Very self centered of you.. What about the people that get get held up by gun point for their phone and passcode? This is exactly what happened to my friend and the thieves used this method to lock them out of their iCloud and had access to everything"OMG!!!!! I left my keys on at the bar when I was drunk! I'm gonna sue Schlage for making it so easy for the guy who took 'em to break into my house!"
Do stupid things, win stupid prizes. Sorry folks, it may sound harsh but don't do stupid things!
The article was talking about thieves learning the passcode of the phone by watching a user enter the passcode, then later stealing the phone and using that passcode to lock users out of their Apple ID account.Others have pointed out the issues with FaceID - it fails a lot and if a thief wanted to they could force you to present your face to unlock it.
Yeah, something like that would be nice, though, I might not say 'immediately'. Would suck to accidentally present your own duress pose and nuke your phone unintentionally.I think Apple should implement an extra FaceID 'pose', that's a 'duress pose', intended to immediately lock and wipe the device. For example you with your tongue sticking out of your mouth, or what have you. That way, even if forced to unlock the phone, you would deny them access and they'd be running off with a brick.
If you are going to be the victim of armed robbery it doesn't really matter how many layers there are. If the choice is provide the information even if multiple layers of security exist or get shot, I assume most rational people would provide the information.Very self centered of you.. What about the people that get get held up by gun point for their phone and passcode? This is exactly what happened to my friend and the thieves used this method to lock them out of their iCloud and had access to everything
It’s not. If your Apple ID password were the fall back for Face ID and Touch ID then the thief would now know your Apple ID password as opposed to your device passcode, so would be able to access your device and reset the Apple is password.I noticed on my wife's iPhone 12 last night, I went to install an app for her (she was borrowing my DJI Gimbal to shoot video so I was installing the app) - App Store required a Face ID - and when that failed. it did NOT ask for a pin, it went straight to AppleID Password.
why is installing a Free app more secure than changing the appleID through the OS??
well being that her password is something like 28 alphanumeric characters, I dont think a thief is going to be able to read and remember that over her shoulder at a bar.It’s not. If your Apple ID password were the fall back for Face ID and Touch ID then the thief would now know your Apple ID password as opposed to your device passcode, so would be able to access your device and reset the Apple is password.
I’m not sure how that’s better than the thief knowing your device passcode.
So why not just make the device passcode 28 alphanumeric characters?well being that her password is something like 28 alphanumeric characters, I dont think a thief is going to be able to read and remember that over her shoulder at a bar.
I could but thats not the issue here. the fall back for FaceID IS a 4-6 digit code. And if you can gain that code, it allows you with no other prevention to change the Apple ID password and take over the account.So why not just make the device passcode 28 alphanumeric characters?
Huh? If you change the passcode to 28 character alphanumeric then the fallback for face ID is a 28 character alphanumeric. I'm not quite sure you know what you are talking about here.I could but thats not the issue here. the fall back for FaceID IS a 4-6 digit code. And if you can gain that code, it allows you with no other prevention to change the Apple ID password and take over the account.
yes, changing the passcode to Alphanumeric is a good step, but simply removing the option to take that 4-6 digit code and possibly hijack someones life with credit cards and bank accounts seems lacking on apples part
Anyone prefers the unlocking pattern how they have on Android smartphones?
![]()
Does anyone know if the Account Recovery Contact method provides a defense against this passcode method to hijack accounts?
"Thoughts and prayers"So, Apple’s response was “aahh… sympathies” ?
It _is_ the best solution in my opinion. Just, when setting up STSo any update on this subject? Would the screentime passcode option be the best solution?
Without the device passcode the damage on a stolen unlocked phone can be mitigated by setting a ST passcode, locking down sharing, passwords and accounts. My financial apps require face id so they are protected. Emails and other apps that don't have face id obviously can be opened. A passcode can be put on the SIM card, if present, but obviously a SIM card can be removed and the phone powered off.It _is_ the best solution in my opinion. Just, when setting up ST
I might be wrong, but from what I learned untill now, there is no way to reset ST passcode with above configuration by unauthorized person not having access to AppleId and TPN mentioned above.
- provide different AppleId/password as recovery method for ST passcode (e.g. ask your spouse/friend to input their AppleId)
- always set Trusted Phone Number *different* that installed in your phone (again, your spouse/friends phone number).