Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
but Stern and the WSJ are high profile enough that Apple can't and won't ignore them. Sure they won't say anything now or admit flaws but I bet we see changes in how Apple handles these issues perhaps by this fall with iOS 17.
It needs to be solved for devices stuck on iOS/iPadOS 16 and before, too.
 
It needs to be solved for devices stuck on iOS/iPadOS 16 and before, too.

it might be, apple has certainly done late updates to an old iOS version before. that said, lets call this what is it... very, very rare. it requires social engineering for them to both see your code then after steal the phone. while it happens I believe apple that it is many, many, many times more likely someone just forgets their iCloud password and would lose everything if not for the ability to change it with the phone passcode (which people don't forget because they use it often.) its a tough and RARE problem so I could see apple investing their resources in only fixing it for devices that support iOS 17 which likely represent SIX YEARS worth of phones based on the current rumors, to ask apple to fix the issue on devices more than six years old when the issue is very, very rare might be a bit much to ask.
 
  • Like
Reactions: lindros2
Just use Face ID or Touch ID and you should be fine. At times like this, I wish Apple had introduced an In-Display Fingerprint Scanner. The technology is obviously there.

All one has to do is turn on Screen Time > Content & Privacy Restrictions > Passcode Changes > Don't Allow. Be sure to use a different passcode for Screen Time.

Oh, and Account Changes (Don't Allow). Thanks for that tip @ypl.


It's also good idea to disable "Account changes". It blocks access to all iCloud settings. It's hardly ever used by owner (requires enabling in Screen Time settings if access is needed), and thief definietely shouldn't have access to this critical part of Settings.
All good ideas. 👍🏽
 
it might be, apple has certainly done late updates to an old iOS version before. that said, lets call this what is it... very, very rare. it requires social engineering for them to both see your code then after steal the phone. while it happens I believe apple that it is many, many, many times more likely someone just forgets their iCloud password and would lose everything if not for the ability to change it with the phone passcode (which people don't forget because they use it often.) its a tough and RARE problem so I could see apple investing their resources in only fixing it for devices that support iOS 17 which likely represent SIX YEARS worth of phones based on the current rumors, to ask apple to fix the issue on devices more than six years old when the issue is very, very rare might be a bit much to ask.

Social engineering and deliberate observation for criminal intent to steal both the phone and passcode are different.

Shoulder surfing is quite common but not with malicious intent. We have all deliberately or inadvertently seen someone’s passcode.

btw - this has been going on for a long time and Apple and Android could have fixed this long ago.
They haven’t.
 
Last edited:
All good ideas. 👍🏽

unfortunately even with the screen time passcode set to something different, and with screen time preventing account changes... you STILL can change the Apple ID (iCloud) password through the emergency reset process using nothing more than the iPhone passcode. its an intentional loophole in the system that Apple provides to "protect" an iCloud account from the more common "forgetful" user vs. thief.
 
Last edited:
"OMG!!!!! I left my keys on at the bar when I was drunk! I'm gonna sue Schlage for making it so easy for the guy who took 'em to break into my house!"

Do stupid things, win stupid prizes. Sorry folks, it may sound harsh but don't do stupid things!
Very self centered of you.. What about the people that get get held up by gun point for their phone and passcode? This is exactly what happened to my friend and the thieves used this method to lock them out of their iCloud and had access to everything
 
Others have pointed out the issues with FaceID - it fails a lot and if a thief wanted to they could force you to present your face to unlock it.
The article was talking about thieves learning the passcode of the phone by watching a user enter the passcode, then later stealing the phone and using that passcode to lock users out of their Apple ID account.

Yes, thieves can force you to present your face to unlock your phone, but they would still lack the passcode, which is required for password changing, disabling Find My, etc.

Using FaceID as the default method of unlocking your phone almost eliminates this as a possibility.

My and my family's experience with FaceID has been that it is pretty solid. The only time it fails to the point that I need to enter my passcode is if I have my near-mirror reflective running sunglasses on. Yes, you need to enter your passcode after a reboot, but as far as being in public, I don't recall the last time I had to enter my passcode to unlock my phone.

Other people's experiences may differ, of course, but even if someone only used FaceID 80% of the time, that's still a dramatic risk-reduction for the type of issue mentioned in the article.


I think Apple should implement an extra FaceID 'pose', that's a 'duress pose', intended to immediately lock and wipe the device. For example you with your tongue sticking out of your mouth, or what have you. That way, even if forced to unlock the phone, you would deny them access and they'd be running off with a brick.
Yeah, something like that would be nice, though, I might not say 'immediately'. Would suck to accidentally present your own duress pose and nuke your phone unintentionally. :D Maybe a lock-out that would require you to log in to your Apple ID account on some other device, the web, etc, to unlock it.
 
  • Like
Reactions: turbochgd
Very self centered of you.. What about the people that get get held up by gun point for their phone and passcode? This is exactly what happened to my friend and the thieves used this method to lock them out of their iCloud and had access to everything
If you are going to be the victim of armed robbery it doesn't really matter how many layers there are. If the choice is provide the information even if multiple layers of security exist or get shot, I assume most rational people would provide the information.

Addtional multiple layers of security really benefits those whose passcode may have compromised and whose phone is snatched or pick-pocketed. For those people, some situational awareness combined with a complex password and the use of face id would greatly reduce these types of social attacks.
 
I noticed on my wife's iPhone 12 last night, I went to install an app for her (she was borrowing my DJI Gimbal to shoot video so I was installing the app) - App Store required a Face ID - and when that failed. it did NOT ask for a pin, it went straight to AppleID Password.
why is installing a Free app more secure than changing the appleID through the OS??
 
I noticed on my wife's iPhone 12 last night, I went to install an app for her (she was borrowing my DJI Gimbal to shoot video so I was installing the app) - App Store required a Face ID - and when that failed. it did NOT ask for a pin, it went straight to AppleID Password.
why is installing a Free app more secure than changing the appleID through the OS??
It’s not. If your Apple ID password were the fall back for Face ID and Touch ID then the thief would now know your Apple ID password as opposed to your device passcode, so would be able to access your device and reset the Apple is password.

I’m not sure how that’s better than the thief knowing your device passcode.
 
Last edited:
It’s not. If your Apple ID password were the fall back for Face ID and Touch ID then the thief would now know your Apple ID password as opposed to your device passcode, so would be able to access your device and reset the Apple is password.

I’m not sure how that’s better than the thief knowing your device passcode.
well being that her password is something like 28 alphanumeric characters, I dont think a thief is going to be able to read and remember that over her shoulder at a bar.
 
So why not just make the device passcode 28 alphanumeric characters?
I could but thats not the issue here. the fall back for FaceID IS a 4-6 digit code. And if you can gain that code, it allows you with no other prevention to change the Apple ID password and take over the account.
yes, changing the passcode to Alphanumeric is a good step, but simply removing the option to take that 4-6 digit code and possibly hijack someones life with credit cards and bank accounts seems lacking on apples part
 
I could but thats not the issue here. the fall back for FaceID IS a 4-6 digit code. And if you can gain that code, it allows you with no other prevention to change the Apple ID password and take over the account.
yes, changing the passcode to Alphanumeric is a good step, but simply removing the option to take that 4-6 digit code and possibly hijack someones life with credit cards and bank accounts seems lacking on apples part
Huh? If you change the passcode to 28 character alphanumeric then the fallback for face ID is a 28 character alphanumeric. I'm not quite sure you know what you are talking about here.
 
  • Like
Reactions: BaldiMac
Anyone prefers the unlocking pattern how they have on Android smartphones?

password-pattern.gif

It’s not Apple therefore no
 
Does anyone know if the Account Recovery Contact method provides a defense against this passcode method to hijack accounts?
 
I haven't tested this myself yet but Apple might have fixed this security risk:

I have just tested this again (first time since May) and in iOS 17, with the 28 digit Recovery key set, I am finding it impossible to change Apple ID account password if a Screen Time Passcode is set.

-----------
ETA: according to threads on MR and TidBITS, Apple has not issued a fix.
 
Last edited:
So any update on this subject? Would the screentime passcode option be the best solution?
It _is_ the best solution in my opinion. Just, when setting up ST
  • provide different AppleId/password as recovery method for ST passcode (e.g. ask your spouse/friend to input their AppleId)
  • always set Trusted Phone Number *different* that installed in your phone (again, your spouse/friends phone number).
I might be wrong, but from what I learned untill now, there is no way to reset ST passcode with above configuration by unauthorized person not having access to AppleId and TPN mentioned above.
 
It _is_ the best solution in my opinion. Just, when setting up ST
  • provide different AppleId/password as recovery method for ST passcode (e.g. ask your spouse/friend to input their AppleId)
  • always set Trusted Phone Number *different* that installed in your phone (again, your spouse/friends phone number).
I might be wrong, but from what I learned untill now, there is no way to reset ST passcode with above configuration by unauthorized person not having access to AppleId and TPN mentioned above.
Without the device passcode the damage on a stolen unlocked phone can be mitigated by setting a ST passcode, locking down sharing, passwords and accounts. My financial apps require face id so they are protected. Emails and other apps that don't have face id obviously can be opened. A passcode can be put on the SIM card, if present, but obviously a SIM card can be removed and the phone powered off.

As far as resetting your apple id I believe the device passcode is still needed.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.