Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
And so you are part of the problem. Caring about others — friends, family and strangers — is what keeps us human.

Drives me nuts when I go to a big city and just saying "hi" to people as you pass them is received with shock and a weird look. Come on people, let's be nice to each other. And don't piss on the toilet seat!
Well I agree - but wondering around a big city and saying hi to random people in the street is a bit weird.
 
  • Angry
Reactions: NetMage
Yes I mentioned both of those things in the part of my post that you snipped. That still doesn’t make it right that it’s possible to change a password of an account solely by using the password of what is essentially a different account. It’s basically unheard of to not have to enter the old password for verification before changing it for a new one.
It's been this way for some time and doesn't make it wrong as some of this could be mitigated with a screen time password. I'm presuming its been this way to make it easier to change/remember passwords. Not everybody needs the same security standard and it should be up to the user to decide theirs. In the same vein one can establish a password of 1111, one can also establish a much harder password. And then one can lock down a number updates via content restrictions including account changes, password changes, location changes and sharing changes. The thing that is unprotected is apple pay if set up.

There are three scenarios where a hijacked phone is mostly protected:
1. Your locked phone is grabbed: Phone properly secured on lock screen not much can be done.
2. Unlocked phone is grabbed and password is not known and screen time restrictions are in place: if proper content restrictions are set and password is not known to thief most of the phone will be protected.
3. Unlocked phone is grabbed and password is known and screen time restrictions are in place: Apple pay is mostly vulnerable. Maybe some other apps where the iphone password can be used in lieu of face id.
 
You just have to be careful when using your iPhone outside in public.
Apple needs to consider bringing back Touch-ID. Two Factor Authentication: Touch ID + Face ID simultaneously
You should be careful when paying with your wallet cause someone might snatch it. Damn it Gucci! Wait. NYC Subway... Careful you might get pick-pocketed!! Damnit Levi's!!!
 
  • Like
Reactions: NetMage
What? my password of 1234 is not secure? it's apple's fault! Seriously, this is the lamest issue yet. someone steals a device and gets the password, oh no, it is so insecure.
 
(portion of note I sent to the WSJ writers)

This article comes across as strikingly alarmist. Even if you're not a cybersecurity expert, if you open something up in the presence of strangers you run the risk of it being exploited or taken advantage of. If a stranger steals your purse, they get your house keys and probably your wallet, which would show them where you live and allow them to rack up a ton of charges on your debit/credit cards before you found out.... that's the physical equivalent of what you're saying is happening here for the article. And remember being told to 'guard' your ATM PIN codes when at a crowded ATM?

Admittedly, this is a vulnerability and folks should be more aware of their surroundings and/or whom they share their phones with -- or what they use on their phones along w/how much of their life they link to their phone, which could help minimize such risks. So while I agree letting people know about this is a good idea (because many people don't think about security/privacy stuff) in my view after 30 years in this domain, this article comes across as more alarmist than it should be.
 
  • Like
Reactions: NetMage
A pretty straightforward fix for this would be to have a setting that, if the user wants, scrambles the numbers on the numpad passcode entry screen in a random order every time. So it's still your 6-digit passcode to get in, but the numpad is not always 1 2 3, 4 5 6, 7 8 9, 0. This way, someone spying from a distance can't just memorize the "pattern" of where you tap. E.g., pressing on the top right button does not necessary mean "3".

I've always wondered why that isn't a feature on IOS. Many facilities I've entered had that kind of 'scrambled' keypad for door entry, and it'd be a no-brainer to incorporate onto the iPhone.
 
It would be SO EASY for Apple to implement an "TheftLock" feature that auto-locks the iPhone whenever quick movement is detected ...like when a thief (or friend, partner, snoop, etc ) snatches it out your hand, the quick movement would instantly lock the phone.

To deal with the stolen password issue, Apple could 10x this security by using FaceID to auto-lock the phone anytime your own face isn't detected. This could be an always on thing (for high security worth the battery burn situations), or a simple extra security check that prevents (a correct password) login when the FaceID doesn't also match.

From there it wouldn't be difficult for Apple to enable ways for the real owner to lock/unlock the entire user account as needed when a true/false situation occurs. Heck you could even have the scan only start after 10pm Fridays when you know you're gonna be s***faced at the bar! LOL
 
  • Sad
  • Like
Reactions: NetMage and Apple$
A pretty straightforward fix for this would be to have a setting that, if the user wants, scrambles the numbers on the numpad passcode entry screen in a random order every time. So it's still your 6-digit passcode to get in, but the numpad is not always 1 2 3, 4 5 6, 7 8 9, 0. This way, someone spying from a distance can't just memorize the "pattern" of where you tap. E.g., pressing on the top right button does not necessary mean "3".
100% !!! It's such a simple solution that should be the default. Like WHY are you displaying my code right on the screen Apple?!?!?! I've literally requested this scrambling (and my Auto-Lock suggestion above) to Apple, after every iOS release for a decade!
 
  • Like
Reactions: oneMadRssn


An in-depth report published today by The Wall Street Journal's Joanna Stern and Nicole Nguyen highlights instances of thieves spying on a victim's iPhone passcode before stealing the device in order to gain access to the device, data, and money.

iphone-passcode-green.jpg

All of the victims interviewed said their iPhones were stolen while they were out socializing at bars and other public places at night. Some victims said the iPhones were grabbed out of their hands by strangers, while others said they were physically assaulted and intimidated. The report provides specific examples of these instances.

With knowledge of the iPhone's passcode, a thief can easily reset the victim's Apple ID password in the Settings app, even if Face ID or Touch ID is enabled. Subsequently, the thief can turn off Find My iPhone on the device, preventing the owner of the device from tracking its location or remotely erasing the device via iCloud. The thief can also remove other trusted Apple devices from the account to further lock out the victim.

The thief can also change an Apple ID's contact information and set up a recovery key in order to prevent a victim from recovering the account.


To make matters worse, knowing an iPhone's passcode allows a thief to use Apple Pay, send Apple Cash, and access banking apps using passwords stored in iCloud Keychain. Even if Face ID or Touch ID is enabled on the iPhone, thieves can simply bypass these authentication methods and an option to input the device's passcode is presented. In some cases, the report claims that thieves even opened an Apple Card by finding the victim's last four digits of their Social Security number in photos stored in apps like Photos or Google Drive.

Access to other passwords stored in iCloud Keychain allows the thief to further wreak havoc, as it could give them access to email accounts and other sensitive information. All in all, the report says thieves can essentially "steal your entire digital life."

Apple Responds

In response to the report, an Apple spokesperson said "security researchers agree that iPhone is the most secure consumer mobile device, and we work tirelessly every day to protect all our users from new and emerging threats."

"We sympathize with users who have had this experience and we take all attacks on our users very seriously, no matter how rare," the spokesperson added. "We will continue to advance the protections to help keep user accounts secure." Apple did not provide any specific details about any next steps it might take to increase security.

In a tweet, Stern recommended that Apple add extra protections to iOS and introduce additional Apple ID account recovery options.

How to Stay Protected

In a tweet, Stern recommended that users switch from a four-digit passcode to an alphanumeric passcode, which would be more difficult for thieves to spy on. This can be done in the Settings app under Face ID & Passcode → Change Passcode.

iPhone users can also use Face ID or Touch ID as much as possible when in public to prevent thieves from spying on their passcode. In situations where entering the passcode is necessary, users can hold their hands over their screen to hide passcode entry.

To protect a bank account, consider storing the password in a password manager that does not involve the device's passcode, such as 1Password.

Article Link: Apple Responds to Report About Thieves Spying on iPhone Passcodes to 'Steal Your Entire Digital Life'
the moral of the story is to simply stay out of bars - you'll be doing yourself a favor on so many levels...
 
  • Like
Reactions: NetMage and gusmula
For this one, I tried changing my iCloud password on my Mac and iPhone. It required the device passcode (which we assume is already cracked here), but it doesn't ever ask me for my existing iCloud password and only a new password, so yes this is a flaw.

On the Android side, I tried going into the security settings, and just like you do it from the web on a desktop you need to enter your Google account password before tweaking settings like password, 2FA, etc. So like a proper change password prompt, you are required to enter your existing password + a new password. That is the standard at most websites.

Not sure why iCloud password changing doesn't require your CURRENT password.

Tested on Pixel 7 Pro, iPhone 13 Pro, MacBook Pro M1 Pro

Just tried that on mine. Needed the current password.
 
  • Like
Reactions: NetMage
Apple should improve its log-on/off process to address the gap identified in the report, as follows:

At first instance of any day, logging on iPhone should be via passcode. If validated, the next step should be mandatory biometric verification (Face ID or Touch ID). Failing this, the log-on should fail.

In the course of the day, if the iPhone had been powered off, the same process as described above should be implemented to enable use of the iPhone.

In the course of the day, if the iPhone had been turned off but not powered off, enabling the iPhone should only be via the use of biometric check. Passcode verification should be disabled. If biometric check fails, the iPhone is automatically turned off after the user is so informed and the only way to access the phone is to power it on after it's been automatically turned off.

If Apple makes the underlying security a bit harder to change that would be good.
If it isn’t easy to use, people are not going to use it.
 
I have already reported this to apple long time ago. For me was an obvious security flaw.

Knowing the passcode, you can access keychain( so all passwords !) and you can change the Apple ID.

This is not acceptable from a security point of view. A 4(!) code that someone can see you type could not open the gates to all your info.


And there’s simple ways to improve this. Require Apple ID or Face ID to reach sensitive data instead of a ridiculous pin that can be easily copy.
 
  • Like
Reactions: theadz01
don't know how Face ID + Touch ID would be a solution to this problem considering people use passcodes mainly because Face ID failed.

now imagine Touch ID or Face ID failing which would make passcode input more common.
 
Under poor lighting conditions — such as in bars — in my personal experience Face ID fails frequently and forces the passcode as a result. With my TouchID iPhones, I NEVER had that issue. I would be interested to know in how many of these cases, the passcode entry was necessitated by a FaceID failure versus a TouchID failure (for those who still have those older iPhones) …

On my 12 ProMax and 13 ProMax I have had issues with FaceID at events and clubs. I always assumed it had something to do with the lighting being used.
 
It's not a flaw, it's just tech illiterate iPhone users getting Shoulder Surfed because they were using a short passcode in public to unlock their phones. So just don't use your passcode in a public easily visible space.
This is such a silly perspective. People have also been robbed and had their passcodes taken. It’s poor design. I love apple too. But failing to hold them accountable for a bad design is embarrassing. These are real users using their phones in normal ways, and that allowing them to have everything taken including the account itself in some cases is insane to suggest.
 
  • Sad
Reactions: NetMage
And so you are part of the problem. Caring about others — friends, family and strangers — is what keeps us human.

Drives me nuts when I go to a big city and just saying "hi" to people as you pass them is received with shock and a weird look. Come on people, let's be nice to each other. And don't piss on the toilet seat!
As someone who lives in a big city, people making generalizations like this drives me nuts too. You’re part of the problem!
 
  • Like
Reactions: NetMage
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.