I already proved it on my own phone. Others have too. Try it yourself on your phone. Sad but true! Apple needs to fix this flaw.That is true. That did happen. But it still remains to be determined if the screen time password can be overridden.
I already proved it on my own phone. Others have too. Try it yourself on your phone. Sad but true! Apple needs to fix this flaw.That is true. That did happen. But it still remains to be determined if the screen time password can be overridden.
I couldn’t do it. Maybe I have something else set up or enabled.I already proved it on my own phone. Others have too. Try it yourself on your phone. Sad but true! Apple needs to fix this flaw.
Post your screenshot after you select "Change Screen Time Passcode" --> "Change Screen time Passcode"I couldn’t do it. Maybe I have something else set up or enabled.
How does not knowing cybersecurity = soft. That’s a little much. Also if you read the article it’s social engineering, it’s outright assault to get passcodes and shoulder surfing. It’s a multi prong attack on the victimtl;dr: Shoulder Surfing attacks can happen with our phones too. This is why we have Face ID and Touch ID.
Once again: The iPhone and iPad ruined a generation of computer users. Apple's made so many people soft and forget basic cybersecurity as they think their phone and Apple will do it all for them.
So yep, I was able to get to the screen to reset my Apple ID password. I didn’t go any further, but I can assume after resetting apple id password I can change the screen time password…but I didn’t try so I don’t know.Post your screenshot after you select "Change Screen Time Passcode" --> "Change Screen time Passcode"
Exactly this is what some of these commenters don’t understand. From what I read Apple does this so you don’t forget you passcode. I think it’s every 6 days it asks for your passcodeAnd iPhone occasionally asks for the passcode to unlock the phone at the most unfortunate times, even if you have done nothing to it to warrant this. Should just stick with asking for passcode 1. on restart, 2. on multiple Face ID attempts, and 3. user manually disables Face ID through a combined button press gesture.
Unfortunately even a longer password can still be snooped, but it will make it harder. Especially if someone is snooping by videoing it. And with the Apple security flaws, all the other protections you have on your Apple ID account...Apple ID password, screen time password, recovery password, Yubi keys, etc....can all be reset/removed by stealing the device after snooping the phone passcode. You entire Apple ID account can be taken over by the attacker.So yep, I was able to get to the screen to reset my Apple ID password. I didn’t go any further, but I can assume after resetting apple id password I can change the screen time password…but I didn’t try so I don’t know.
Observations:
- don’t use a simple password
- be aware of your surroundings and social engineering aspects of security
- apple didnt design security from the drunk people in a bar requirement. As terrible as the story was as reported in the WSJ they all could have been avoided
- set a screen time password
- set a recovery password and recovery/legacy account where possible
And Apple, without a way to opt out that I saw, decided that I had to enter my phone passcode to secure icloud on the web. As Backup of sorts. But thay just means being more exposed to this kind of thing.This is why I disagree with the users on here who keep saying passcode is more secure and stop using Face ID if you don't want people to take your phone and point it at you, etc. Perhaps the passcode is technically more secure, but it is practically way less secure. Face ID is secure especially if you enable "attention required." Always use Face ID. Never enter your passcode in public unless you are sure no one is looking at your screen (and to be extra secure, that no camera overhead is looking down at you).
Apple is not innocent either. Somehow they think it makes the phone more secure to occasionally demand your passcode at the most inconvenient times. This is way less secure. I have been asked for the passcode while in public and I actually waited until I went to a private location before entering it. Ask for it every restart, fair. But if the phone has been on and there are no multiple failed Face ID attempts, DO NOT ask for the passcode.
Al your accounts can. They can reset banking, anything. Because it all flows back to keychain being exposed by the stolen passcode. If they have your phone unlocked, 2 factor authentication is worthless.Unfortunately even a longer password can still be snooped, but it will make it harder. Especially if someone is snooping by videoing it. And with the Apple security flaws, all the other protections you have on your Apple ID account...Apple ID password, screen time password, recovery password, Yubi keys, etc....can all be reset/removed by stealing the device after snooping the phone passcode. You entire Apple ID account can be taken over by the attacker.
Exactly! This apple security flaw and low level attack, can expose everything!! So dangerous!Al your accounts can. They can reset banking, anything. Because it all flows back to keychain being exposed by the stolen passcode. If they have your phone unlocked, 2 factor authentication is worthless.
It's funny how some people are only discovering now that they need to keep their device passcode safe!Exactly! This apple security flaw and low level attack, can expose everything!! So dangerous!
Sure, but did you expect that the knowledge of your passcode is all that is needed to completely lock the rightful owner out of their Apple ID and disable Find My?It's funny how some people are only discovering now that they need to keep their device passcode safe!
It’s not funny how Apple’s security flaw foolishly allows your Apple ID password to be reset by your device passcode. A code that most people at one time or another type in public and is subject to snooping. It’s an easy low level attack that can potentially take over not just your Apple account, but all your other accounts.It's funny how some people are only discovering now that they need to keep their device passcode safe!
Yes, [the thought of] getting locked out of my Apple ID is the biggie, since I migrated everything mission critical to that email address over the years and later put my important documents in the iCloud Drive tied to that ID. [and put almost all of my passwords in the keychain for that ID.]Sure, but did you expect that the knowledge of your passcode is all that is needed to completely lock the rightful owner out of their Apple ID and disable Find My?
Much modern security is based on what you have and what you know. If someone points a gun to your head and asks for the atm password and card unless one takes a ridiculous stance they can get your money. Same for your house keys and security system password. And same for your phone.Unfortunately even a longer password can still be snooped, but it will make it harder. Especially if someone is snooping by videoing it. And with the Apple security flaws, all the other protections you have on your Apple ID account...Apple ID password, screen time password, recovery password, Yubi keys, etc....can all be reset/removed by stealing the device after snooping the phone passcode. You entire Apple ID account can be taken over by the attacker.
I'm glad you brought that up. But, that is not true in my case. I have two factor on, and I have to acknowledge access thru another device to continue. 14 Pro, Face ID, 6 code, latest iOS, and two factor on. Good article for the ones that think that they are protected with a 4 digit passcode, or no passcode or no Face ID etc.If you go to settings->click your user name on top->password&security->change password…you can change your Apple ID with only your device passcode.
They can withdraw the maximum allowed amount of cash, but they can’t use your pin to put the account in their own name and remove you from having access to the bank.Much modern security is based on what you have and what you know. If someone points a gun to your head and asks for the atm password and card unless one takes a ridiculous stance they can get your money.
Yes I expected that. Did you not?Sure, but did you expect that the knowledge of your passcode is all that is needed to completely lock the rightful owner out of their Apple ID and disable Find My?
But your ATM pin is limited to just one account and a limited purpose. Your Apple ID can have the keys to all your accounts and documents.Much modern security is based on what you have and what you know. If someone points a gun to your head and asks for the atm password and card unless one takes a ridiculous stance they can get your money. Same for your house keys and security system password. And same for your phone.
If you set a recovery password and account you can take it back. As far as the bank to reset a password it takes usually a piece of information you know like a security question. Apple pay is problematic.They can withdraw the maximum allowed amount of cash, but they can’t use your pin to put the account in their own name and remove you from having access to the bank.
True but the same ne’er do well could commit armed robbery and get your wallet which has usually everything.But your ATM pin is limited to just one account and a limited purpose. Your Apple ID can have the keys to all your accounts and documents.
Nope! The attacker can easily reset the recovery password.If you set a recovery password and account you can take it back.
I dont know yes or no about resetting the recovery account or password after it’s been set. But my point about these being edge cases out of billions of devices and not the general case. If someone has your phone and password yes it’s a problem, not so much with just the phone.Nope! The attacker can easily reset the recovery password.
Your wallet doesn’t have the keys to permanently lock you out of all your documents, pictures, and account passwords to your entire life.True but the same ne’er do well could commit armed robbery and get your wallet which has usually everything.