Unless you enable Face ID, this is the only way:
Easy, it's just the 42 first digits of pi.
Unless you enable Face ID, this is the only way:
All that protection and then they go on fFacebook.Unless you enable Face ID, this is the only way:
Those of us living in civilised society?
Don’t give out your iPhone password. Have situational awareness.Sadly Apple’s response was a non response. Saying the phone is secure but this is a pretty big loop hole in a lot of phones not just apple.
It should be addressed as it is bad if someone gets access to your phone they get control over your life and very quickly at that.
All your photos, documents, and passwords saved in iCloud are compromised. And you can be permanently locked out of your Apple ID account.I see your point but it does start with passcode security. Also, unless you use Apple Pay, none of that stuff is compromised.
Better still use a cellular Apple Watch and leave your iPhone safely at home.So just don't use your passcode in a public easily visible space.
The issue is compromising the passcode. You can choose to have your phone manage everything or not. What do people expect?
Your device passcode is usually less complex than your normal passwords that you use on other accounts. And you type this passcode in public that can be snooped. Your device passcode should not have the capability to permanently lock you out of your Apple ID account that has your entire life.
Apple recently added the capability for the Apple ID account to be changed to advanced data protection. Where even Apple cannot get you back your hacked account. And it can be all setup that way with your stolen phone and your device passcode due to Apple’s security flaw.
I'm positive that if anything were to happen it would be that.Then we need duress passcode that let the iPhone look normal for so many minutes and then totally lock down and broadcast itself as stolen, and will not allow anything vital to be done, or also make it appear it is working but nothing actually happens.
Well, Apple needs something like a PIN Genie algorithm from Lockly https://lockly.com/pages/lockly-technology
An in-depth report published today by The Wall Street Journal's Joanna Stern and Nicole Nguyen highlights instances of thieves spying on a victim's iPhone passcode before stealing the device in order to gain access to the device, data, and money.
![]()
All of the victims interviewed said their iPhones were stolen while they were out socializing at bars and other public places at night. Some victims said the iPhones were grabbed out of their hands by strangers, while others said they were physically assaulted and intimidated. The report provides specific examples of these instances.
With knowledge of the iPhone's passcode, a thief can easily reset the victim's Apple ID password in the Settings app, even if Face ID or Touch ID is enabled. Subsequently, the thief can turn off Find My iPhone on the device, preventing the owner of the device from tracking its location or remotely erasing the device via iCloud. The thief can also remove other trusted Apple devices from the account to further lock out the victim.
The thief can also change an Apple ID's contact information and set up a recovery key in order to prevent a victim from recovering the account.
To make matters worse, knowing an iPhone's passcode allows a thief to use Apple Pay, send Apple Cash, and access banking apps using passwords stored in iCloud Keychain. Even if Face ID or Touch ID is enabled on the iPhone, thieves can simply bypass these authentication methods and an option to input the device's passcode is presented. In some cases, the report claims that thieves even opened an Apple Card by finding the victim's last four digits of their Social Security number in photos stored in apps like Photos or Google Drive.
Access to other passwords stored in iCloud Keychain allows the thief to further wreak havoc, as it could give them access to email accounts and other sensitive information. All in all, the report says thieves can essentially "steal your entire digital life."
Apple Responds
In response to the report, an Apple spokesperson said "security researchers agree that iPhone is the most secure consumer mobile device, and we work tirelessly every day to protect all our users from new and emerging threats."
"We sympathize with users who have had this experience and we take all attacks on our users very seriously, no matter how rare," the spokesperson added. "We will continue to advance the protections to help keep user accounts secure." Apple did not provide any specific details about any next steps it might take to increase security.
In a tweet, Stern recommended that Apple add extra protections to iOS and introduce additional Apple ID account recovery options.
How to Stay Protected
In a tweet, Stern recommended that users switch from a four-digit passcode to an alphanumeric passcode, which would be more difficult for thieves to spy on. This can be done in the Settings app under Face ID & Passcode → Change Passcode.
iPhone users can also use Face ID or Touch ID as much as possible when in public to prevent thieves from spying on their passcode. In situations where entering the passcode is necessary, users can hold their hands over their screen to hide passcode entry.
To protect a bank account, consider storing the password in a password manager that does not involve the device's passcode, such as 1Password.
Article Link: Apple Responds to Report About Thieves Spying on iPhone Passcodes to 'Steal Your Entire Digital Life'
It's the WSJ so likely they were targeting people working in financial services and the thieves were likely hanging around the sort of bar that people who work in that sector commonly go to, for rich pickings.If you read the article, one person lost $10,000 due to the phone being stolen (in addition to being assaulted). I don’t know about you, but losing $10k would mean I’d likely lose my house. Besides, all the utopian future education in the world isn’t going stop the actual crime that’s happening in real time.
Have you seen the yearly FBI crime statistics? Yeah, I’m not taking any chances. Again, don’t want shot, don’t assault innocent people. Simple, really.
sure, and half the time doesn't workThis is why you should enable Face ID
Seriously? I have a Pixel 7 Pro and Face Unlock works 100% with decent lighting and Apple's Face Unlock is supposedly 100% better.sure, and half the time doesn't work
It’s Apple’s fault when they allow your Apple ID to be reset simply by providing your device passcode. You don’t have to be drunk for someone to watch you enter your device passcode and then steal it. Sure 8+ digits will make it a little harder to snoop, but not impossible. It’s foolish that Apple allows an Apple ID to be reset by just the device passcode.
There’s security vs usability. Maybe the device passcode should be that powerful. Apple is not hiding that fact. Maybe users should carefully choose how they use their phone what apps are on their phones and ensure they protect the device password.That is the single simple item many keep missing, ignoring, or just blowing off.
Pretty damn critical I would think.
I wouldn’t like at all someone locking the AppleID tied to my Dev account (which you will need to do in the future if you Dev Beta test).
That’s all well and good, unless you lose your iCloud password.
That’s the reason Apple allows you to reset it with your phone passcode.
What they should do is use biometrics + passcode for an iCloud reset.
What happens if you forget your current password? Everything is all well and good for requiring other information that you presumably know to change a password. But if you forget a piece of information or lose that hardware key you’re still screwed.[…]
On the Android side, I tried going into the security settings, and just like you do it from the web on a desktop you need to enter your Google account password before tweaking settings like password, 2FA, etc. So like a proper change password prompt, you are required to enter your existing password + a new password. That is the standard at most websites.
Not sure why iCloud password changing doesn't require your CURRENT password.
Tested on Pixel 7 Pro, iPhone 13 Pro, MacBook Pro M1 Pro
Since we’re discussing possible solutions a better alternative is to not be able to modify the recovery key or account for a period of time.Maybe a good possible solution would be to have a 24/48 hr waiting period to be able to reset an Apple ID password on a iPhone with only a device passcode. That would give the victim a chance to sign-in to Apple and remove the iPhone from the account, so it can no longer be used on the Apple ID.
That still doesn't stop anything if you have the passcode. After so many incorrect tries you can type the passcode in and boom, face ID/Touch ID is no longer needed.You just have to be careful when using your iPhone outside in public.
Apple needs to consider bringing back Touch-ID. Two Factor Authentication: Touch ID + Face ID simultaneously