if too close, too far, wrong angle, at least for me it failsSeriously? I have a Pixel 7 Pro and Face Unlock works 100% with decent lighting and Apple's Face Unlock is supposedly 100% better.
if too close, too far, wrong angle, at least for me it failsSeriously? I have a Pixel 7 Pro and Face Unlock works 100% with decent lighting and Apple's Face Unlock is supposedly 100% better.
Unfortunately we already heard Apple's unconcerned response.You can with the right type of fraud.
Anyway all good stuff. I’m waiting for apples response.
I guess because there is no ecosystem in android to speak of. I want you to try an experiment. Set a screen time password lock out password changes etc , log in and pretend you don’t know the device password. How much damage can you do?
At any rate this is still user education to mitigate a lot of this.
We only heard the PR departments boilerplate response.Unfortunately we already heard Apple's unconcerned response.
Looking at Screentime as a short term work-around. Seeing if it can be gotten past.
I opened an Apple security ticket detailing the issue and they closed it by saying they don't see an issue.We only heard the PR departments boilerplate response.
I'm pretty confident the WSJ article was noticed at Apple in the right departments. But Apple being Apple, they would never acknowledge this publicly.
You heard what you wanted to hear. I’m sure apple is concerned and thinking about how to balance security and usability without disenfranchising those who don’t need band vault security.Unfortunately we already heard Apple's unconcerned response.
You can’t bypass it if you dont know the device passcode.Unfortunately Screen Time has the same flaw where there is a way to bypass it by the device passcode. See my post #300 in this thread.
That's what I said...same device passcode bypass flaw!You can’t bypass it if you dont know the device passcode.
If they were concerned, they would have least kept my ticket open or say there are investigating. By closing as a non issue and the way they responded to WSJ, they are disenfranchising their security concise customers,.You heard what you wanted to hear. I’m sure apple is concerned and thinking about how to balance security and usability without disenfranchising those who don’t need band vault security.
Incorrect. The software is working as intended. Their security concise customers already knew of this and took steps to litigate it before the article came out.If they were concerned, they would have least kept my ticket open or say there are investigating. By closing as a non issue and the way they responded to WSJ, they are disenfranchising their security concise customers,.
I opened Passwords and started on the financial apps. In under 10 minutes I could bleed everything dry.
Yes, I know how you like debating in circles and always having the last word...lol! Times has changed and the security model needs to change.Incorrect. The software is working as intended. Their security concise customers already knew of this and took steps to litigate it before the article came out.
Now that it’s a thing that through social engineering the device passcode can be phished people can be more situationally aware.
Gotcha, thanks for pointing that out, thought I had figured out a way to protect against this."One can protect against this with Screen Time
Set Screen Time on, protected by a separate PIN. Disallow account changes and passcode changes. Done!"
Henrik,
It's still possible to remove devices from your account by going to Settings>Privacy & Security>Safety Check then going to the Sharing & Access setup. When you reach Step 3 you can remove all devices associated with your Apple ID (except for the iPhone your using).
If your app has Zelle or some other Cash Transfer. But I would think it would be traceable where the $$$ went. And hopefully there is some low limit for new recipients.How does that work?
I understand how a bad guy could steal my phone and use my passcode to unlock it. And they could also have access to my AppleID and the passwords to my bank or whatever.
But... how does the money actually go from my account to their account?
Wouldn't that be able to be tracked? Or are we assuming they have anonymous off-shore bank accounts?
I'm not downplaying the risks here. This thread has definitely got my attention.
I just want to know the actual process for a bad guy to remove money from my checking account and put that money into their account.
There’s a certain irony in the above.Yes, I know how you like debating in circles and always having the last word...lol!
Maybe it does and maybe it doesn’t. We’ll see apples response or not.Times has changed and the security model needs to change.
LOL..you crack me up!There’s a certain irony in the above.
Maybe it does and maybe it doesn’t. We’ll see apples response or not.
To log into whatever service you had created the passkey for. Passkeys are not that common (yet), but for instance, some email services now permit passkeys, so you could theortically log into the email accounts associated with the passkey. Another user on here already commented that my understanding of passkeys is incorrect, and that passkeys are not made with any "FaceID data" -- a claim that surprises me, but I don't know any better....Why would they want the passkeys?
If you will allow me to poke a little more, whenever I use a passkey, it "authenticates" me in the same way that FaceID does. I am wondering, if the FaceID data is not associated with the passkey, what part of the process does the FaceID effect? Surely, assuming no thief scenario, if I showed my phone to someone else's face while attempting to log into an account with a passkey, the login will fail because the passkey will fail because it is not my face. Not trying to push back on your answer, I am just not understanding what part the "faceID" plays in the passkey process if it is not tied to the passkey data?Passkeys are not created with data from FaceID. Once someone has the passcode they can use the passkey to log-in to the service for which they have been created.
How does that work?
I understand how a bad guy could steal my phone and use my passcode to unlock it. And they would also have access to my AppleID and the passwords to my bank or whatever.
But... how does the money actually go from my account to their account?
Wouldn't that be able to be tracked? Or are we assuming they have anonymous off-shore bank accounts?
I'm not downplaying the risks here. This thread has definitely got my attention.
I just want to know the actual process for a bad guy to remove money from my checking account and put that money into their account.
We have a similar risk if someone steals your ATM card and knows your PIN... but there is a daily-limit to what they can actually withdraw from the account. I'd cancel the card shortly after so they can't do it again.
To log into whatever service you had created the passkey for. Passkeys are not that common (yet), but for instance, some email services now permit passkeys, so you could theortically log into the email accounts associated with the passkey. Another user on here already commented that my understanding of passkeys is incorrect, and that passkeys are not made with any "FaceID data" -- a claim that surprises me, but I don't know any better....
None of that matters if the thief also knows your passcode. Having to use TouchID and FaceID at the same time doesn't change anything when you can still get into an iPhone with just the passcode.You just have to be careful when using your iPhone outside in public.
Apple needs to consider bringing back Touch-ID. Two Factor Authentication: Touch ID + Face ID simultaneously
Don’t have an answer for you. My first thought was off-shore transfers. I’m sure there are other methods.