{"id":8389,"date":"2023-07-27T10:34:48","date_gmt":"2023-07-27T10:34:48","guid":{"rendered":"https:\/\/www.diplomacypakistan.com\/?p=8389"},"modified":"2023-07-27T10:34:48","modified_gmt":"2023-07-27T10:34:48","slug":"how-to-protect-yourself-from-iphone-thieves-locking-you-out-of-your-own-device","status":"publish","type":"post","link":"https:\/\/www.diplomacypakistan.com\/?p=8389","title":{"rendered":"How to protect yourself from iPhone thieves locking you out of your own device"},"content":{"rendered":"<p>A complex but concerning method of gaining control over a user\u2019s iPhone and permanently locking them out the device appears to be on the rise. Some iPhone thieves are exploiting a security setting, called the recovery key, that makes it nearly impossible for owners to access their photos, messages, data and more, according to a recent an international report. Some victims also told the publication their bank accounts were drained after the thieves gained access to their financial apps. It\u2019s important to note, however, this type of takeover is hard to pull off. It requires a criminal essentially watching an iPhone user enter the device\u2019s passcode \u2013 for example, by looking over their shoulder at a bar or sporting event \u2013 or manipulating the device\u2019s owner so they\u2019ll share their passcode. And that\u2019s all before they physically steal the device. From there, a thief could use the passcode to change the device\u2019s Apple ID, turn off \u201cFind my iPhone\u201d so their location can\u2019t be tracked, and then reset the recovery key, a complex 28-digit code intended to protect its owners from online hackers. Apple requires this key to help reset or regain access to an Apple ID in an effort to bolster the user\u2019s security, but if a thief changes it, the original owner will not have the new code and will be locked out of the account. \u201cWe sympathize with people who have had this experience and we take all attacks on our users very seriously, no matter how rare,\u201d an Apple spokesperson said in a statement to an international news channnel. \u201cWe work tirelessly every day to protect our users\u2019 accounts and data, and are always investigating additional protections against emerging threats like this one.\u201d On its website, Apple warns \u201cyou\u2019re responsible for maintaining access to your trusted devices and your recovery key. If you lose both of these items, you could be locked out of your account permanently.\u201d Jeff Pollard, VP and principal analyst at Forrester Research, said the company should offer more customer support options and \u201cways for Apple users to authenticate so they can reset these settings.\u201d For now, however, there are a handful of steps users can take to potentially protect themselves from having this happen to them. Protect the passcodeThe first step is protecting the passcode. An Apple spokesperson told an international news channel that people can use Face ID or Touch ID when unlocking their phone in public to avoid revealing their passcode to anyone who might be watching. Users can also set up a longer, alphanumeric passcode that\u2019s harder for bad actors to figure out. Device owners should also change the passcode immediately if they believe someone else has seen it. Screen Time settingsAnother step someone could consider is a hack not necessarily endorsed by Apple but one that\u2019s been circulating online. Within an iPhone\u2019s Screen Time setting, which allows guardians to set up restrictions on how kids can use the device, there is the option to set up a secondary password that would be required from any user before they could successfully change an Apple ID. By enabling this, a thief would be prompted for that secondary password before changing an Apple ID password. Back up phone regularlyFinally, users can protect themselves by regularly backing up an iPhone \u2013 via iCloud or iTunes \u2013 so data can be recovered in the case an iPhone is stolen. At the same time, users may want to consider storing important photos or other sensitive files and data in another cloud service, such as Google Photos, Microsoft OneDrive, Amazon Photos or Dropbox. This won\u2019t stop a bad actor from gaining access to the device, but it should limit some of the fallout if it ever should happen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A complex but concerning method of gaining control over a user\u2019s iPhone and permanently locking them out the device appears to be on the rise&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":8390,"comment_status":"registered_only","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[14],"tags":[],"class_list":["post-8389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"aioseo_notices":[],"jetpack_publicize_connections":[],"_links":{"self":[{"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=\/wp\/v2\/posts\/8389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8389"}],"version-history":[{"count":0,"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=\/wp\/v2\/posts\/8389\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=\/wp\/v2\/media\/8390"}],"wp:attachment":[{"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.diplomacypakistan.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}