Never buy an iPhone from dubious provenance

Theft store

The recent looting and robbery in the United States, are settled with subsequent attempts to sell the stolen material. This reminds us of a very important issue in this type of case, which is unfortunately quite common throughout the world.

It is key to be clear when we buy a new or second-hand product outside the stores the different steps that must be followed so that the purchase does not become a nightmare. Remember that the display models of Apple stores, telephone stores and others, have installed demos of the operating system so they are not functional and cannot be used as a normal device.

Theft store
Related article:
Videos of brutal looting at Apple stores in Floyd's death

IPhones stolen from stores are locked

Logically these looting of all the iPhone, iPad, Mac, Apple Watch, Apple TV in Apple stores occurred in North America, they will not work as a new device since they have specific software that Apple implemented so that these were blocked as soon as they passed the exit door of the store. If you buy an iPhone that comes from a robbery in an Apple store, the device will display the message that it has been stolen from a company store: "This device has been disabled and is being tracked" "The authorities are being informed."

Without a doubt, we must ensure the purchase when we are looking for a second-hand or new model outside the stores. Today the best way to check that everything is fine is through iCloud. This can simply save us from a serious problem and that is that buying an iPhone or any stolen product is also considered a crime.

Buying a stolen product no matter how cheap it may seem at that time can finally be very expensive, do not do it.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.