Protection of stolen devices, the new thing from Apple

Stolen Device Protection

Apple has begun testing a new feature that will add an extra layer of protection to your iPhone, something that will also deter thieves from snatching your phone. The feature in question is called Stolen Device Protection , and is currently rolling out with the developer version of iOS 17.3 to users.

The new feature, called Stolen Device Protection, requires users to enter their biometric information, such as a facial scan or your fingerprints to access certain phone features, such as changing your Apple ID password or deleting Face ID. Protection mode is activated when a phone is in an unknown location. Users will be asked immediately and a second time an hour later to perform facial or fingerprint recognition.

This is Apple's Stolen Device Protection

Discover all the steps to follow to recover your stolen iPhone

Apple is testing the new configuration:

"as threats to user devices continue to evolve"

A password is already required to activate any iPhone. The new feature protects users in case a criminal accesses your passcode.

"iPhone data encryption has long led the industry, and a thief cannot access data on a stolen iPhone without knowing the user's passcode," the spokesperson said.

"In the rare cases where a thief can observe the user entering the passcode and then steal the device, stolen device protection adds a sophisticated new layer of protection."

Once enabled, this feature establishes three additional security walls on your iPhone, which are as follows:

First security barrier

  • Your phone will need your Face ID before you, or a thief, can access the passwords saved on your device. However, if your iPhone is located in a familiar geographic location, such as your home or office, the security delay protocol is overridden.

This is a crucial barrier because your Face ID is an authentication window in many services, including financial transactions linked to Wallet, For example. Additionally, with the adoption of passcodes, all major third-party services, including Google services, now ask for your Face ID for convenient identity verification instead of the annoying password.

In fact, The new protection system against stolen devices only increases the security guarantee that Passkeys offers. Once activated, the new iOS feature ensures that any attempt to access Apple or external services will only be validated by your Face ID, meaning a stolen passcode will be of no use to the thief.

Second and third security barrier in case of theft

Discover the alternative measures to follow to prevent new thefts of your iPhone

  • The second level of protection offered by Apple's new feature is a intentional security delay. If a bad actor has seen your phone's passcode and is now trying to change Apple ID credentials, Apple will force a security delay in the process. This delay will ensure that, if your phone has been stolen, you can Sign in with your Apple ID on another device and track its location using the network Search. In some countries, you can even file a theft claim against Cupertino guys for an iPhone replacement.
  • Lastly, if that's not feasible and you're worried about your phone's data, you can remotely delete all content stored on your iPhone using a family member's or another trusted device. The same facility is available through the iCloud online control panel. The delay also allows the victim to change their Apple ID credentials so the thief can't do the same.

Your iPhone may have been stolen not only by reselling it for profit. They may also want your digital data. Delaying the adjustment of security credentials would ensure that you have at least some time to report the theft to law enforcement. As an additional security precaution, you can mark your device as lost from the iCloud online control panel. Doing so locks your iPhone and prevents unauthorized access.

How to enable protection against stolen devices

Protection of stolen devices, the new thing from Apple

It's very simple, just follow these steps to activate stolen device protection on your iPhone:

  • Make sure your iPhone is running the iOS version 17.3.
  • Open the application Settings, scroll down and tap Face ID and access code.
  • Secure your identity by entering the access code.
  • On the next page, scroll down and turn on the protection against stolen devices.

In December 2023, an investigation by The Wall Street Journal revealed a pattern of low-effort but extremely destructive iPhone theft. A pickpocket follows the victim, watches him enter the access code of his phone and then steals the device by force, or by stealth.

The scammer then quickly changes the Apple ID associated with the stolen iPhone. With that level of system privilege, the thief can disable security features like Apple Activation Lock or Lost Mode. Doing so is also a criminal necessity, as a stolen, working iPhone has a higher market value compared to one that has been locked by software because it forces the thief to sell the stolen device for parts at a much lower value.

Once this is done, the original owner is blocked from accessing their account and all data stored in the iCloud service.

Conclusion

It's scary to imagine how much damage a thief can do by knowing the passcode for an iPhone and changing Apple ID credentials quickly after the theft. The victims have lost money, but more importantly, they have permanently lost all memories stored in iCloud in the form of photos and videos.

Stolen Device Protection doesn't 100% guarantee that your iPhone will be safe if it's stolen, but it makes the outcome much less damning if you find yourself in that situation.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.