How exactly is an iPhone locked remotely?

How exactly is an iPhone locked remotely?

[[151329]]

Since the second half of last year, iPhones have been locked remotely for no reason almost every day, and I have exposed this to you many times here. Apple invented the "Activation Lock" function with the original intention of making the iPhone more secure, but now it has become a new means for criminals to obtain ill-gotten gains.

What is the purpose of binding an iPhone to an Apple ID?

iPhone theft has always troubled users and Apple. Apple first launched the Find My iPhone feature, which allows users to locate their iOS devices (including iPhone, iPad, iPod touch, etc.) that have the Find My iPhone feature enabled in real time. Starting from iOS 7, Apple has upgraded its anti-theft measures. Users can bind their Apple ID to iOS devices. When reactivating the bound device, they must enter the corresponding Apple ID account and password. Users can also remotely lock the bound iOS device and erase data to prevent their privacy from being leaked.

How were these iPhones locked remotely?

There are two ways to remotely lock your iPhone:

1. Use technical means to obtain the local Apple ID and password (such as Trojan programs or phishing websites), log in to Find My iPhone, and turn on Lost Mode.

2. Due to the user's carelessness, the serial number and IMEI code of his mobile phone was leaked without his knowledge. After obtaining this information, the other party cloned it, activated and bound the Apple ID, turned on the lost mode, and extorted money.

I have to say here that Apple does have such a security loophole (cloning phones). This cloning technology is used by some unscrupulous merchants to change the original locked version of the phone into an unlocked Hong Kong version by modifying the serial number, IMEI code, etc., and this cloning technology can be used to check the warranty and after-sales information on Apple's official website, which is easy to deceive ordinary consumers. Unscrupulous merchants sell these cloned machines at the price of Hong Kong versions to earn the difference. At present, the cost of writing the serial number and IMEI code into an iPhone in China is about 200 yuan.

This cloned iPhone is also called a "demon phone" by people in the industry. The way to identify a cloned phone is to check if it is a cloned phone by flashing the phone or upgrading the firmware when you flash it. So when you buy a mobile phone (especially a second-hand one), you might as well check whether it is a cloned phone by flashing the phone or upgrading the firmware.

What to do if the remote is locked?

1. The easiest way is of course to spend money and ask the other party to unlock the phone.

2. Communicate with customer service and provide all the required information, such as warranty card, purchase invoice, etc. However, it takes a long time, and Apple will not easily unlock a phone that has been turned on in lost mode.

3. Find a merchant on Taobao and pay to unlock the phone. Some merchants on Taobao also provide remote unlocking services, so you can unlock the phone without sending it to the other party. However, there are good and bad people on Taobao, and there are also some scammers. You need to judge for yourself whether they can really unlock the phone.

We are only talking about merchants who can provide remote unlocking services normally. How do they achieve remote unlocking?

Possibility 1: Someone inside Apple can unlock the device through backend operations;

Possibility 2: There really is a so-called "black technology" that can unlock the phone, but I think this possibility is not high.

Possibility three: He is in the same group as the people who cloned the iPhone;

How to prevent it?

1. Protect your Apple ID and password.

2. Do not disclose your phone's serial number, IMEI and other information on the Internet. These criminals are likely to be hiding in some "dark" corner, waiting for you to take the bait.

3. Please do not trust any emails from so-called Apple officials that come from unknown sources. Apple will not send you emails for no reason, nor will it ask users for their Apple IDs.

4. Please purchase Apple devices through formal channels or reputable merchants.

<<:  A shot in the arm for your code — dependency injection

>>:  How Microsoft tricked Apple into becoming lame

Recommend

What you must know about information flow advertising!

It is an indisputable fact that the entire Chines...

Apple GPU's biggest revolution in 7 years: 80% improvement, outperforming Android

In March this year, Imagination announced the firs...

How can a newbie on Douyin become a big V? Remember these 7 creative methods

When working in new media , choose a popular plat...

Advertising strategies for the four hot-selling industries during Double Eleven!

Double Eleven is approaching. In the e-commerce b...

Stegosaurus: A hug of love and fear of being hurt

Stegosaurus is one of the most well-known dinosau...

What I mean is, is it necessary to remove armpit hair?

Review expert: Zhang Yuhong Zhengzhou Central Hos...

BYD launches new pure electric car e3, which may be launched in 2017

Recently, media reported that BYD's new energ...