Since the second half of last year, iPhones have been locked remotely for no reason almost every day, and I have exposed this to you many times here. Apple invented the "Activation Lock" function with the original intention of making the iPhone more secure, but now it has become a new means for criminals to obtain ill-gotten gains. What is the purpose of binding an iPhone to an Apple ID? iPhone theft has always troubled users and Apple. Apple first launched the Find My iPhone feature, which allows users to locate their iOS devices (including iPhone, iPad, iPod touch, etc.) that have the Find My iPhone feature enabled in real time. Starting from iOS 7, Apple has upgraded its anti-theft measures. Users can bind their Apple ID to iOS devices. When reactivating the bound device, they must enter the corresponding Apple ID account and password. Users can also remotely lock the bound iOS device and erase data to prevent their privacy from being leaked. How were these iPhones locked remotely? There are two ways to remotely lock your iPhone: 1. Use technical means to obtain the local Apple ID and password (such as Trojan programs or phishing websites), log in to Find My iPhone, and turn on Lost Mode. 2. Due to the user's carelessness, the serial number and IMEI code of his mobile phone was leaked without his knowledge. After obtaining this information, the other party cloned it, activated and bound the Apple ID, turned on the lost mode, and extorted money. I have to say here that Apple does have such a security loophole (cloning phones). This cloning technology is used by some unscrupulous merchants to change the original locked version of the phone into an unlocked Hong Kong version by modifying the serial number, IMEI code, etc., and this cloning technology can be used to check the warranty and after-sales information on Apple's official website, which is easy to deceive ordinary consumers. Unscrupulous merchants sell these cloned machines at the price of Hong Kong versions to earn the difference. At present, the cost of writing the serial number and IMEI code into an iPhone in China is about 200 yuan. This cloned iPhone is also called a "demon phone" by people in the industry. The way to identify a cloned phone is to check if it is a cloned phone by flashing the phone or upgrading the firmware when you flash it. So when you buy a mobile phone (especially a second-hand one), you might as well check whether it is a cloned phone by flashing the phone or upgrading the firmware. What to do if the remote is locked? 1. The easiest way is of course to spend money and ask the other party to unlock the phone. 2. Communicate with customer service and provide all the required information, such as warranty card, purchase invoice, etc. However, it takes a long time, and Apple will not easily unlock a phone that has been turned on in lost mode. 3. Find a merchant on Taobao and pay to unlock the phone. Some merchants on Taobao also provide remote unlocking services, so you can unlock the phone without sending it to the other party. However, there are good and bad people on Taobao, and there are also some scammers. You need to judge for yourself whether they can really unlock the phone. We are only talking about merchants who can provide remote unlocking services normally. How do they achieve remote unlocking? Possibility 1: Someone inside Apple can unlock the device through backend operations; Possibility 2: There really is a so-called "black technology" that can unlock the phone, but I think this possibility is not high. Possibility three: He is in the same group as the people who cloned the iPhone; How to prevent it? 1. Protect your Apple ID and password. 2. Do not disclose your phone's serial number, IMEI and other information on the Internet. These criminals are likely to be hiding in some "dark" corner, waiting for you to take the bait. 3. Please do not trust any emails from so-called Apple officials that come from unknown sources. Apple will not send you emails for no reason, nor will it ask users for their Apple IDs. 4. Please purchase Apple devices through formal channels or reputable merchants. |
<<: A shot in the arm for your code — dependency injection
>>: How Microsoft tricked Apple into becoming lame
[[132213]] On April 10, Apple officially launched...
Bugs are inevitable when writing code. Usually, b...
This article is a product analysis report of Xiao...
Note: When drama fans began to shift their attent...
Apple fought back in court on Thursday against a ...
When it comes to new media, the first thing that ...
Astronomical telescopes are the eyes of human bei...
According to Automotive News Europe on June 4, Lo...
Recently, the Thai Ministry of Public Health held...
According to foreign media reports, a new patent ...
WeChat, which used to be updated frequently, has ...
Mini programs are free to install and can be used...
According to official data, the attention of &quo...
Finally, the region where I live has also started...
The fifth Global Mobile Game Conference GMGC2016, ...