How exactly is an iPhone locked remotely?

How exactly is an iPhone locked remotely?

[[151329]]

Since the second half of last year, iPhones have been locked remotely for no reason almost every day, and I have exposed this to you many times here. Apple invented the "Activation Lock" function with the original intention of making the iPhone more secure, but now it has become a new means for criminals to obtain ill-gotten gains.

What is the purpose of binding an iPhone to an Apple ID?

iPhone theft has always troubled users and Apple. Apple first launched the Find My iPhone feature, which allows users to locate their iOS devices (including iPhone, iPad, iPod touch, etc.) that have the Find My iPhone feature enabled in real time. Starting from iOS 7, Apple has upgraded its anti-theft measures. Users can bind their Apple ID to iOS devices. When reactivating the bound device, they must enter the corresponding Apple ID account and password. Users can also remotely lock the bound iOS device and erase data to prevent their privacy from being leaked.

How were these iPhones locked remotely?

There are two ways to remotely lock your iPhone:

1. Use technical means to obtain the local Apple ID and password (such as Trojan programs or phishing websites), log in to Find My iPhone, and turn on Lost Mode.

2. Due to the user's carelessness, the serial number and IMEI code of his mobile phone was leaked without his knowledge. After obtaining this information, the other party cloned it, activated and bound the Apple ID, turned on the lost mode, and extorted money.

I have to say here that Apple does have such a security loophole (cloning phones). This cloning technology is used by some unscrupulous merchants to change the original locked version of the phone into an unlocked Hong Kong version by modifying the serial number, IMEI code, etc., and this cloning technology can be used to check the warranty and after-sales information on Apple's official website, which is easy to deceive ordinary consumers. Unscrupulous merchants sell these cloned machines at the price of Hong Kong versions to earn the difference. At present, the cost of writing the serial number and IMEI code into an iPhone in China is about 200 yuan.

This cloned iPhone is also called a "demon phone" by people in the industry. The way to identify a cloned phone is to check if it is a cloned phone by flashing the phone or upgrading the firmware when you flash it. So when you buy a mobile phone (especially a second-hand one), you might as well check whether it is a cloned phone by flashing the phone or upgrading the firmware.

What to do if the remote is locked?

1. The easiest way is of course to spend money and ask the other party to unlock the phone.

2. Communicate with customer service and provide all the required information, such as warranty card, purchase invoice, etc. However, it takes a long time, and Apple will not easily unlock a phone that has been turned on in lost mode.

3. Find a merchant on Taobao and pay to unlock the phone. Some merchants on Taobao also provide remote unlocking services, so you can unlock the phone without sending it to the other party. However, there are good and bad people on Taobao, and there are also some scammers. You need to judge for yourself whether they can really unlock the phone.

We are only talking about merchants who can provide remote unlocking services normally. How do they achieve remote unlocking?

Possibility 1: Someone inside Apple can unlock the device through backend operations;

Possibility 2: There really is a so-called "black technology" that can unlock the phone, but I think this possibility is not high.

Possibility three: He is in the same group as the people who cloned the iPhone;

How to prevent it?

1. Protect your Apple ID and password.

2. Do not disclose your phone's serial number, IMEI and other information on the Internet. These criminals are likely to be hiding in some "dark" corner, waiting for you to take the bait.

3. Please do not trust any emails from so-called Apple officials that come from unknown sources. Apple will not send you emails for no reason, nor will it ask users for their Apple IDs.

4. Please purchase Apple devices through formal channels or reputable merchants.

<<:  A shot in the arm for your code — dependency injection

>>:  How Microsoft tricked Apple into becoming lame

Recommend

Apple's Big Three Era

[[132213]] On April 10, Apple officially launched...

Android Studio debugging tips you don't know

Bugs are inevitable when writing code. Usually, b...

Xiaohongshu product operation analysis report

This article is a product analysis report of Xiao...

Apple: Court's request to unlock iPhone is unconstitutional and beyond authority

Apple fought back in court on Thursday against a ...

What are the benefits of using mercury to make a liquid telescope?

Astronomical telescopes are the eyes of human bei...

Lotus changes leadership, Geely's Feng Qingfeng to become CEO

According to Automotive News Europe on June 4, Lo...

After the failure of Google Glass, Google wants to make a hat

According to foreign media reports, a new patent ...

You can pause the voice and read the text! WeChat new function experience

WeChat, which used to be updated frequently, has ...

WeChat Mini Program Assistant released: a must-have for developers

Mini programs are free to install and can be used...

Why did JD Live, which is unconventional, become so popular?

According to official data, the attention of &quo...