How exactly is an iPhone locked remotely?

How exactly is an iPhone locked remotely?

[[151329]]

Since the second half of last year, iPhones have been locked remotely for no reason almost every day, and I have exposed this to you many times here. Apple invented the "Activation Lock" function with the original intention of making the iPhone more secure, but now it has become a new means for criminals to obtain ill-gotten gains.

What is the purpose of binding an iPhone to an Apple ID?

iPhone theft has always troubled users and Apple. Apple first launched the Find My iPhone feature, which allows users to locate their iOS devices (including iPhone, iPad, iPod touch, etc.) that have the Find My iPhone feature enabled in real time. Starting from iOS 7, Apple has upgraded its anti-theft measures. Users can bind their Apple ID to iOS devices. When reactivating the bound device, they must enter the corresponding Apple ID account and password. Users can also remotely lock the bound iOS device and erase data to prevent their privacy from being leaked.

How were these iPhones locked remotely?

There are two ways to remotely lock your iPhone:

1. Use technical means to obtain the local Apple ID and password (such as Trojan programs or phishing websites), log in to Find My iPhone, and turn on Lost Mode.

2. Due to the user's carelessness, the serial number and IMEI code of his mobile phone was leaked without his knowledge. After obtaining this information, the other party cloned it, activated and bound the Apple ID, turned on the lost mode, and extorted money.

I have to say here that Apple does have such a security loophole (cloning phones). This cloning technology is used by some unscrupulous merchants to change the original locked version of the phone into an unlocked Hong Kong version by modifying the serial number, IMEI code, etc., and this cloning technology can be used to check the warranty and after-sales information on Apple's official website, which is easy to deceive ordinary consumers. Unscrupulous merchants sell these cloned machines at the price of Hong Kong versions to earn the difference. At present, the cost of writing the serial number and IMEI code into an iPhone in China is about 200 yuan.

This cloned iPhone is also called a "demon phone" by people in the industry. The way to identify a cloned phone is to check if it is a cloned phone by flashing the phone or upgrading the firmware when you flash it. So when you buy a mobile phone (especially a second-hand one), you might as well check whether it is a cloned phone by flashing the phone or upgrading the firmware.

What to do if the remote is locked?

1. The easiest way is of course to spend money and ask the other party to unlock the phone.

2. Communicate with customer service and provide all the required information, such as warranty card, purchase invoice, etc. However, it takes a long time, and Apple will not easily unlock a phone that has been turned on in lost mode.

3. Find a merchant on Taobao and pay to unlock the phone. Some merchants on Taobao also provide remote unlocking services, so you can unlock the phone without sending it to the other party. However, there are good and bad people on Taobao, and there are also some scammers. You need to judge for yourself whether they can really unlock the phone.

We are only talking about merchants who can provide remote unlocking services normally. How do they achieve remote unlocking?

Possibility 1: Someone inside Apple can unlock the device through backend operations;

Possibility 2: There really is a so-called "black technology" that can unlock the phone, but I think this possibility is not high.

Possibility three: He is in the same group as the people who cloned the iPhone;

How to prevent it?

1. Protect your Apple ID and password.

2. Do not disclose your phone's serial number, IMEI and other information on the Internet. These criminals are likely to be hiding in some "dark" corner, waiting for you to take the bait.

3. Please do not trust any emails from so-called Apple officials that come from unknown sources. Apple will not send you emails for no reason, nor will it ask users for their Apple IDs.

4. Please purchase Apple devices through formal channels or reputable merchants.

<<:  A shot in the arm for your code — dependency injection

>>:  How Microsoft tricked Apple into becoming lame

Recommend

Why was Xunlei able to successfully go public?

Xunlei started applying for listing in 2011, but i...

33 data points on Apple in 2014

[[125219]] The technology industry continued to c...

Interpreting ASP.NET 5 & MVC6 Series (15): MvcOptions Configuration

Program model handling IApplicationModelConventio...

Marketing Promotion Calendar for April 2019 (with Mind Map)

The new media industry and copywriting marketing ...

Xiaomi Note: A touchstone for Xiaomi’s entry into the mid-to-high-end market

Although I had a hunch that Xiaomi would not rele...

New Oriental F2020 General Doctoral English Full Course Baidu Cloud Download

New Oriental F2020 General Doctoral English Full ...

How to achieve product growth through “circle fission”?

People in society are divided into different leve...

iOS 16 new feature: You can prove to websites that you are not a robot

Apple revealed iOS 16, iPadOS 16, and macOS Ventu...

Comfortable and free! You deserve such space life

In the blink of an eye The Shenzhou 13 crew has b...

100 essential tools for new media operations!

1 Graphics and text editor ◆135 Editor www.135edi...

7 essential data analysis tools for Tik Tok operations!

No matter what platform you use, data analysis is...