The arrival of iOS 17.4 on March 5 marked a significant update for iPhone users, introducing a host of new features and resolving several bugs. Notably, the update includes fresh emoji options and grants individuals in the EU the ability to explore alternative app stores. However, the focal point of attention lies in the bolstered security measures, particularly surrounding Stolen Device Protection.
This feature empowers users with greater oversight of their iPhone’s security settings. When operating outside familiar surroundings, such as one’s home, the system prompts users to authenticate biometrically twice within an hour to access select settings, such as altering the Apple ID password or deactivating Stolen Device Protection.
However, a potential vulnerability emerges for individuals frequenting public locales like coffee shops or residing in communal residences. In such scenarios, the device may recognize these locations as familiar, potentially undermining security protocols. iOS 17.4 addresses this concern by enabling users to enforce a consistent one-hour security delay, irrespective of their geographical location.
Here’s a concise guide to activating this feature:
- Access Settings.
- Navigate to Face ID & Passcode.
- Scroll down to Stolen Device Protection.
- Toggle the switch next to Stolen Device Protection to activate it. If already enabled, proceed to the next step.
- Under Require Security Delay, select “Always.”
By implementing this adjustment, your iPhone will consistently enforce the one-hour security delay, regardless of your current whereabouts. Nevertheless, it’s essential to recognize that Stolen Device Protection safeguards only a subset of settings. Consequently, users must remain vigilant in safeguarding their sensitive information. While Stolen Device Protection offers an additional layer of security, it does not provide comprehensive protection for financial transactions made via Apple Pay, necessitating additional precautions.
Apple advocates for the activation of Stolen Device Protection by all users, emphasizing its importance in bolstering device security.