Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 Users Encouraged to Transition to Copilot+ PCs

    Mayıs 1, 2025

    The Cot framework simplifies web development in Rust

    Nisan 29, 2025

    IBM Acquires DataStax to Enhance WatsonX’s Generative AI Strength

    Nisan 29, 2025
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Ryzen 8000 HX Series Brings Affordable Power to Gaming Laptops

      Nisan 10, 2025

      Today only: Asus OLED laptop with 16GB RAM drops to $550

      Nisan 6, 2025

      Panther Lake: Intel’s Upcoming Hybrid Hero for PCs

      Nisan 5, 2025

      A new Xbox gaming handheld? Asus’ teaser video sparks speculation

      Nisan 2, 2025

      Now available—Coolify’s ‘holographic’ PC fans bring a unique visual effect

      Nisan 2, 2025
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Unveiling Apple’s Stolen Device Protection: Potential Achilles’ Heel in the New iPhone Feature
    Tech

    Unveiling Apple’s Stolen Device Protection: Potential Achilles’ Heel in the New iPhone Feature

    By ayaksızOcak 24, 2024Yorum yapılmamış3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Apple’s new Stolen Device Protection feature, released as part of Monday’s iOS 17.3 update, could protect users from industrious phone thieves who manage to learn the device’s password. An iPhone passcode has been likened to a “treasure box” that grants nearly complete access to the user’s digital life—bank accounts, email, private photos, and the entire nine yards of privacy. Apple’s operating system previously offered victims several valuable ways to protect that data in case the password was stolen. This latest feature is an attempt to address this shortcoming.

    “Stolen Device Protection adds a layer of security when your iPhone is away from familiar locations like home or work, helping protect your accounts and personal information if your iPhone is stolen,” Apple explains. When enabled, some features and actions will require additional security measures if a phone moves away from the user’s “familiar locations”.

    Specifically, attempting to access stored passwords and credit card information will now prompt users for biometric authentication via Face ID or Touch ID. Security actions deemed even more sensitive, like changing your Apple ID password, go a step further by requiring two rounds of biometric authentication, separated by a one-hour buffer.

    If you’re in what iPhone considers a “familiar location,” a sort of safe haven where extra safeguards aren’t enabled, you can use your passcode as usual.

    But some users are already reporting that they’re experiencing a glitch: Their phone is allegedly not in a familiar place while it’s inside their home, workplace, or other frequently used location.

    Perhaps for security reasons, Apple hasn’t revealed many details about how Stolen Device Protection works. However, a spokesperson said that unfortunately all of the above issues are “expected behavior” due to “users being unable to configure familiar locations”. In fact, familiar locations are not revealed anywhere on users’ phones. Apple declined to comment further, but this is likely due to fears that an enterprising thief might consult a list of familiar locations to know where to move a stolen phone before unlocking it.

    Apple didn’t respond to any of the additional questions, but explains elsewhere that familiar locations are chosen with the help of another iOS feature called Significant Locations. According to Apple, Points of Interest is a feature that allows your phone to “learn places that are important to you to provide useful location-related information in Maps, Calendar, Photos, and more.” Apple says these are encrypted, cannot be read by the company, and also cannot be downloaded from the phone.

    But anyone who can unlock the phone can also load up the Highlights tab and get a list of “Recent Recordings,” which are timestamped with their duration and their geolocation displayed on an interactive map. A dedicated thief can try these exact places if he so chooses.

    Post Views: 119
    Apple technology
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Ryzen 8000 HX Series Brings Affordable Power to Gaming Laptops

    Nisan 10, 2025

    Today only: Asus OLED laptop with 16GB RAM drops to $550

    Nisan 6, 2025

    Panther Lake: Intel’s Upcoming Hybrid Hero for PCs

    Nisan 5, 2025
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2025 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.