Not an expert in any way, but I would assume it is similar to having physical access to a computer. You would not be able to get into the existing device or retrieve data, but if you have stolen it and just to use the device, there are numerous tools to allow side loading of new blobs, that will bypass any restrictions.
Comment on Nearly two-fifths of robberies in London last year were for mobile phones
frazorth@feddit.uk 2 years agoI would be curious to learn more, as this is a much touted security feature. If it’s that easy to bypass then we need to understand the limitations.
Do you have any more information on this?
dotslashme@infosec.pub 2 years ago
520@kbin.social 2 years ago
In theory this is true, in practice the protections Apple puts in place tend to put even games consoles to shame. That plus the quick turnaround of iPhone hardware means by the time it is cracked, it was already obselete
gdrhnvfhj@lemmynsfw.com 2 years ago
520@kbin.social 2 years ago
The usual tactic is to send a phishing text to a number that calls it pretending to be Apple. They then get your Apple ID credentials and use that to unlock the device.
frazorth@feddit.uk 2 years ago
How do you send a phishing text to a phone you have stolen? The owner would either not get the text, or get it via iMessage which the response wouldn’t appear on the stolen phone. I’m not following this tactic, so I’m obviously missing something.
520@kbin.social 2 years ago
The owner tries to call the number from another phone, usually a mobile.
frazorth@feddit.uk 2 years ago
So the owner calls the phone, which is answered by the thief who pretends to be Apple?
Interesting.
blake@kbin.social 2 years ago
As usual, people are the weakest link in security.
520@kbin.social 2 years ago
Exactly. The protections on the iPhone themselves are actually very strong for the time the phone released in. Unless you've got NSA-level hardware hackers in your org, this is by far your best bet.
smeg@feddit.uk 2 years ago