{"id":23591,"date":"2023-12-13T10:30:10","date_gmt":"2023-12-13T18:30:10","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/12\/13\/news-17321\/"},"modified":"2023-12-13T10:30:10","modified_gmt":"2023-12-13T18:30:10","slug":"news-17321","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/13\/news-17321\/","title":{"rendered":"What is Stolen Device Protection for iPhone and how does it work?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/10\/gettyimages-1170855903_by-motortion-100861774-small.jpg\"\/><\/p>\n<p>Take that, iPhone thieves \u2014 Apple is about to make it even more difficult to use its smartphones when you have no right to do so. In the upcoming iOS 17.3, it is testing out a new security system called &#8220;Stolen Device Protection.&#8221;<\/p>\n<p>Here&#8217;s a look at what this is, and what it does.<\/p>\n<p>Apple\u2019s beta notes explain: \u201cStolen Device Protection adds an additional layer of security in the unlikely case that someone has stolen your iPhone and also obtained your passcode.\u201d<\/p>\n<p>The company explains the features this way:<\/p>\n<p>The idea is that Stolen Device Protection introduces another obstacle that makes it difficult for thieves to gain access to your data, erase it, or delete the device to factory fresh status for resale.<\/p>\n<p>If someone has your device and attempts to make such a change, there will be a one-hour delay after which whoever has the device must successfully login again. That one-hour delay could be critical when using Find My to track device location.<\/p>\n<p>Basically, Stolen Device Protection adds another layer of authentication that needs to be completed if someone has both your iPhone and its password.<\/p>\n<p>This double verification process provides an additional authorization barrier to protect the device and the information it contains. To achieve this, Stolen Device Protection uses Location Data, specifically frequently visited places such as your home or office.<\/p>\n<p>So, if a colleague or family member has access to your device and your passcode and attempts to pry inside your iPhone, they will be able to if they are in the same place you usually happen to be.<\/p>\n<p>Recent reports say criminals have peered over a user&#8217;s shoulder while the victim enters their password before seizing the device. That\u2019s just one of a multitude of ways criminals will attempt to seize or guess a user\u2019s passcode.<\/p>\n<p>Once a criminal has both the device and the passcode, they can then <a href=\"https:\/\/www.computerworld.com\/article\/3661355\/the-essential-guide-to-icloud-login.html\">change the Apple ID<\/a> password, turn off Find My protection, steal your account and credit card details and passwords, and sell your iPhone for a profit.<\/p>\n<p>Apple knows all about iPhone crime and has <a href=\"https:\/\/www.applemust.com\/ios-15-how-apple-makes-it-easier-to-find-stolen-iphones\/\" rel=\"noopener nofollow\" target=\"_blank\">a track record\u00a0of anti-theft measures<\/a>\u00a0it&#8217;s put in place to protect devices. In October, it attended <a href=\"https:\/\/news.met.police.uk\/news\/mayor-and-met-commissioner-convene-landmark-meeting-with-world-leading-mobile-phone-companies-to-design-out-theft-and-robbery-of-smartphones-473799\" rel=\"noopener nofollow\" target=\"_blank\">meetings at government level<\/a>\u00a0focused on device protection. We\u2019ve <a href=\"https:\/\/www.wsj.com\/articles\/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a\" rel=\"noopener nofollow\" target=\"_blank\">also been warned<\/a> that criminals accessing these phones end up opening people\u2019s digital lives. Even if criminals aren\u2019t chasing data, they can shift iPhones they are able to open up for good money or sell those they can\u2019t return to factory setting for spare parts.<\/p>\n<p>The big take away behind this protection is that no one should ever share their passcode with anyone, bar their most trusted contacts. However, we now have slightly more protection in the event we do share our passcode.<\/p>\n<p>We don\u2019t yet know whether Apple will extend its device management protections so \u00a0that Stolen Device Protection can be enabled remotely using MDM solutions. It seems plausible.<\/p>\n<p>In any case, enterprise users should already use device management systems that enable them to remotely wipe and reset their mobile fleets. Not only does doing so provide additional security, but managed devices are inherently a little harder to reset to factory status, even if a criminal does get through the authorization process.<\/p>\n<p>As iPhones become harder to steal, casual criminals will inevitably target other less well-protected devices, despite the higher selling price iPhones command. Apple\u2019s decision to introduce this protection follows reporting from the<em> <a href=\"https:\/\/www.wsj.com\/articles\/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a\" rel=\"noopener nofollow\" target=\"_blank\">Wall Street Journal<\/a><\/em> earlier this year of incidents in which thieves spied on users to steal passcodes before taking the iPhone.<\/p>\n<p>At that time, Apple said: \u201cWe sympathize with users who have had this experience, and we take all attacks on our users very seriously, no matter how rare. The thefts described are uncommon and require multiple physical steps \u2014 stealing a user\u2019s device is not enough\u2026. We will continue to advance the protections to help keep user accounts secure.\u201d<\/p>\n<p>We can now see the company meant that promise.<\/p>\n<p>Once iOS 17.3 ships, Stolen Device Protection will not be enabled by default. The protection can be enabled in <em>Settings&gt;Face ID &amp; Passcode&gt;Stolen Device Protection<\/em>.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<\/em><a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\"><em>Apple<\/em>\u00a0<em>Discussions<\/em><\/a><em>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3711700\/what-is-stolen-device-protection-for-iphone-and-how-does-it-work.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/10\/gettyimages-1170855903_by-motortion-100861774-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Take that, iPhone thieves \u2014 Apple is about to make it even more difficult to use its smartphones when you have no right to do so. In the upcoming iOS 17.3, it is testing out a new security system called &#8220;Stolen Device Protection.&#8221;<\/p>\n<p>Here&#8217;s a look at what this is, and what it does.<\/p>\n<h2><strong>Stolen Device Protection explained<\/strong><\/h2>\n<p>Apple\u2019s beta notes explain: \u201cStolen Device Protection adds an additional layer of security in the unlikely case that someone has stolen your iPhone and also obtained your passcode.\u201d<\/p>\n<p>The company explains the features this way:<\/p>\n<ul>\n<li>Accessing your saved passwords requires Face\/Touch ID to be sure it\u2019s you.<\/li>\n<li>Changing sensitive settings like your Apple ID password is protected by a security delay.<\/li>\n<li>No delay is required when iPhone is at familiar locations such as home and work.<\/li>\n<\/ul>\n<p>The idea is that Stolen Device Protection introduces another obstacle that makes it difficult for thieves to gain access to your data, erase it, or delete the device to factory fresh status for resale.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3711700\/what-is-stolen-device-protection-for-iphone-and-how-does-it-work.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,8826,10554,714,24580],"class_list":["post-23591","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-iphone","tag-mobile","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23591"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23591\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23591"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}