A woman said that soon after her iPhone was stolen, she was locked out of
her Apple account.
Because she had lost access to her Apple account, she was unable to log on
to her MacBook computer.
During her most recent conversation with an Apple representative, the representative told Ayas that there was no way to regain access to her
iCloud account.
A woman said that soon after her iPhone was stolen, she was locked out of<snip>
her Apple account.
https://finance.yahoo.com/news/woman-got-locked-her-apple-163000848.html
not having access to her apple account only means certain functionality
won't work, such as being able to download new apps or syncing content.
Adults may wish to bear in mind that Apple _will_ lock you out of your
iCloud account if you don't constantly log into it
nospam wrote:
not having access to her apple account only means certain functionality
won't work, such as being able to download new apps or syncing content.
Adults may wish to bear in mind that Apple _will_ lock you out of your
iCloud account if you don't constantly log into it (ask me how I know this) where the walled-garden itself will lock up as shown in my screenshots.
<https://i.postimg.cc/LXzB3Lc0/appleid01.jpg> Apple _forces_ a log in!
<https://i.postimg.cc/ZR5mZ287/appleid07.jpg> Apple fails App Store test
<https://i.postimg.cc/TwN6P0QR/appleid08.jpg> Only Apple requires a login
<https://i.postimg.cc/8k3GQyj4/appleid09.jpg> Apple tracks your activity
<https://i.postimg.cc/hhFNJ5mq/appleid010.jpg> Apps become non functional
<https://i.postimg.cc/nrFHSvby/appleid11.jpg> Apple _forces_ extra logins!
<https://i.postimg.cc/Y9kkj19v/appleid12.jpg> Apple tracking server login
Adults may wish to bear in mind that Apple _will_ lock you out of your
iCloud account if you don't constantly log into it
no they very definitely won't.
they may periodically ask to log in again, which is what happened in
your case, but the account itself is *not* locked.
more importantly, your neglect has nothing to do with this thread,
which are you attempting to hijack into one of your idiotic rants.
meanwhile, google *will* lock you out if you don't constantly log into
it (unless it's configured to use more than just a password). they say
it's a security feature.
A woman said that soon after her iPhone was stolen, she was locked out of
her Apple account.
Reyhan Ayas said Apple was "not helpful at all" after $10,000 was taken
from her bank account.
She told Insider: "Once someone gets into that security environment, it
turns against you."
This group degenerates to a lot of irrelevant storytelling.
What's needed is the ability to individually require biometrics, or a
PIN, to open certain apps even when the phone screen is already
unlocked.
That's been available on iPhones for ages. Most of my banking apps allow
you to enable Touch ID or Face ID to unlock the app when it is launched.
And many other apps also provide this capability (it's baked into
Apple's operating system as a simple API call), such as my Proton email
app, and others.
Especially with a secure passcode rather than a simply 6-digit numeric
pin code which would be easily observed by watching someone enter it
over their shoulder. My passcode is a 20-character easy-to-remember
sentence, complete with capitalization, letters, numbers, spaces, and punctuation.
That's been available on iPhones for ages. Most of my banking apps allow
you to enable Touch ID or Face ID to unlock the app when it is launched.
And many other apps also provide this capability (it's baked into
Apple's operating system as a simple API call), such as my Proton email
app, and others.
A woman said that soon after her iPhone was stolen, she was locked
out of her Apple account.
Reyhan Ayas said Apple was "not helpful at all" after $10,000 was
taken from her bank account.
badgolferman wrote:
A woman said that soon after her iPhone was stolen, she was locked
out of her Apple account.
Reyhan Ayas said Apple was "not helpful at all" after $10,000 was
taken from her bank account.
Last week’s WSJ report cited experiences of iPhone owners who had their iPhones stolen, only to later see their Apple account compromised, the password changed, and further accounts – including bank accounts – accessed as well. These weren’t cases of advanced hacks, but rather a simple security loophole. Using the passcode (PIN) on the iPhone, the criminal who stole it was able to change the account passwords and
access other accounts, all without knowing the owner’s passwords.
Frighteningly, this can also happen on Android phones, as a PIN is all that’s needed to change your Google account password.
noted in the report that the main target for this kind of practice
seems to revolve around iPhones, as they tend to hold higher resale
value in the United States. Apparently, 99% of cases seen by a
detective were iPhones.
On 2023-02-28 09:27, badgolferman wrote:
badgolferman wrote:
A woman said that soon after her iPhone was stolen, she was locked
out of her Apple account.
Reyhan Ayas said Apple was "not helpful at all" after $10,000 was
taken from her bank account.
Last week???s WSJ report cited experiences of iPhone owners who had their iPhones stolen, only to later see their Apple account compromised, the password changed, and further accounts ??? including bank accounts ??? accessed as well. These weren???t cases of advanced hacks, but rather a simple security loophole. Using the passcode (PIN) on the iPhone, the criminal who stole it was able to change the account passwords and
access other accounts, all without knowing the owner???s passwords.
Frighteningly, this can also happen on Android phones, as a PIN is all that???s needed to change your Google account password.
As I pointed out earlier, using simple PIN's (which is how these people
got screwed) is a very dumb thing only compounded by entering it while sitting in a bar punching the number in for anyone to see.
noted in the report that the main target for this kind of practice
seems to revolve around iPhones, as they tend to hold higher resale
value in the United States. Apparently, 99% of cases seen by a
detective were iPhones.
Yes, exactly as I pointed out when you originally posted this thread.
badgolferman wrote:
A woman said that soon after her iPhone was stolen, she was locked out
of her Apple account.
Reyhan Ayas said Apple was "not helpful at all" after $10,000 was
taken from her bank account.
Last week’s WSJ report cited experiences of iPhone owners who had
their iPhones stolen, only to later see their Apple account
compromised, the password changed, and further accounts – including
bank accounts – accessed as well. These weren’t cases of advanced
hacks, but rather a simple security loophole. Using the passcode (PIN)
on the iPhone, the criminal who stole it was able to change the
account passwords and access other accounts, all without knowing the owner’s passwords.
Frighteningly, this can also happen on Android phones, as a PIN is all that’s needed to change your Google account password.
Doesn't Apple enforce longer PINs these days?
Doesn't Apple enforce longer PINs these days?
The minimum length for Apple mobile devices is six digits,
but you've
been able to supply a much longer alphanumeric passcode for decades.
Last weekąs WSJ report cited experiences of iPhone owners who had their iPhones stolen, only to later see their Apple account compromised, the password changed, and further accounts including bank accounts
accessed as well. These werenąt cases of advanced hacks, but rather a
simple security loophole.
Frighteningly, this can also happen on Android phones, as a PIN is all
thatąs needed to change your Google account password.
Doesn't Apple enforce longer PINs these days?
Frighteningly, this can also happen on Android phones, as a PIN is all that’s needed to change your Google account password.
On Android You can implement an extra layer of security so you can't get
into Google or Chrome to change the password.
In article <k66ogtFs05kU3@mid.individual.net>, Jolly Roger
<jollyroger@pobox.com> wrote:
Thieves gaining access to people's accounts by way of their computer
or smartphone is nothing new, unless you've been living under a rock
for the past 20 years.
50+ years.
In article <k66ojbFs05kU4@mid.individual.net>, Jolly Roger
<jollyroger@pobox.com> wrote:
Doesn't Apple enforce longer PINs these days?
The minimum length for Apple mobile devices is six digits,
the default is 6, but it can be set to 4.
but you've been able to supply a much longer alphanumeric passcode
for decades.
yep, as well as a longer numeric pin code, which has the advantage of
using a numeric keypad instead of a qwerty keyboard, making it easier
to tap in the numbers.
10-15 digits (or more) isn't anything someone is likely to be able to
watch and remember but is *very* secure. brute forcing that will take
a *really* long time.
Last week's WSJ report cited experiences of iPhone owners who had their iPhones stolen, only to later see their Apple account compromised, the password changed, and further accounts - including bank accounts -
accessed as well. These weren't cases of advanced hacks, but rather a
simple security loophole. Using the passcode (PIN) on the iPhone, the criminal who stole it was able to change the account passwords and
access other accounts, all without knowing the owner's passwords.
Frighteningly, this can also happen on Android phones, as a PIN is all
that's needed to change your Google account password.
noted in the report that the main target for this kind of practice
seems to revolve around iPhones, as they tend to hold higher resale
value in the United States. Apparently, 99% of cases seen by a
detective were iPhones.
Yes, exactly as I pointed out when you originally posted this thread.
10-15 digits (or more) isn't anything someone is likely to be able to
watch and remember but is *very* secure. brute forcing that will take a *really* long time.
10-15 digits (or more) isn't anything someone is likely to be able to
watch and remember but is *very* secure. brute forcing that will take
a *really* long time.
Yup. My wife and I often think of a sentence (including capitalization, spaces, and punctuation) that is easy for us to remember, and doesn't
contain identifiable information (birthdays, etc), and use that for our secure passwords that we want to remember.
I'm hopeful that Apple will copy Samsung's "Secure Folder" at sometime
in the future since it's a very useful feature that would not negatively affect Apple revenue.
Frighteningly, this can also happen on Android phones, as a PIN is all
thatąs needed to change your Google account password.
yep, but of course, only apple is to blame for this.
Best: use FaceID or TouchID.
What an intelligent person would note is that nobody will be brute forcing _anything_ on an iPhone given there are so many iOS zero day holes extent.
What an intelligent person would note is that nobody will be brute forcing >> _anything_ on an iPhone given there are so many iOS zero day holes extent.
translated: you know absolutely nothing about cracking into iphones (or
other devices for that matter).
hint: a zero-day is not a free ticket into a device.
What an intelligent person would note is that nobody will be brute forcing >> _anything_ on an iPhone given there are so many iOS zero day holes extent.
translated: you know absolutely nothing about cracking into iphones (or other devices for that matter).
hint: a zero-day is not a free ticket into a device.
It is on iOS
Why would anyone even have a Google Account set up on an Android phone?
because a *lot* of stuff doesn't work without one.
although to be fair, it does require actually having a brain, which in
your case, the lack of one explains a lot.
The whole point of being intelligent is to put our brains to good use,
you might consider trying that sometime.
What an intelligent person would note is that nobody will be brute forcing >>>> _anything_ on an iPhone given there are so many iOS zero day holes extent. >>>translated: you know absolutely nothing about cracking into iphones (or
other devices for that matter).
hint: a zero-day is not a free ticket into a device.
It is on iOS
nope.
keep on digging. it's the only thing you're good at.
On 2023-02-28, nospam <nospam@nospam.invalid> wrote:
In article <k66ogtFs05kU3@mid.individual.net>, Jolly Roger
<jollyroger@pobox.com> wrote:
Thieves gaining access to people's accounts by way of their computer
or smartphone is nothing new, unless you've been living under a rock
for the past 20 years.
50+ years.
Touche`
On 2023-02-28 15:31, Jolly Roger wrote:
On 2023-02-28, nospam <nospam@nospam.invalid> wrote:
In article <k66ogtFs05kU3@mid.individual.net>, Jolly Roger
<jollyroger@pobox.com> wrote:
Thieves gaining access to people's accounts by way of their computer
or smartphone is nothing new, unless you've been living under a rock
for the past 20 years.
50+ years.
Touche`
It took two weeks, but the VAX-785 admin finally came to me to find out
how I got access to his login script and put in a "Hi there!" note.
Stubborn, smart guy spent hours and hours trying to see how someone
broke in to his account. There weren't many suspects but I was near top
of the list.
"So, how did you do it?"
"When I went to ask you about something, your lab notebook was open on
your desk with the password in bold large print."
On 2023-03-01 06:24, Alan Browne wrote:
On 2023-02-28 15:31, Jolly Roger wrote:
On 2023-02-28, nospam <nospam@nospam.invalid> wrote:
In article <k66ogtFs05kU3@mid.individual.net>, Jolly Roger
<jollyroger@pobox.com> wrote:
Thieves gaining access to people's accounts by way of their computer >>>>> or smartphone is nothing new, unless you've been living under a rock >>>>> for the past 20 years.
50+ years.
Touche`
It took two weeks, but the VAX-785 admin finally came to me to find
out how I got access to his login script and put in a "Hi there!" note.
Stubborn, smart guy spent hours and hours trying to see how someone
broke in to his account. There weren't many suspects but I was near
top of the list.
"So, how did you do it?"
"When I went to ask you about something, your lab notebook was open on
your desk with the password in bold large print."
An anecdote from my days at the University of Waterloo:
I wasn't taking computer courses, but I ended up hanging out with a lot
of people in the university who were (including Brad Templeton, who is
the one who literally put the "dot" into internet site names).
As you can imagine, there were a lot of people playing around on
computer and with resources limited, trying to find ways to get more
computer time than they were entitled to.
The main system at UW's Math Faculty Computing Facility was a Honeywell
6050 "Bun" and there was an account on the system called "master" which
had all the power to control... ...everything.
User accounts on the system consisted of the user's first and middle
initials combined with his or her last name (I used an account by
someone else: "kgdykes").
The story goes that some clever student requested an account on the
system and gave his name as "Michael Allen Sternbaum". This was back
around 1980, and there really wasn't any checking to authenicate such requests, so the account was created:
masterbaum
Can you see where this is going?
That's right: at that time the operating system only checked that the
first 6 digits of the account matched "master" and when the student
logged in as "masterbaum", he had full access to the system.
Fortunately, this was just a student playing a prank, so he simply
caused a message of some kind to appear on everyone's terminals and then locked everyone out.
Very shortly, there was a patch to the operating system applied.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 11:58:15 |
Calls: | 10,387 |
Calls today: | 2 |
Files: | 14,061 |
Messages: | 6,416,703 |