To improve user security, Apple has introduced an innovative stolen device protection feature with its latest version of iOS, version 17.3. This feature aims to thwart phone thieves by imposing additional layers of biometric security and hindering unauthorized access to crucial functions.
Activate stolen device protection: a crucial step for iPhone users
The Stolen Device Protection setting is key in the recent iOS update and offers users additional protection against potential theft. To activate this feature, users must navigate to their device settings and enable Stolen Device Protection. Once activated, the system keeps track of the user's “familiar locations”, such as their home or workplace, and intensifies biometric security measures when the device is used in unknown locations.
Biometric security takes center stage: a paradigm shift from passwords
One notable change introduced by Stolen Device Protection is the reduced reliance on traditional passwords. Instead, the feature prioritizes biometric identifiers like Face ID or Touch ID, making it much harder for thieves to replicate or bypass security measures. In the event of a theft attempt that involves wiping or resetting the device, a Face ID or Touch ID scan becomes mandatory for confirmation, rendering passwords and other backup methods ineffective.
Delay thieves and protect Apple accounts: an innovative approach
Stolen Device Protection strategically incorporates delays into operations related to security configuration changes. For example, if a thief attempts to modify crucial settings, such as signing out of an Apple ID account or changing the passcode in an unknown location, he is subject to a series of authentication steps. This includes Face ID or Touch ID scans, a mandatory one-hour waiting period, and subsequent biometric verification. These delays are strategically designed to deter thieves and give users the opportunity to mark their devices as lost, securing their Apple accounts.
Apple emphasizes that when the device is in a familiar location, these additional steps are not necessary, allowing users to use their device password without problems.
!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=();t=b.createElement(e);t.async=!0;t.src=v;s=b.getElementsByTagName(e)(0);s.parentNode.insertBefore(t,s)}(window,document,’script’,’https://connect.facebook.net/en_US/fbevents.js’);fbq(‘init’,’504526293689977′);fbq(‘track’,’PageView’)