How to Use Stolen Device Protection on Apple’s iPhone

Spread the love

If a thief Never steal one iPhone Out of your bag or even snatched from your grip, panic sets in immediately. There can be a lot more to think about than just the cost of replacing your phone. If they saw me enter the passcode and now have Easy access All my messages, photos and sensitive information? While it certainly does nab and suck your smartphone, turning on Apple’s Stolen Device Protection can instantly cut off thieves’ access to your smartphone data. This feature is not automatically enabled and needs to be enabled before the offense occurs.

First released as part of iOS 17.3, Stolen Device Protection essentially adds an extra layer of protection to your smartphone whenever the device is out of your reach. Here’s a quick guide to what the software feature does and what steps are required to turn it on.

For a deeper dive into Apple’s anti-theft software, check out Wired Security Reporter Article by Matt Burgess About features from last year. If you have an Android phone, read my guide to use Android theft detection characteristics.

How to protect stolen devices?

The feature is specially designed for situations where a criminal not only takes your iPhone but also knows your passcode and can unlock the device. When they physically take your phone away from you and bring it to a place you don’t visit often Theft device protection security system Start kicking.

The main thing about feature triggers is that you need them Face ID biometrics To access any sensitive features on the phone, such as using your Keychain password, viewing your stored payment information in Safari, and disabling Lost Mode. Even if thieves know your passcode, it will no longer serve as a backup option; Face ID becomes necessary for full access. This prevents thieves from easily wiping all your data off the phone so they can sell it, as that method requires a face as well.

In addition to forcing biometric authentication, stolen device protection adds a security delay period to changes in security features on the phone. If the thief wants to sign out or close your Apple ID find my iphoneFor example, they can’t just hold the phone in front of your face for a few seconds as they flee the crime scene. With the feature’s automatic security delay, you’ll have to wait an hour to make major security changes to the device, and you’ll need to confirm your biometrics at the beginning as well as at the end of the process.

How do I turn it on?

Before you can turn on stolen device protection, you need to set up a few more basic features on your smartphone first. You probably already have Face ID and a passcode enabled on your Apple device — both are required for the feature to work.

Next, you need to check for two-factor authentication Enabled for your Apple IDIt’s a good idea even if you don’t use stolen device protection. Go check it out if you’re already using it settingsTapping on your name at the top, and then selecting Sign in and protect tab. You should see if 2fa for your Apple ID is turned on or off in the middle of this screen.

The latest software feature to enable you on iPhone is notable location. It keeps track of the places you visit regularly, so your phone can detect whether it’s in a familiar or unfamiliar place. According to AppleData is end-to-end encrypted and is not read by the company. Notable locations are somewhat buried in the menus – find it by opening it settingsthen Privacy and SecurityAnd Location Services. After that, scroll all the way until you see System Services tab. select Notable locationAnd you will probably be prompted to unlock it with Face ID. On the next page, move the toggle to the right to enable the feature.

No! OK, now you’re ready to start using Stolen Device Protection. And, lucky for you, after all that prep work, the last step is a breeze. open settings One more time, then Face ID and passcodeand fill in your passcode. Scroll about halfway down the page, choose Theft device protection tab, and move that toggle to the right.

Leave a Reply

Your email address will not be published. Required fields are marked *