How?It isn't a good workaround because Screen Time lock can easily be bypassed.
How?It isn't a good workaround because Screen Time lock can easily be bypassed.
The Screen Time pass code can be set separately.This is actually a very good workaround, especially considering that the only way to change or deactivate the Screen Time passcode is by using the Apple ID password.
Thank you
I just did a test run and it isn't an easy reset in spite of what Apple_Robert said. In fact, Apple has now incorporated a waiting period (several days) if you try to reset the Screen Time pass code even if you can get through the Apple ID information input requirements.Precisely
I wish @Apple_Robert explains his statement so that I can understand to which degree this can be a workable workaround.I just did a test run and it isn't an easy reset in spite of what Apple_Robert said. In fact, Apple has now incorporated a waiting period (several days) if you try to reset the Screen Time pass code even if you can get through the Apple ID information input requirements.
It is possible to reset the pass code by using the Apple ID information or through Forgot Apple ID Passcode. The later requires two step authentication with name, email, phone number, and delayed access. In practice this would give you several days to change your Apple ID to prevent compromise even after your phone is stolen. Most people are going to know pretty quickly when their phone had been snagged. It may not be 100% but it should buy enough time to lessen the blow to the entire account.I wish @Apple_Robert explains his statement so that I can understand to which degree this can be a workable workaround.
As far as I can see it cannot be bypassed.
It can be reset, if you know the Apple ID password, which is exactly what we are trying to protect.
Hopefully in time we will get a reply from him.
Yep 💯 %Except in this case the bad guys already have it.
They should require the Apple ID password to reset the device passcode. (and not allow the reverse).
What Apple has done here is to make the least secure, most entered (in public!), authenticator the primary one. That's a design flaw. It should be the most secure/complex one that's required to reset the easier ones.
And on top of that when we type passwords on iOS they appear on the screen before hidden by dots. I mentioned this above in one of my posts (and in the past as well).Yep 💯 %
I write “sat phone down on table, near the edge” because I know that’s what I used to do. Most often, I’d tap out the PIN on the flat table… VERY easy to follow as I’d use one finger and move slowly, no hurry. I think about EVERY time I’ve done this and I’m thankful that, because of where I was at the time or who knows what, I wasn’t targeted. I KNOW that’s the wrong thing to do, but never considered that I would be interesting enough to be a target. It’s not about whether one looks like they’re worth anything, though, it’s about an opportunity being seized.I work in Fintech and rate myself as being reasonably tech savvy and security conscious.
I made safeguards on my iCloud account to prevent total lock out and theft. I (like so many others on here) simply did not realise all of those safeguards fail if someone steals my 6 digit passcode.
Unfortunately I am out all day most days tapping my phone for payments and travel across London. Maybe 10-15 per day, every day. I could use a physical card for this, but the point of my iPhone is convenience, right? You cannot swipe cards in the UK, it is pretty much all contact less via Apple pay now.
My iPhone face ID fails a few times a day. I think by design?
Somehow someone deliberately got my pin.
I get your point about protecting our passcodes. I truly believe I did this more than an average person. But still they got it. I don't exactly know how. Cameras most likely.
No one deserves a total lock out because of this theft. It sounds like the argument a person deserved to be attacked because of how they dressed or because they went out late at night.
I did a trial run on that and got a message that I couldn't reset the passcode for several days.People are asking how to disable screen time.
It's done like this:
1) Go into Screen Time and select to change the passcode
2) Click "turn off passcode"
3) Click "forgot passcode?"
4) Type in Apple ID *
5) Select "Forgot Apple ID or Password?"
6) Unlock using phone PIN (which the thief has - it's the only password ever needed)
7) Then with the new password, use that to reset the screen time passcode or turn off screen time.
Or just stop after (6) as you now have the password for the Apple ID.
* You need to know the Apple ID. I don't know if that's easy to discover - I didn't actually do steps 6 or 7 as I don't want to reset anything.
I did not know this, and just enabled it.I wear my watch and it unlocks my phone for me. I also don’t unlock my phone via passcode in public. I have my phone locked down as tight as I can. If my phone gets lost or stolen, whoever has the phone won’t be able access most of the phone. Almost all of my apps require FaceID to open
The OP made an honest mistake and hopefully those reading will take heed and not make the same mistake.
Yes, even if manufactured, it’s still a good story to have communicated widely so that more folks become wary of entering their PINs in public.yes.
i think it is manufactured. kind of obviously so.
but even so, there is a point to discussing this actual problem, even if it is in a general context.
yes.
i think it is manufactured. kind of obviously so.
but even so, there is a point to discussing this actual problem, even if it is in a general context.
I am security conscious. However, I should be able to give my phone and its PIN to an attacker with no worries.Agreed, you don’t need to be a tech nerd to be security conscious. Which is why everyone should be vigilant when entering their device passcode in a public location.
That is not possible. A machine outside of the phone cannot make Face ID fail on the phone, because one has absolutely nothing to do with the other.They now suspect that one or more card machines are set up in such a way as to make face ID fail.
Card machines can’t make face ID fail. However, a waiter can press cancel on the device, making someone think it has failed.They had 4 similar reports at this venue since last Tuesday. They now suspect that one or more card machines are set up in such a way as to make face ID fail.
Paying doesn’t require a PIN. Paying can be done with a locked phone and FaceID. On older phones, it can’t be done with a mask, but, now folks should know that pulling down the mask is going to be better than entering their PIN.Bear in mind I was taking work clients out on this night. If, like many suggest, no one should ever input their passcode in public, I would have been unable to pay for the food bill/check.
I think the key is to protect the device. I can tell you my device’s passcode is elmerQ, but there’s not a lot anyone can do with that information without the device.It's going to become even more important than ever to protect your device's passcode in the future as with passkeys the device passcode is the key to the kingdom.
Actually the details of your bank card are likely secure, unless your banking app has the feature that allows the card details to be displayed (you’ve already said you used the same code for both your phone and banking app, so I made the assumption the thief would be able to access your banking app).
Also, if you’ve ever said yes to saving your card details to your device, the thief would be able to see these just from your device passcode (settings, safari, auto fill, saved credit cards).
Well, if the attacker doesn’t have the device, there’s nothing they can do just knowing the PIN. The MOST complex part of this for an attacker is “How do I get the device” as people generally aren’t willing to just hand those over.What Apple has done here is to make the least secure, most entered (in public!), authenticator the primary one. That's a design flaw. It should be the most secure/complex one that's required to reset the easier ones.
It goes to highlight (if it wasn’t already apparent!) how much personal and sensitive data we store on our phones.I have never said I used the same code for my phone and banking apps. I do not.
They accessed two banking apps (one simply via email magic link).
I did have card details saved, but all are cancelled now.
I don’t think the card machine would be able to know whether the payment was authorised by Face ID or passcode, and how it would then know which to fail.
Maybe it was setup in such a way (certain lightning, a particular angle) to make it more likely that Face ID would fail due to how the user was holding the device, and then have strategically positioned cameras to see you type in your passcode to authenticate the payment.
That would certainly be a very well organised criminal activity.
It’s not about being right or wrong, it’s about being as vigilant as you can be, and being aware of the tactics used by criminals to try and obtain your passcode. Criminals will always be trying new ways to steal stuff.