You can reset the Apple ID password with device passcode.
Ah, good point!
You can reset the Apple ID password with device passcode.
I don't see it say anywhere that a passcode must override the biometrics.I agree, but the 'fix' isn't just an Apple problem, it needs the entire industry, since passkeys are a standard. The entire passkey specification would need to be changed.
"When a user is asked to sign-in to an app or website, the user approves the sign-in with the same biometric or PIN that the user has to unlock the device (phone, computer or security key). The app or website can use this mechanism instead of the traditional (and insecure) username and password."
Passkeys - FIDO Alliance
Payment service providers and banks are evolving service delivery to online payments from physical branches. Using Passkeys for Payments with FIDO’s open and scalable authentication standards offers a faster and easier way to secure online payments.fidoalliance.org
As such, there's nothing for Apple to fix, the system is working as designed until a point at which it is redesigned.
Your device always falls back to your passcode when Face ID or Touch ID fails (apart from specific apps).I don't see it say anywhere that a passcode must override the biometrics.
Either way if it stayed the way it works now passkeys will flop (or never take off) once theft and hacking begins to rise and negative publicity takes over. There is already a precedent for keeping the passcode out of things with banking apps. Perhaps some expansion to disabling pin fallback is in order?
And when setting up screentime I’m also asked to provide an Apple ID (email) and password that can be used to reset the screen time passwords. So what they then need to do is to just ask for a reset of the screen time password and check my email (which is on the phone).First off,
Let me just say I am extremely sorry this has happened to you. I can only imagine the fear and panic you must be going through since this occurred.
The only advice I could possibly give at this juncture is for future reference:
------------------
How to use Screen Time to stop thieves from messing with your Apple ID
To start, head to Settings > Screen Time > Use Screen Time Passcode, if you haven’t set one up already. Make sure it’s not the same passcode you use for your iPhone, since we’re going to assume a thief knows those digits already. Jump to Content & Privacy Restrictions, and choose down to Account Changes. Punch in your Screen Time passcode, then choose “Don’t Allow.”
When you return to the main Settings menu, you’ll find your name is grayed out at the top. Not only have you blocked access to your recovery key settings, you’ve blocked access to anything having to do with your Apple ID.
------------------
I currently use this method, hopefully I never have to find out how good it works...
I hope this method will save you heart ache and headache in the future, friend.
Cheers!
Here is the link to the original article:
How Screen Time Can Save You When Your iPhone Is Stolen
This usage monitoring app can actually help keep your Apple ID data out of a hacker's hands.lifehacker.com
Well… they do because that is usually hidden in the iCloud passwords.From what I can see the screen time PIN can only be reset using your Apple ID & Password. Thieves shouldn’t have access to that.
Allowing Screen Time password to be reset by Apple ID is optional.And when setting up screentime I’m also asked to provide an Apple ID (email) and password that can be used to reset the screen time passwords. So what they then need to do is to just ask for a reset of the screen time password and check my email (which is on the phone).
Easy. My PIN is ten randomly generated digits, and I can remember it just fine.
Have you read the whole story? I think you've missed the point.
Gaining control of the phone itself by knowing the PIN is fair game. No one is disputing that. But gaining control of the entire iCloud account by knowing just a device PIN is an unbelievably, mindblowingly HUGE security flaw. Once you set up a physical key and generate a recovery key, resetting the Apple Id password without at least one of them should be absolutely impossible no matter what.
That's exactly what this thread is about. We know this is the way it is, and we don't like it. Because it's utterly stupid.‘Like it or not, it is the way it is.
You need to have words with the Fido Alliance.That's exactly what this thread is about. We know this is the way it is, and we don't like it. Because it's utterly stupid.
Huh? What does the Fido Alliance have to do with the fact that Apple decided to reset the iCloud password with the device PIN to make it more convenient to careless users?You need to have words with the Fido Alliance.
The Fido Alliance designed the passkey standard, which appears to be what Apple are using to authenticate access to iCloud.Huh? What does the Fido Alliance have to do with the fact that Apple decided to reset the iCloud password with the device PIN to make it more convenient to careless users?
‘Like it or not, it is the way it is.
Awesome! The setup process for screen time was just pretty insistent/nudging me to setup reset with Apple ID.Allowing Screen Time password to be reset by Apple ID is optional.
From earlier posts in this thread my understanding is that even if you do allow this, the reset process puts a useful delay in the process, it is not an instant reset.
Is there? I tried this, and selected NOT to use my Apple ID to reset the Screen Time password, but when I went back into screen time and selected to change the password, then clicked on "forgotten?" it STILL prompted me to enter and then reset (with my phone PIN only) my Apple ID password. *Awesome! The setup process for screen time was just pretty insistent/nudging me to setup reset with Apple ID.
Now at least there’s an extra step and code they need to lure to do anything
I have read the entire thread and not see anyone produce any evidence that a Screen Time password doesn't solve the problem.
Also tested on my iPhone.
You have the option of allowing Apple ID to recover the screen time passcode and it seems enabling this puts a crucial delay in the thief's ability to unlock screentime Hence take control. If you don't enable this I assume the thief is stopped.
Yes it is inconvenient if you want to do anything with your Apple ID but I dont do that often.
If the above is incorrect please give details.
No, it is not.
TBH, if you lack security awareness, thieves will find another loophole with the newer process. It’s a cat and mouse game, and unfortunately, not many options exist if users don’t have basic opsec awareness. I hope Apple gives an additional safety layer with confirming change of password from a second trusted device or makes user enter password if there isnt another trusted device as an option, for those who enter passcodes in public.That's exactly what this thread is about. We know this is the way it is, and we don't like it. Because it's utterly stupid.
How is having to type the existing password going to help? The most likely reason someone is resetting a password is because they’ve forgotten it! You can’t have the old password as a requirement to change the password.TBH, if you lack security awareness, thieves will find another loophole with the newer process. It’s a cat and mouse game, and unfortunately, not many options exist if users don’t have basic opsec awareness. I hope Apple gives an additional safety layer with confirming change of password from a second trusted device or makes user enter password if there isnt another trusted device as an option, for those who enter passcodes in public.
One can learn from the mistakes, be more aware or shift the blame.
The thief didn’t fail authentication, they entered the correct passcode.Sucks for the original poster that Apple didn’t at least have a 3-day hold period with any failed authentication. That would’ve given him time to wipe the phone remotely and brick 🧱 the phone as well.
For cases like this Apple needs to implement a hold period before any changes can happen. Apple also needs to implement verifying of emergency contacts to make any changes.
Apple makes it too easy for thieves with a passcode
Oh ok I missed that part. Why couldn’t Apple work with the customer to get back control of his Apple ID account as long as he verified proof of purchase of the device and other important information that the thief would not know?The thief didn’t fail authentication, they entered the correct passcode.
The problem here is ability to reset iCloud account with just the passcode. Some have concern about the passcode and device safety in public. Adding an extra optional layer of entering password will prevent a thief from using passcode to reset iCloud account, and ability to mark the device as stolen/wipe the phone.How is having to type the existing password going to help? The most likely reason someone is resetting a password is because they’ve forgotten it! You can’t have the old password as a requirement to change the password.
Apple could implement an additional security layer to change anything by having the person verify something that the thief would not know like a emergency contacts full name and phone number.The problem here is ability to reset iCloud account with just the passcode. Some have concern about the passcode and device safety in public. Adding an extra optional layer of entering password will prevent a thief from using passcode to reset iCloud account, and ability to mark the device as stolen/wipe the phone.
For those forgotten password users, use a trusted second device to reset with just pass code. If there is no second device, make the password as optional. Let people chose, if the user is concerned about pin and theft of device, use an optional step requiring iCloud password.
It doesn’t have to be all or nothing, but adding this extra step is no guarantee, the thieves will figure out another creative way. Bottom line, security of physical device and keeping the passcodes/passwords safe is user responsibility.
To all intents and purposes Apple only knows that an account belongs to a particular person because that person has the access and the account settings might contain some of their personal details.Oh ok I missed that part. Why couldn’t Apple work with the customer to get back control of his Apple ID account as long as he verified proof of purchase of the device and other important information that the thief would not know?
You might have a concern, but unfortunately, it is by design that the iCloud password can be changed using a trusted device’s passcode. This is also likely the future of how we login and access more and more services so the lesson is to protect your device passcode.The problem here is ability to reset iCloud account with just the passcode. Some have concern about the passcode and device safety in public. Adding an extra optional layer of entering password will prevent a thief from using passcode to reset iCloud account, and ability to mark the device as stolen/wipe the phone.
For those forgotten password users, use a trusted second device to reset with just pass code. If there is no second device, make the password as optional. Let people chose, if the user is concerned about pin and theft of device, use an optional step requiring iCloud password.
It doesn’t have to be all or nothing, but adding this extra step is no guarantee, the thieves will figure out another creative way. Bottom line, security of physical device and keeping the passcodes/passwords safe is user responsibility.