To enhance user security, Apple has unveiled the Stolen Device Protection feature in the latest version of iOS, version 17.3. This feature aims to thwart phone thieves by enforcing additional layers of biometric security and hindering unauthorized access to vital functions.
Turn on stolen device protection: A crucial step for iPhone users
The Stolen Device Protection setting is pivotal in the latest iOS update, providing users with an additional shield against potential theft. To activate this feature, users need to go to their device settings and enable stolen device protection. Once activated, the system keeps a record of the user's “familiar locations”, such as their home or workplace, and ramps up biometric security measures when the device is used in unfamiliar places.
Biometric security takes center stage: A paradigm shift from passcodes
One notable shift brought about by stolen device protection is the reduced reliance on traditional passcodes. Instead, the feature prioritizes biometric identifiers like Face ID or Touch ID, making it very difficult for thieves to duplicate or bypass security measures. If a theft attempt occurs that involves wiping or resetting the device, wiping Face ID or Touch ID becomes mandatory for confirmation, making passcodes and other backup methods ineffective.
Delaying thieves and protecting Apple accounts: an innovative approach
Protecting stolen devices strategically involves delays in operations related to security settings changes. For example, if a thief tries to change important settings like signing out of your Apple ID or changing your passcode in an unfamiliar place, they'll be subjected to a series of authentication steps. This includes Face ID or Touch ID scans, a mandatory one-hour waiting period, and subsequent biometric verification. Such delays are strategically designed to hamper thieves and provide users with the opportunity to mark their devices as lost, securing their Apple accounts.
Apple emphasizes that when the device is in a familiar location, these additional steps are not required, allowing users to use their device's passcode seamlessly.