Iphone: activation lock. How to check and unlock?

A smartphone is a multifunctional device that stores an abundance of information so important to its owner. This data must certainly be under the strict protection of modern encryption methods.

iphone activation lock

Protecting user data and protecting devices from malicious users has always been Apple’s primary goal. This is the main principle of the company, which is the cornerstone in its foundation, which the corporation has managed to maintain to this day, introducing more and more protective tools. The level of security in iOS has reached an unprecedented level, to the extent that the theft of the phone has become almost meaningless.

What is iPhone Activation Lock?

Activation lock is a protective tool that has become an extension to the previously introduced "Find iPhone" option. An activation lock was introduced into the iOS operating system in 2013 along with the release of the seventh generation of software and was described by the company as an ideal tool against thieves.

Indeed, the California corporation has already managed to report that the number of iPhone thefts has significantly decreased, and those that continue to be committed are no longer accompanied by data loss and falling into the wrong hands.

iphone activation lock how to remove

The question is, can such a seemingly ideal protection system harm the rightful owner of the iPhone? The activation lock, alas, was instantly studied by intruders and is often used for extortion and blackmail.

Principle of operation

If “Find iPhone” is activated on one of the Apple devices, and also uses the seventh generation or newer operating system, all data, including activation information, is transferred to Apple servers and stored there until the “Find iPhone” function is Disabled by device owner. In fact, the device is fully tied to one single Apple ID account . Only the true owner of the device will be able to activate it after the firmware and fully control all the data stored on it and in the digital cloud. No keys are stored at the same time, so even Apple employees will not be able to access the data, which indicates the maximum security of this technology.

Check iPhone Activation Lock

Why might this be needed? First of all, this is important for those who give / sell their gadget to a third party, and, of course, for those who buy the device, as they say, with hands. In the on state, this function can deliver a lot of problems to both the old owner of the device and the new one. Therefore, it is worth making sure that the iPhone activation lock is turned on. You can verify this on the iCloud website by entering the gadget's serial number or IMEI number.

iphone activation lock check

You can also check the lock status by trying to turn on the gadget. At a certain stage, the blocked phone will ask you to enter the password for the Apple ID (which was previously activated on this smartphone).

IPhone activation lock : how to remove protection?

The bottom line is that the activation lock is directly related to the "Find iPhone" function, so you need to disable it. To do this, you must:

  • Go to device settings.
  • Find and select the iCloud subitem.
  • Scroll down and select the "Find iPhone" submenu.
  • Toggle the toggle switch to the off position.
  • Enter your account information for confirmation.

That's all, in a few simple steps you can untie the device from your account. If necessary, this procedure can be done remotely using the iCloud.com website. To do this, you must:

  • Go to iCloud.com.
  • Select "Find iPhone."
  • Find the necessary gadget in the list of devices and remove it from the list.
  • Enter your account information for confirmation.

Pitfalls system

Oddly enough, but such an advanced protection mechanism can go sideways to the end user, both through his own fault and because of fraudsters. First things first.

It’s important to understand that unsuccessful attempts to log in to your account can trigger iPhone security mechanisms. Activation lock will not keep you waiting regardless of whether you forgot your password or if someone else entered it incorrectly. Apple will restrict access to the device until the password is reset.

iphone 5 activation lock

The second problem associated with scammers is somewhat more complicated. Novice ransomware, on various pretexts, forces the negligent users to enter the Apple ID data suggested by the attacker on their smartphone, after which they instantly put it into theft mode and ask the user to transfer a certain amount of money if he wants to use the device again. Naturally, no one needs to pay, since there are at least two solutions to the problem.

Jailbreak protection bypass

If it so happened that access to the iPhone 4 with iOS 7 installed on it was stolen, then you can use the JB iOS utility, which will allow you to regain access to the device, however, in a limited form. The phone will stop working with the SIM card and, in fact, will present something similar to iPod touch. This approach does not work with other models, for example iPhone 5. The activation lock in this case will not be lifted.

Returning device access using Apple tech support

The most effective, honest and legal way to get your gadget back is to call Apple support. You can contact the Russian support service (you can order a call on the official website), but they need evidence that the device was officially purchased. In addition, you need a sales receipt. If one is missing, you must contact the store where the gadget was purchased (the check must be stored in the database for up to 4 years).

iphone activation lock check

In the absence of a check, you can try your luck and contact the American support service. They can be "reached" by calling Skype 1-800-MY-IPHONE. To confirm that you are the owner of the device, you will need to provide IMEI, serial number, answer security questions (very important), know what purchases were made in the AppStore and iTunes Store. In most cases, specialists from the United States meet inexperienced users and return access to the device within half an hour. Alas, Russian technical support cannot boast of such loyalty.

Instead of a conclusion

Regardless of the advancement of the protective mechanisms of the gadget, you should always think twice before committing any suspicious manipulations, and first of all rely on yourself, not on the computer.

Source: https://habr.com/ru/post/K7076/


All Articles