This is a very entertaining and educational article, giving insights into the methods used by thiefs to try and get access to your phone data.

I don’t like Apple but it’s great that their security is so good when it comes to this.

  • @[email protected]
    link
    fedilink
    English
    75 months ago

    You are absolutely incorrect. They had remote access and I watched them use it in various ways. When troubleshooting issues they would login and move my mouse and use a virtual keyboard. They could install software remotely on a schedule.

    Not sure why you’re under the impression that an apple account is required for remote management. There’s probably >5 different popular third party software solutions for that

    The apple sign in is an extraneous unneeded piece that once they annoy you into it, it then becomes considered a sign of ownership, which I never considered, because why would I?

    You are right that IT should’ve had a way of dealing with it better, but in their defense this may have been an anti-feature (asking a user to login to iCloud, a service they’ve never used once, is not a feature) added in an update, after they issued the laptop. It’s a small company, so I don’t fault them on it as much as the trillion dollar company with the goal of inflating their iCloud metrics by forcing users to login to it.

    • Fushuan [he/him]
      link
      fedilink
      English
      25 months ago

      Oh, I assumed that you would be forced to type your password or have enough rights to install stuff in a computer, be it in person or remotely, so I assumed that whatever 3rd party program they used required to have enough access, and that apple would use the apple id as a master password, given that it’s what is being used to lock down the device itself.

      Well, yet another issue with apple lol, why add a ownership id if it’s not even what gives root access. Lmao.

      • @[email protected]
        link
        fedilink
        English
        35 months ago

        Nah the iCloud crap is literally just another account. Up until the moment you login to it, then it silently ties the device to that account for “security” purposes. I kept emailing the IT guy back saying I don’t know what I can do, I can see a list of devices here and that laptop has been removed from it.

        After him asking me for help repeatedly I felt I had to just give up, give him the password on a slack call, then immediately reset it once he’d done what he needed.

        • Fushuan [he/him]
          link
          fedilink
          English
          35 months ago

          Apple issue then, quite the anti feature. In any case, I hope the IT team learns from it and they create a company ID or several company IDs so this doesn’t happen again haha.