To double-check, head to the General menu in Settings, then tap "About" and look for the iOS version number - if it's higher than 8, you're good to go. The hack only works on iOS 8 or lower, so if you've accepted an update in the past two years, you're already protected from this lock screen bypass method. Updating your phone's firmware is the easiest way to protect yourself from doulCi. So far, the hackers claim that over 15,000 devices have been unlocked using this technique. Six iPhones that were hacked using the doulCi technique. This hack, available at the doulCi website (iCloud (almost) spelled backwards), appears to change your DNS for the connection to iCloud so their server can intercept the Activation Lock request, and then responds with the proper message to unlock the device. Method 4: Tricking iCloud with a Fake ServerĪn anonymous hacker by the name of AquaXetine found an exploit in Apple's iCloud system that lets anyone unlock a lost or stolen iPhone running iOS 7 or above, and Apple has yet to fix it. This means that none of your personal files, such as contacts, messages, and photos, will be available to them. On the bright side, your data is safe regardless, because if a thief uses this method, they won't be able to log back in with your Apple ID unless they know the email address and password. That way you cannot only track where the iPhone is, but also remotely delete all the information on it. What you can do is to make sure that Find My iPhone is turned on. It's tough to protect yourself from a hard reset, especially if your phone is stolen. Protecting Yourself from iTunes Restorers After that, just make sure to log in with your Apple ID and password, then everything that's been backed up will be restored automatically. This will take off the passcode, but will delete everything on the phone.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |