• smeg@feddit.uk
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    If you have physical access to a device you can eventually do whatever you want with it, depends how organised the thief is

    • frazorth@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      I would be curious to learn more, as this is a much touted security feature. If it’s that easy to bypass then we need to understand the limitations.

      Do you have any more information on this?

      • dotslashme@infosec.pub
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Not an expert in any way, but I would assume it is similar to having physical access to a computer. You would not be able to get into the existing device or retrieve data, but if you have stolen it and just to use the device, there are numerous tools to allow side loading of new blobs, that will bypass any restrictions.

        • 520@kbin.social
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          In theory this is true, in practice the protections Apple puts in place tend to put even games consoles to shame. That plus the quick turnaround of iPhone hardware means by the time it is cracked, it was already obselete