this post was submitted on 06 Jun 2024
904 points (97.8% liked)

Technology

59201 readers
2913 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

This is a very entertaining and educational article, giving insights into the methods used by thiefs to try and get access to your phone data.

I don't like Apple but it's great that their security is so good when it comes to this.

you are viewing a single comment's thread
view the rest of the comments
[–] boyi@lemmy.sdf.org 159 points 5 months ago

the methods used by thiefs to try and get access to your phone data.

It is not about accessing the data but to disassociate the current user from the phone so that the thief can reset the phone or/and it's components for new users.