Activation Lock problem could be a web hack

Activation Lock 2

The Apple Activation Lock could have a more serious problem than many thought and that is that after hearing the news of its closure for no apparent reason, the first signs point to a possible hack of the web and this would be the reason why it has been decided to close Activation Lock without saying a word. No one from the company has explained or commented on what happened and it cannot be confirmed that this is the reason for the closure, but we find it strange that a service that worked perfectly for users was closed for no apparent reason.

According to the website MacRumors, the guys from Cupertino could have closed this website to prevent hackers from unlocking locked devices, something that seems impossible for most users but it is not entirely confirmed that this task cannot be carried out. In principle, iPhone, iPod or iPad locked by iCloud require the owner's ID to unlock and hackers could take advantage of the Activation Lock web to unlock them.

Nothing is confirmed as we said at the beginning, but there is even a video in which you can see Apple's own website to perform the first tasks before unlocking the devices, which consist of the "hit - mistake" to see blocked devices, then with another more specific type of work and specific software tools could be unlocking terminals.

It's time to wait for the official version of AppleAlthough it is true that this service was very good for all those users who had the intention of buying a second-hand device and in this way they could check whether or not it was blocked by iCloud. We will wait for events and see if Apple releases an improved service or a tool similar to the one removed in a few days.


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.