home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.sys.mac.advocacy      Steve Jobs fetishistic worship forum      120,746 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 119,870 of 120,746   
   Maria Sophia to Tyrone   
   Re: Why does iOS ask for your passwd eve   
   07 Jan 26 20:28:12   
   
   XPost: misc.phone.mobile.iphone   
   From: mariasophia@comprehension.com   
      
   Tyrone wrote:   
   >> I strongly suspect you gave the password when asked, and since that's   
   >> perfectly natural for you to do, you don't remember doing it when you did.   
   >   
   > Stop assuming I am stupid.  It is fucking insulting.   
   >   
   > You claim that "All day, every day, iOS nags me to sign in even though I   
   never   
   > logged out."   
   >   
   > That has NEVER happened to me. Ever. On ANY of my many iOS devices. Over MANY   
   > years.  Do you understand that?   
   >   
   > I strongly suspect that you are a lying piece of shit.   
      
   Hi Tyrone,   
      
   Happy New Year!   
      
   I'm going to ignore Chris' excuse that he doesn't know what his password   
   is, and I'll ignore Alan Baker's excuse that he wants to see the popup   
   every day that I've seen it (which is every day, all day, many times a   
   day), both of which I've addressed in this thread I just authored.   
    Newsgroups: misc.phone.mobile.iphone   
    Subject: Why do zealots fabricate inane excuses for Apple's documented   
   behavior?   
    Date: Wed, 7 Jan 2026 19:54:15 -0500Message-ID:   
   <10jmv7o$bto$1@nnrp.usenet.blueworldhosting.com>   
      
   For you, since you say you're not stupid, I will respond with information   
   about Apple's documented authentication process so that you can learn more.   
      
   To help you understand, I've provided references for you to read before you   
   reply to this technical post as it will take time to digest how iOS works.   
      
   Technical summary of iOS authentication escalation   
      
   1. Overview   
   In this scenario the user is already logged into everything. The user has   
   completed initial setup, signed into Apple ID, iCloud, App Store, iMessage,   
   FaceTime, Find My, and all related services. The user is not logged out.   
   The user is simply refusing to re enter the Apple ID password when   
   prompted.   
      
   Keep in mind that iOS does not rely on a single login event.   
   It relies on many independent authentication tokens issued by Apple   
   servers. These tokens expire on different schedules.   
      
   When the user refuses to re authenticate, the device cannot refresh these   
   tokens. Over time, the device enters progressively more severe   
   authentication failure states. The final state is an Activation Lock   
   escalation that requires in person identity verification.   
      
   2. Why the escalation takes so long   
   Each Apple service has its own token, its own refresh interval, and its own   
   retry logic. These services do not fail at the same time. They fail in   
   stages.   
      
    a. Short lived services retry often and fail first   
    b. Medium lived services retry less often and fail later   
    c. Long lived services retry rarely and fail last   
      
   Important nuance:   
   Short lived tokens do expire in hours or days, but their expiration does   
   not always trigger a visible password prompt. Many token failures are   
   handled silently. iOS retries these tokens in the background. Only certain   
   failures escalate to a visible password prompt. This is why the user does   
   not see a prompt every time a short lived token expires.   
      
   The system is designed to tolerate temporary outages. Only long term   
   refusal to authenticate causes the full escalation.   
      
   3. Apple account subsystems and token lifetimes   
   Apple maintains multiple account subsystems. Each subsystem has its own   
   tokens and its own expiration schedule. Apple does not publish exact token   
   lifetimes, but the behavior is known from observation and from Apple   
   documentation that confirms independent authentication for each service.   
      
    a. Apple ID core identity tokens, long lived, months to years   
       Controls device ownership, Activation Lock, and account integrity.   
       Apple ID overview:   
          
      
    b. iCloud account tokens, medium lived, weeks to months   
       Controls iCloud Drive, iCloud Backup, iCloud Mail, and iCloud Photos.   
       iCloud overview:   
          
      
    c. App Store and purchase tokens, medium lived, weeks   
       Controls app downloads, updates, and purchase validation.   
       App Store sign in requirements:   
          
      
    d. iMessage and FaceTime tokens, short lived, hours to days   
       Controls messaging identity and session state.   
       These often expire silently and retry silently, so they do not   
       always trigger visible prompts.   
       iMessage and FaceTime activation:   
          
      
    e. Find My device association tokens, long lived, months to years   
       Binds the device to the Apple ID for anti theft protection.   
       Find My and Activation Lock:   
          
      
    f. iCloud Keychain escrow tokens, long lived, months   
       Controls end to end encrypted keychain syncing.   
       iCloud Keychain:   
          
      
    g. Device Setup Services tokens, long lived, months   
       Controls device registration and trust state.   
       Device activation requirements:   
          
      
    h. APNs account validation tokens, short lived, hours to days   
       Controls push notifications for account alerts.   
       These also expire silently.   
       APNs overview:   
          
      
   4. Timeline of token expirations   
   The following timeline reflects typical behavior when the user refuses to   
   re-enter the Apple ID password.   
      
    a. First week   
       Short lived tokens expire. iMessage and FaceTime may deactivate.   
       APNs account alerts may fail. These failures often occur silently.   
       The user may see some password prompts, but not necessarily one   
       per token expiration.   
      
    b. First month   
       Medium lived tokens expire. iCloud Drive, iCloud Mail, and   
       App Store tokens fail. App updates may stop. iCloud services   
       may show errors. Visible password prompts become more frequent.   
      
    c. Three to six months   
       Long lived tokens begin to expire. Find My association tokens   
       may fail to refresh. iCloud Keychain may stop syncing.   
       Device Setup Services may report account verification errors.   
       Password prompts become persistent.   
      
    d. One to two years   
       Very long lived tokens expire. Device to Apple ID binding tokens   
       and Activation Lock ownership tokens cannot be refreshed.   
       The device enters a security critical state. The server classifies   
       the device as having an unverified owner.   
      
    e. Activation Lock escalation   
       The device is placed into a hard lock state.   
       The user must verify identity in person.   
       My Apple store requires government ID to prove Apple ID ownership.   
       (ask me how I know that)   
      
   5. How Activation Lock decides when to hard lock   
   Activation Lock is enforced by Apple servers. It is tied to the Apple ID,   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca