home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.sys.mac.advocacy      Steve Jobs fetishistic worship forum      120,746 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 119,880 of 120,746   
   Maria Sophia to All   
   Re: Why does iOS ask for your passwd eve   
   08 Jan 26 13:56:19   
   
   XPost: misc.phone.mobile.iphone   
   From: mariasophia@comprehension.com   
      
   Hi Chris,   
      
   Thanks for the reply as the topic here is how iOS really works, when, we   
   all are now aware that no other common consumer OS works this way at all.   
      
   To flesh out how iOS really works, I will respond to your points factually   
   and precisely.   
      
   Note this is the beginning of the activation-lock cascade only Apple does:   
    Jan 7/8 2026    
      
   And note, only Apple 'bricks' the device (over time) if you refuse to   
   re-enter passwords for accounts that you never logged out of.   
        
      
   Note: Apple will unlock the 'bricked' device but I had to manually visit   
   the Apple Store and present government ID to prove to Apple who I am.   
      
   > This is 100% a you problem. You choose to do that and thus get the   
   > repercussions. You claim you're logged in, but if you don't authenticate,   
   > you're not.   
      
   This is mixing two different concepts. Logged in state on the device is   
   not the same as having valid server side tokens. iOS maintains local   
   session state separately from Apple ID token validity. A user can be   
   fully logged in, using the device normally, while individual service   
   tokens expire in the background. That is why the system can ask for the   
   Apple ID password even though the user never logged out.   
      
   This is not my opinion. It is how token based authentication works.   
      
   > Token expiry is not unique to iOS. It's the bedrock of MFA. My work   
   > systems (MS authentication based) prompt me constantly and especially if   
   > they spot a change in behaviour.   
      
   Correct that token expiry is not unique to iOS. What *is* unique to iOS   
   is the way Apple ties multiple independent service tokens to a single   
   Apple ID trust state and then escalates failures across services when   
   tokens cannot be refreshed.   
      
   Only Apple 'bricks' the users device (i.e., Activation Lock).   
         
      
   Windows, macOS, Linux, Android, and ChromeOS all use token expiry, but   
   none of them lock the device or escalate to an ownership verification   
   state simply because cloud tokens expire. They only degrade the cloud   
   service. iOS is the only mainstream OS where cloud token expiration can   
   eventually lead to a device level trust failure.   
      
   > All trigger an MFA request.   
      
   Correct. And on iOS, some Apple ID tokens cannot be refreshed silently.   
   When one of those expires, the system must ask for the password. Every   
   user sees this initial prompt eventually. Most users enter the password   
   immediately, which resets all expired tokens and prevents further   
   escalation.   
      
   The only difference in my case is that I deliberately refused to enter   
   the password for months and years on test devices. That is why I reached   
   the deeper failure states that normal users never see.   
         
      
   I did that to LEARN how iOS truly works, Chris.   
   I feel you should be commending me for TEACHING you how iOS truly works.   
      
   No other common consumer OS vendor 'bricks' your device this way.   
   Just Apple.   
      
   Why?   
      
   > This is not "how iOS works" it is how MFA works.   
      
   MFA explains why a password prompt appears. It does not explain the   
   entire escalation sequence. The escalation sequence is specific to iOS   
   because:   
      
   1. Each Apple service maintains its own authentication state.   
   2. These states expire on different schedules.   
   3. Some tokens can refresh silently, some cannot.   
   4. When a non refreshable token expires, the system must prompt.   
   5. If the user refuses long enough, more tokens expire.   
   6. When long lived ownership tokens expire, the device is classified as   
      unverified and Activation Lock is triggered.   
      
   This is not generic MFA behavior.   
   It is the specific way Apple designed its trust model.   
      
   In summary:   
      
   1. Token expiry is universal.   
   2. The multi layer cascade across services is specific to iOS.   
   3. The device level trust failure after long term refusal is specific to   
      iOS.   
   4. Every user sees the initial password prompt. Most users enter the   
      password and never see the deeper layers.   
      
   My testing simply followed the same process to its logical end point.   
        
      
   If you disagree with any specific technical point above, please indicate   
   which one and provide the alternative model you believe iOS uses.   
   --   
   There are two kinds of people who use computers, the main group being   
   people who use them yet they never try to understand how they really work.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca