home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.sys.mac.advocacy      Steve Jobs fetishistic worship forum      120,746 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 119,953 of 120,746   
   Maria Sophia to All   
   Re: Why does iOS NEVER ask for your pass   
   12 Jan 26 03:52:07   
   
   XPost: misc.phone.mobile.iphone   
   From: mariasophia@comprehension.com   
      
   Those who don't test how iOS works will never understand how it works.   
      
   This describes the tentative full sequence as far as I can figure out on my   
   own as to what happens when a user has no pin, no face id, no fingerprint   
   gimmicks, but is fully signed in to an Apple ID on an iPad and then refuses   
   every Apple ID password prompt thereafter (so as to test how iOS really   
   works).   
      
   1. Initial state   
      The device works normally. The user is signed in to Apple ID. All iCloud   
      services function. App Store updates work. Messages uses iMessage. The   
      device has no local lock because there is no passcode.   
      
   2. First token expiration   
      Apple ID tokens expire on a schedule.   
      When the first major token expires, the system asks for the   
      Apple ID password. The user refuses. The device continues working,   
      but the expired token cannot be renewed.   
      
   3. Service degradation   
      As more tokens expire, iCloud syncing pauses, iMessage falls back   
      to SMS, the App Store refuses updates, and iCloud Keychain disables   
      itself. The device keeps prompting for the password. The user keeps   
      refusing. The device continues to function as a local tablet.   
      
   4. Long term expiration   
      Over months, then years, every Apple ID token on the device ages out.   
      None can be refreshed because the user never enters the password.   
      The device remains signed in, but only in a stale state.   
      Apple servers eventually treat the account session as invalid.   
      
   5. Server side enforcement   
      After roughly two years of continuous refusal, my testing shows   
      that Apple servers stop accepting the stale session entirely.   
      
      When the device checks in after an update or a security event,   
      the servers require full re authentication. The device cannot supply it.   
      
   6. Activation Lock   
      Because the device is still associated with the Apple ID, and   
      because the servers now require authentication before allowing the   
      device to continue, the device enters Activation Lock.   
      
      The screen reports Apple ID disabled.   
      The device cannot finish startup or reach the home screen.   
      Local use does not prevent this because the lock is enforced by   
      Apple servers, not by the device.   
      
   7. Final state   
      The device is effectively unusable until the correct Apple ID   
      password is entered. No amount of daily use, uptime, or local   
      activity avoids this outcome. The only recovery is to enter the   
      Apple ID password online which Apple may refuse due to, I   
      suspect, VPN (but I don't know why Apple online refused it).   
      
   8. At that point, the account is locked semi permanently.   
      You have to visit the Apple store to unlock your own device.   
      And then Apple requires government ID (ask me how I know this).   
      
   Note that this is tentatively how it works.   
   But this doesn't answer the question of WHY it works this way.   
      
   Especially when no other consumer OS works this way (not even macOS).   
      
   The reason iOS behaves this way is that Apple treats iPads and iPhones as   
   cloud managed devices, not as independent computers. The operating system   
   is designed so that the Apple ID is the controlling authority for   
   ownership, activation, and long term authorization. This is different from   
   macOS, which treats the Apple ID as optional and secondary.   
      
   1. Device identity is tied to Apple servers   
      When an iPad is signed in to an Apple ID, the device identity   
      is stored on Apple servers. The device is considered part of the   
      account. Activation Lock is a server side feature, not a local feature.   
      The device must check in with Apple servers to confirm that the account   
      is still valid.   
      
   2. Tokens are the only proof of authorization   
      Apple ID tokens are time limited. They prove that the person using the   
      device authenticated recently. When the tokens expire, the device cannot   
      prove that the current user is still authorized. Apple does not allow   
      indefinite use of stale tokens because that would defeat the purpose of   
      tying the device to the account.   
      
   3. iOS is designed to fail closed, not fail open   
      When the device cannot refresh tokens, Apple does not allow the   
      device to continue as if nothing happened. Instead, the system degrades   
      services, then eventually requires full re authentication.   
      
      If the user refuses, the system does not assume the user is legitimate.   
      It assumes the opposite.   
      
   4. Long term refusal looks like account compromise   
      From Apple servers, a device that refuses authentication for years looks   
      like a stolen device or a hijacked account. The servers eventually stop   
      accepting the stale session. When the device checks in after an update   
   or   
      a security event, the servers demand fresh credentials. If the device   
      cannot supply them, the servers block activation.   
      
   5. Activation Lock is the enforcement mechanism   
      Activation Lock is triggered because the device is still associated with   
      the Apple ID, but the servers no longer accept the stale session. The   
      device cannot complete startup without server approval. This is why the   
      device becomes Activation Locked even though it was never erased or   
      reset.   
      
   6. Why macOS does not behave this way   
      macOS does not tie device activation to Apple ID.   
      Macs can run without any Apple ID at all. Macs do not use Activation   
      Lock as a mandatory part of the startup process. iOS and iPadOS do.   
      This is why the same long term refusal does not brick a Mac.   
      
      iOS devices can run with no Apple ID at all, just like macOS.   
      But the moment you sign in to an Apple ID, the rules change.   
      The iOS device becomes tied to the cloud account, and the cloud account   
      becomes the authority for ownership and activation.   
      
      iOS and iPadOS have Activation Lock built into the startup path.   
      macOS does   
    not. If an iOS device was ever signed in to an Apple ID,   
      Activation Lock   
    can still apply even after signing out.   
      
      A Mac never blocks startup based on   
    Apple ID status.   
      iOS does.   
      
   7. Why other consumer OSes do not behave this way   
      Windows, Linux, and Android do not use server side activation tied to a   
      cloud account in the same way. They do not treat cloud identity as the   
      controlling authority for device ownership. Apple does. This is why the   
      behavior is unique to iOS and iPadOS.   
      
   In summary, the reason this happens is that iOS and iPadOS are designed so   
   that Apple ID is the root of trust for the device. If the user refuses to   
   refresh that trust for long enough, the system eventually locks the device   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca