Apple trick lets your friend unlock your iPhone in seconds | #ios | #apple | #iossecurity

If you’ve been locked out of your Apple ID and iPhone, a friend can help you get back in.

There’s a special feature called Recovery Contact that lets you nominate people to restore your accounts.

If you’ve been hacked or you’ve found yourself unable to get into your account, it’s the perfect solution.

It’s a new feature built into iOS 15 – the latest software update for your iPhone.

You’ll have to choose a trusted person: a partner, close family member or long-time pal.

This person can help you regain control of your account and devices in seconds.

But be careful: only choose a Recovery Contact that you absolutely trust.

Importantly, you need to set this up before you’ve been hacked or locked out of your account – so don’t wait around.

Make sure you’re using the best security settings on your iPhone.

How to choose a Recovery Contact

First, make sure you’re using iOS 15.

Go to Settings > General > Software Update and make sure the number is version 15 or higher.

If you’ve got any updates pending, install them for the latest security fixes.

You’ll also need to make sure your Recovery Contact also has an iOS or iPadOS device on iOS 15 or iPadOS 15 or later.

This person also needs to using two-factor authentication, and at least 13 years old.

Then go to Settings on your device, and choose Apple ID at the top below your name.

Go into Password & Security and then choose Account Recovery.

From there you can tap Add Recovery Contact to choose someone.

You can then send that person a message (which is editable), letting them know they’re your Recovery Contact.

Send it and you’re done.

The Contact will need to go into Settings > Apple ID > Password & Security then choose Account Recovery.
Barcroft Media via Getty Images

How to recover an account

If you are hacked, you’ll need to get in touch with your Recovery Contact.

The Contact will need to go into Settings > Apple ID > Password & Security then choose Account Recovery.

They’ll be able to generate a Recovery Code that can be used to reset a compromised device.

This story originally appeared on The Sun and was reproduced here with permission.

Original Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

sixty one − fifty three =