Joke Collection Website - Public benefit messages - What is the principle of those people who know Apple id on Taobao?

What is the principle of those people who know Apple id on Taobao?

In fact, hundreds of merchants gathered on Taobao who claim to be able to unlock the touch ID currently mainly provide "soft solution" services. But their service attitude is very blunt, and they don't want to talk more about how this "soft solution" is carried out.

What is the mystery of locking the screenshot of the interface? Let's take a look at popular science first. ID locking can be divided into the following two situations:

1, lost mode. After activation, the mobile phone shows: This iPhone has been lost, please contact xxxx (a mobile phone number appears on the screen).

2, activation mode, the phone only shows: please log in to this iPhone with Apple ID. (The registration email will appear on the screen).

The difference between the two modes depends on whether the owner logs in his ID to report the loss. So according to different situations, the content displayed on the mobile phone is also different.

Because Pphone's heart is full of nostalgia for the former owner, it only accepts the password agreed with the owner. Therefore, the most direct way to make this "loyal" mobile phone mutiny is to replace its brain memory chip and make it forget all passwords and previous storage contents. However, Apple's security mechanism is not so gullible. Multiple chips in an iPhone will authenticate each other, and there is no way to pass the verification just by replacing the memory module.

These chips are firmly packaged on the main board of the mobile phone and need to be heated by professional equipment before they can be taken out. Moreover, the installation of new chips also requires micron-scale fineness, and basically a microscope is essential. With the increasing accuracy of iPhone, it is more and more difficult to disassemble components. Even skilled technicians, a little carelessness will lead to the scrapping of mobile phones.

A simpler method is that Taobao shopkeepers send phishing emails to the original shopkeepers to trick them into entering their passwords, and then successfully unlock them. However, with the gradual improvement of users' anti-fraud awareness, the probability of realizing this method is getting smaller and smaller.

Therefore, it is best not to consider this kind of machine, which is also considered as selling stolen goods to some extent.

Generally Taobao ID requires you to provide a screenshot of the lock screen of the mobile phone serial number IMEI. Hackers have a huge database. They first use the database to carry out violent attacks, attack mailboxes, or repeatedly verify passwords. I haven't seen it, but I've seen that kind of software. It's membership. They have many password databases of qq numbers. After sampling and analysis, they can calculate the password. They will attack your mailbox and Q space first.

This is illegal and many people have been arrested. Don't imitate Lao Tie, return the phone to the owner as soon as you find it. Don't be too young to do it. It's not a good thing to find the mobile phone, but it's a good thing for you to return it to the owner. To put it bluntly, you are working hard now. Do you need that 8800 yuan? Maybe many people think it's ridiculous. I lost a lot of machines and no one returned them. When I find them in my mind, I am balanced. All wet.

It's a mistake to unlock the phone. Although it is not illegal, the owner will feel uncomfortable. But now some people in society, friends who found their mobile phones want to return them, but they were framed and stolen in the opposite direction, which also makes people who found their mobile phones feel chilling. There is less suspicion between people, and I think this society will make great progress. Right, old iron?

Also, after you provide IMEI, they will find out the personal information of the owner of the mobile phone and the complete email address of the mobile phone. I don't know how to do it, and then they will send phishing messages and emails to the owner to guide the owner to enter the id password to cheat.

There is also a collusion with after-sales service and interests to unlock the official, which is also illegal. In recent years, many people have been arrested and imprisoned for this kind of thing.

For the sake of your id security, open first, id two-way verification binds your own password, and qq mailbox sets an independent password. Don't click on inexplicable links, remember to delete spam and don't read it.

Liar! Liar! ! ! This is the so-called understanding of apple ID. The only thing that proved to be an affair!

How to cheat? When you lose an Apple phone, you will remotely set it to lost mode, right? When you set the lost mode, when your mobile phone is turned on and connected to the network, it will display the following words: This iPhone has been lost, please contact XXXXXX, and then the person holding your mobile phone will know the registered mobile phone number or email address of this mobile phone, and then these so-called unlocking ID people on Taobao will send you some deceptive information by email or SMS. The usual practice is to impersonate you as an official of Apple and send you a message saying that your mobile phone, always online, appears somewhere. When you see such a message or email, you will believe it. As long as you follow the link given by email or SMS, a phishing website similar to Apple official website will appear, allowing you to enter your apple ID and password ... It goes without saying that your ID and password will be cheated by scammers. Then the liar will unlock and erase the iPhone in the fastest way, and then the iPhone will be successfully washed white. Because most people are not very clear about Apple's protection mechanism, they are usually deceived by these fake emails or text messages, so the success rate of this deception is also quite high ... so remember that Apple officials will not send you any text messages or emails. Never click on any links in these messages or emails and log in to your Apple id. If you encounter these emails, you'd better manually enter the address of Apple official website or iCloud, so as to ensure that you won't be cheated! ! !

In fact, for old or low-priced Apple phones, most businesses are too lazy to unlock them. One reason is that the cost is too high, and the other reason is that it is too troublesome to solve the Apple id. Generally, Apple phones with id are directly disassembled and then accessories are sold. Even if it is a new machine, many people would rather disassemble the parts and sell them directly than unlock them. This is a prerequisite for unlocking the Apple id.

Then talk about the unlocking principle on Taobao.

In the first way, they will pretend to be an official, and then send phishing messages to let the owner log in to the mailbox to defraud the owner's id password. Of course, this method has low cost, little technical content and the highest profit, but the success rate is hard to say.

The second is more troublesome, which is hardware decoding. Apple id is based on IMEI and SN codes on mobile phones, but these codes exist in baseband and hard disk. So the method is very simple, nothing more than replacing a baseband and hard disk without an id. But the problem is that the hard disk of the mobile phone is connected with the cpu, and it is often necessary to remove the cpu when changing the hard disk. Of course, removing it is only the beginning, and the baseband, hard disk and cpu have to be soldered again. Needless to say, this change will basically change the original stability of the mobile phone and it can be used, but it will also affect the future experience.

The most important thing is that if you want the merchant to replace the components for you, the charge is very high. Instead of this, it is better to get a new mobile phone.

First, use various methods to defraud the original master password, because there is an id mailbox on the screen, you can contact the original owner and pretend to be an official to give a fake website that the mobile phone has found a liar to let the original owner verify the password.

Second, if the mailbox is not easy to cheat, make a phone call. The same method is to phishing fake websites where mobile phones are found or where mobile phones appear.

Third, you can't edit it, you can only replace the baseband, cpu and hard disk, that is, move the whole set into a brand-new id-free mobile phone and reactivate it. The cost is about 600.

It's true! Until someone else unlocks it! It seems to be a remote processing aid. How to unlock it is unknown without in-depth understanding!

In fact, there are two ways to unlock an id lock on a treasure, soft solution and hardware decoding.

Soft solutions are divided into software hiding, deception cracking, violent cracking, Trojan virus cracking and so on.

Software cracking refers to temporarily hiding the id account through some software when the mobile phone can still enter the desktop and is not locked, thus achieving the purpose of deceiving consumers. This is just a superficial cover-up. In fact, the id still exists. Once the phone is swiped or all data is erased, it will be locked.

Deception, Trojan virus, violence and other cracking means that the mobile phone has been locked and cannot enter the desktop, so merchants can find the complete id account of the mobile phone in some abnormal ways, and then induce users to click to gain control over the id account mailbox by sending fraudulent emails and Trojan virus programs to the id mailbox, and then retrieve the id password and unlock it through the mailbox. Violent cracking is to pass the password of the mailbox directly by violently cracking the id mailbox.

However, the above means may be used to steal id account passwords in previous id accounts and mobile phone systems, but now Apple has implemented the latest security strategy for id accounts, "two-step verification and double verification". These two security mechanisms can only use the id management function through online verification or SMS verification of trusted devices when logging in the id account, so even if the id account mailbox is stolen, the id account cannot be operated, and thus it cannot be unlocked.

Another kind of unlocking is the so-called hardware decoding, which is to achieve the purpose of unlocking the mobile phone by replacing the hard disk kit chip of the mobile phone. This method can really unlock the mobile phone id, but the disadvantage is that the price is relatively high, and there are some sequelae, because the solder chips in the mobile phone repair shop outside are all low-temperature tin, and there is no technology for soldering high-temperature tin. Apple's mobile phone motherboard uses high temperature tin. The difference between the two is that the high-temperature tin can withstand the high-temperature heating and vibration of the mobile phone, and there will be no virtual welding (solder joint separation). Low temperature tin is just the opposite. Once the mobile phone is heated or bumped at high temperature, there will be virtual welding, which will lead to the abnormal use of the mobile phone.

I changed the baseband, it seems that the hardware for controlling id is directly changed to unlocked, and then your mobile phone becomes a demon machine that can be used, but it is easy to get dark disease. It depends on providence. What I know is that Apple 4s heard that the new version of Apple is not easy to solve.

The fbi can't solve the problem, but there are too many fools

Those IDs on Taobao are real, but it depends on the version of his mobile phone or what mode he uses after losing his mobile phone. After losing the mobile phone we used from Apple, his other mobile phone login ID can be operated. This mobile phone can locate or erase all the contents of the lost mobile phone or give an alarm, so that the mobile phone can give an alarm.

Solving the ID problem can definitely be solved, but it depends on the version of the mobile phone. If you meet a particularly powerful expert, he will be able to solve the ID no matter what version. Like ordinary people, he will solve the ID by dividing the mobile phone system. For example, your mobile phone is 13 o'clock, and the system of 14 o'clock is divided into these systems. Then some people, when solving the ID, will ask you whether the time is displayed in the upper left corner or the lower right corner when the screen of your mobile phone is locked. It will ask this question or slide the screen. He relies on this to analyze what system your mobile phone is. I only borrowed it once, and I couldn't find the first person to solve it. Only received 150.

I started looking for two people to understand the mobile phone, and I wanted to sell it at that time. When it was not untied, it could only be sold for 450 yuan. After I untied it, I paid the unlocking fee of 150 yuan, and then I can sell it directly to 1500 yuan. This difference is really a direct difference of 1 000 yuan. If I untie it, I will remove 1 0,000 yuan. You may know why people can untie it. Programmers all know that programmers earn a lot of money. They are all program engineers, relying on computers to unlock and crack the system, and then successfully unlock the ID.

So when you suspect that you can't unlock the ID, you can learn about the hackers who broke the security wall of other people's computer systems. You can learn about this.