What happens if the Apple Watch is lost or stolen?

  apple-watch-2

One of the most recurring themes this week has been discovering that the Apple Watch does not have a good security system in case of theft or loss of the wearable. Yes, it is true that if we have the clock configured with a code, no one except us will be able to access our data and other information. But when we talk about Apple products we all know how sweet they are for 'the friends of others' and in this case Apple does not implement a system in the watch to make it unusable in the event of theft or loss.

This is an issue that worries the lucky users who already have the new Apple Watch on their wrists and who see how to carry out a few simple steps and without the need for an Apple ID or similar restoration steps as in the iPhone, iPad and iPod Touch, are able to leave the watch restored from origin and make it work without problems.

apple-watch-1

Apple has been investing in this sense for a long time and it is true that the decline in thefts of devices with iOS has decreased after these security measures, the new watch of the Cupertino boys does not add more than a protection for our data through a code , It is very true that it protects us all personal data and others, but it does not prevent the use of it in case of theft or loss.

Apple is already working on it

As a result of this, Apple is already at work so that in the next update of the watch software, the user and password of the owner will be asked in case you want to carry out a restoration of the same. Apple knows that doing this maneuver closes the door a little to the 'friends of others' and users will be calmer.

It is possible that during WWDC 2015 the first official update appears of the operating system and in it a system is added that prevents the restoration of the clock without a password or previous step.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.