Activation Lock, an anti-theft security system, arrives on Apple Watch

activation-lock-apple-watch

In autumn, a new version of the operating system, the Watch 2. It does not include a complete redesign of the interface, but what has been done is adding new functions and improvements that make it more stable. In yesterday's Keynote many new features were shown but others were in the limelight and it is today, on the Apple website where we can see more news that watchOS 2 will implement.

The functionality that we are going to talk about in this article is related to the security of the watch itself and is that in watchOS 1 there is a total absence of a security layer as it was introduced with the arrival of iOS 7 and that has made thefts of iOS devices decrease considerably. We talk about Activation Lock, a system that allows the Apple Watch to be used again if it is lost or stolen, the Apple ID is necessary.

The Activation Lock will arrive in autumn with watchOS 2, for now the only security method that Apple Watch has the presence of our wrist, so that when it detects that it has been released requires a four-digit security code to unlock it and access our content.

Apple-Watch-Updating

Now, as we have told you, Apple confirms on its own website that in the next version of watchOS it will have this new layer of security to prevent anyone from using our Apple Watch. Now just by restoring it to factory it can be used on another iPhone however with Activation Lock it will be necessary to use the Apple ID as in iOS.

As data we can inform you that with the arrival of this security layer in iOS 7, Apple has achieved that the theft of iOS devices in San Francisco has decreased by almost 50%, a very good figure counting how palatable this type is of appliances.


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.