Also, jailbreaking stolen tech to sale is more trouble than it’s worth. Doubt the smash and dash thefts aren’t the ones calling the shots but most modern tech is little better than strapping a GPS to yourself.
As somebody that picked up an old iPad from a thrift store where owner had not removed their account, factory refreshing it is a hard if not an impossible task.
Even the sketchy tools weren’t great, you could boot it to a state of new user use, but a power off and back on you are locked out again.
And they don’t give you enough of the previous users email to be able to track them down and say “Hey, either I found your stolen iPad, do you want it back, or can you remove your device from your apple ID”
If Brett Johnson is right, they totally are using sketchy tools from online. Unless they gained access via rogue Apple repair license.
I would assume NSA types have better tools with help from Apple, but the device is quite well locked down to the piblic. I say that as a guy that installed Linux on my Wii, and hacked my home smart plugs and lights so I don’t have to use the manufacturers shitty telemetry apps.
Also, jailbreaking stolen tech to sale is more trouble than it’s worth. Doubt the smash and dash thefts aren’t the ones calling the shots but most modern tech is little better than strapping a GPS to yourself.
As somebody that picked up an old iPad from a thrift store where owner had not removed their account, factory refreshing it is a hard if not an impossible task.
Even the sketchy tools weren’t great, you could boot it to a state of new user use, but a power off and back on you are locked out again.
And they don’t give you enough of the previous users email to be able to track them down and say “Hey, either I found your stolen iPad, do you want it back, or can you remove your device from your apple ID”
To be fair I don’t think the actual organizations doing this type of crime for a living are using sketchy tools they found online.
If Brett Johnson is right, they totally are using sketchy tools from online. Unless they gained access via rogue Apple repair license.
I would assume NSA types have better tools with help from Apple, but the device is quite well locked down to the piblic. I say that as a guy that installed Linux on my Wii, and hacked my home smart plugs and lights so I don’t have to use the manufacturers shitty telemetry apps.
Brett Johnson 39 felonies for cybercrime https://darknetdiaries.com/episode/128/