Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Availability is a key part of security. When Apple can trivially authenticate that this man is the legitimate owner of the device, given he:

1: Bought it 2: Possesses it

I’m not sure how “But it’s not him linked with the Apple ID” is a legitimate reason not to assume him the owner pending any evidence to the contrary. If the man had his laptop stolen by somebody at the post office, who set it up with their own Apple ID, does Apple just shrug its shoulders and go “lol how is this our problem buy another Mac XD”.

Going through an onboarding process does not actually prove ownership, at all. I don’t believe what Apple is doing is actively illegal but it sure smacks of bureaucratic ineptitude.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: