Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

if apple checks an online database for "you authenticated and paired this hardware ID to this apple ID", is that a "Beeper Mini" killer?


isn't that essentially what they are doing? that's one of the reasons a stolen iDevice is pretty much worthless.


What about when the hardware is legitimately sold and reset and a new Apple ID starts using it?


You have to de-register the device with Apple when you sell it. Otherwise you retain the ability to remote wipe and brick the device and the buyer has no recourse.

After you de-register it the buyer can register it with Apple under their Apple ID.


I have Apple devices that are allowed to use iMessage including some that I don't use. If my computer can impersonate one of them to allow me to message from my workstation that's success.


> If my computer can impersonate one of them to allow me to message from my workstation that's success.

But Beeper Mini isn't asking users to bring-their-own valid hardware registered Apple hardware ID tied to their Apple ID, they're doing something different/unknown behind the scenes




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: