	{"id":32410,"date":"2021-04-06T00:54:19","date_gmt":"2021-04-06T07:54:19","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=32410"},"modified":"2021-05-05T03:21:12","modified_gmt":"2021-05-05T10:21:12","slug":"want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/","title":{"rendered":"Want to Buy a Secondhand iPhone? Here&#8217;s How to Check if it was Stolen"},"content":{"rendered":"<p><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-600.jpg\" alt=\"\" width=\"1280\" height=\"810\" class=\"aligncenter size-full wp-image-93396\" \/><\/p>\n<p>iOS and iPadOS has a feature called activation lock, which is designed to protect your devices in case of loss or theft. Together with the Find My app, activation lock allows you to prevent anyone else from using your device. <\/p>\n<p>When you turn on Find My on your device, information about the device, linked to your Apple ID, is stored on Apple&#8217;s servers. No one can access your device without your device passcode or Apple ID password. If you use the Find My app to mark your device as lost, the screen is locked, and no one can access the device without its passcode. And you can use Find My to remotely erase your device as well, to ensure that all your data is protected.<\/p>\n<p>This is a great way to protect your devices, but what if you&#8217;re thinking of buying a used or secondhand iPhone or iPad, and want to check whether it has been locked to another user <em>before<\/em> you hand over any cash? Apple used to have a website where you could check whether activation lock was enabled on a device, but they removed that. Apple offers <a href=\"https:\/\/support.apple.com\/HT201351\">instructions for disabling activation lock<\/a>, but if you buy a used device, these won&#8217;t help you, because they require the original owner to turn this off.<\/p>\n<h3>How to check if activation lock is enabled<\/h3>\n<p>While Apple no longer provides a way to check the activation lock, there are a number of third-party websites that can check for you. I tried one, <a href=\"https:\/\/imeicheck.com\">imeicheck.com<\/a>, and it shows that my iPhone activation lock is enabled. <\/p>\n<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock.png\" alt=\"\" width=\"400\" class=\"aligncenter size-full wp-image-93392\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock.png 698w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-300x227.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-150x113.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-657x496.png 657w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/p>\n<p>To check the activation lock, you&#8217;ll need to have either your iPhone&#8217;s serial number or its IMEI number. You can find this information on your device, in Settings &gt; General &gt; About, but if you&#8217;re buying a used device, and it&#8217;s been reset to factory settings, then you can&#8217;t access the Settings app. If this is the case, there are a couple of ways to find this information. <\/p>\n<p>If you can power up the phone, and see the Hello screen, you can tap the small i icon at the bottom right of the screen to see the IMEI number, along with the MEID (Mobile Equipment Identifier) and ICCID (Integrated Circuit Card Identification Number).<\/p>\n<p>If you have the original packaging for your device, then you can access this information on a label on the back of the device&#8217;s box. Depending on your device, you&#8217;ll have one or more numbers. All Apple devices show the serial number on these labels. If you have an iPhone, or a cellular iPad, then you&#8217;ll see more. All iPhones will show the IMEI (International Mobile Equipment Identity), and recent iPhones and iPads with cellular will also show an EID (Embedded Identity Document, which identifies the eSIM in your device, if you have one) and an IMEI2 (International Mobile Equipment Identity for the eSIM).<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/label.jpg\" alt=\"\" width=\"1000\" height=\"677\" class=\"aligncenter size-full wp-image-93394\" \/><\/p>\n<p>If you don&#8217;t have the original packaging, then there are other ways to find the serial number or IMEI. Apple has <a href=\"https:\/\/support.apple.com\/en-us\/HT204073\">a support document which explains where this information is on different devices<\/a>. On iPhones, you can find the IMEI on the SIM card tray.<\/p>\n<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/sim-tray.png\" alt=\"\" width=\"300\"  class=\"aligncenter size-full wp-image-93393\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/sim-tray.png 800w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/sim-tray-300x229.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/sim-tray-150x114.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/sim-tray-768x586.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/sim-tray-657x501.png 657w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>On iPads and iPods touch, you&#8217;ll find the serial number on the back of the device, near the bottom. You&#8217;ll need a magnifying glass to read it. If you have a cellular iPad, the IMEI will also be on the back. <\/p>\n<p>If all else fails, you can <a href=\"https:\/\/al-support.apple.com\/#\/kbase\">contact Apple support for an activation lock request<\/a>. You will be required to provide proof of ownership, such as an invoice showing the device&#8217;s serial number. If Apple unlocked activation lock on a device, all its contents are erased. <\/p>\n<p>If you&#8217;re a business or organization managing Apple devices, see <a href=\"https:\/\/support.apple.com\/en-gb\/HT202804\">this Apple support document<\/a> for more on managing activation lock. <\/p>\n<h3>What to do if you&#8217;re selling an iPhone or iPad<\/h3>\n<p>If you&#8217;re selling an iPhone or iPad, you need to turn off Find My on the device; this disables activation lock. The easiest way to do this is go to Settings, then tap your name at the top. Scroll down and tap Sign Out. Then enter your Apple ID password and tap Turn Off. You should then go to Settings &gt; General &gt; Reset, and tap Erase All Content and Settings. This fully erases the device, and sets it up with the first welcome screen visible, so the new user can start the setup process. <\/p>\n<p>However, if you&#8217;ve given the device to someone and forgotten to disable activation lock and erase the device, you can go to <a href=\"http:\/\/appleid.apple.com\/\">appleid.apple.com<\/a>. Find your device, click it, then click Remove from Account. <\/p>\n<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/remove-device.png\" alt=\"\" width=\"400\"  class=\"aligncenter size-full wp-image-93391\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/remove-device.png 842w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/remove-device-300x206.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/remove-device-150x103.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/remove-device-768x527.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/remove-device-657x451.png 657w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/p>\n<p>This may seem like a lot of work, but this protects your device, and your data. <\/p>\n<p>&nbsp;<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\"  class=\"alignleft\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>We discussed how to check if your phone is unlocked and more in episode 182 of the Intego Mac Podcast. <\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+B3GD_rzc?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you buy a used iPhone or iPad, you need to make sure that it&#8217;s not protected by activation lock. Here&#8217;s how to find out if your device is stolen. <\/p>\n","protected":false},"author":46,"featured_media":93397,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[541,3151,8,9,1504],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If you buy a used iPhone or iPad, you need to make sure that it&#039;s not protected by activation lock. Here&#039;s how to find out if your device is stolen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Want to Buy a Secondhand iPhone? Here&#039;s How to Check if it was Stolen - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If you buy a used iPhone or iPad, you need to make sure that it&#039;s not protected by activation lock. Here&#039;s how to find out if your device is stolen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-06T07:54:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-05T10:21:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/\",\"name\":\"Want to Buy a Secondhand iPhone? Here's How to Check if it was Stolen - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#primaryimage\"},\"datePublished\":\"2021-04-06T07:54:19+00:00\",\"dateModified\":\"2021-05-05T10:21:12+00:00\",\"description\":\"If you buy a used iPhone or iPad, you need to make sure that it's not protected by activation lock. Here's how to find out if your device is stolen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Want to Buy a Secondhand iPhone? Here&#8217;s How to Check if it was Stolen\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Want to Buy a Secondhand iPhone? Here&#8217;s How to Check if it was Stolen\",\"datePublished\":\"2021-04-06T07:54:19+00:00\",\"dateModified\":\"2021-05-05T10:21:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#webpage\"},\"wordCount\":916,\"commentCount\":17,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg\",\"keywords\":[\"Activation Lock\",\"Apple\",\"iPad\",\"iPhone\",\"Stolen\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If you buy a used iPhone or iPad, you need to make sure that it's not protected by activation lock. Here's how to find out if your device is stolen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/","og_locale":"en_US","og_type":"article","og_title":"Want to Buy a Secondhand iPhone? Here's How to Check if it was Stolen - The Mac Security Blog","og_description":"If you buy a used iPhone or iPad, you need to make sure that it's not protected by activation lock. Here's how to find out if your device is stolen.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-04-06T07:54:19+00:00","article_modified_time":"2021-05-05T10:21:12+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/","name":"Want to Buy a Secondhand iPhone? Here's How to Check if it was Stolen - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#primaryimage"},"datePublished":"2021-04-06T07:54:19+00:00","dateModified":"2021-05-05T10:21:12+00:00","description":"If you buy a used iPhone or iPad, you need to make sure that it's not protected by activation lock. Here's how to find out if your device is stolen.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Want to Buy a Secondhand iPhone? Here&#8217;s How to Check if it was Stolen"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Want to Buy a Secondhand iPhone? Here&#8217;s How to Check if it was Stolen","datePublished":"2021-04-06T07:54:19+00:00","dateModified":"2021-05-05T10:21:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#webpage"},"wordCount":916,"commentCount":17,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg","keywords":["Activation Lock","Apple","iPad","iPhone","Stolen"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/want-to-buy-a-secondhand-iphone-heres-how-to-check-if-it-was-stolen\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/activation-lock-hero-400.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8qK","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32410"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=32410"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32410\/revisions"}],"predecessor-version":[{"id":93687,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32410\/revisions\/93687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/93397"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=32410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=32410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=32410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}