{"id":49183,"date":"2016-02-24T08:27:21","date_gmt":"2016-02-24T16:27:21","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49183"},"modified":"2024-02-09T00:45:39","modified_gmt":"2024-02-09T08:45:39","slug":"how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/","title":{"rendered":"How to Use Apple&#8217;s Find My iPhone to Find and Wipe Your Device"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50299\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-and-Remote-Wipe-security.jpg\" alt=\"Find My iPhone \" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-and-Remote-Wipe-security.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-and-Remote-Wipe-security-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-and-Remote-Wipe-security-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<hr>\n<p><em>For an up-to-date article about using Find My, with the iPhone, iPad, Mac, and AirTags, see <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-the-find-my-app-to-locate-your-iphone-mac-apple-watch-airpods-and-friends\/\"> How to Use the Find My App to Locate Friends, Apple Devices, AirTags, and Other Items <\/a>.<\/em><\/p>\n<hr>\n<p>Computer security covers many areas. It involves <a href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/\" target=\"_blank\" rel=\"noopener\">protecting you from hackers and vandals<\/a>, ensuring data integrity, and\u00a0it also includes the protection of your devices. This means\u00a0ensuring that you don&#8217;t lose your computer, tablet, or smartphone, and, if you do, helping you find them.<\/p>\n<p>If your Mac or iPhone gets stolen, you don&#8217;t want anyone to be able to get at your data. You&#8217;ll have protected your device\u2014I hope\u2014with a strong password or passcode, but if the device is in the wild, it&#8217;s possible that someone could access your files.<\/p>\n<p>Apple has a very useful feature that helps you find your devices, or, if you can&#8217;t get at them, wipe them clean. Called <strong>Find My iPhone<\/strong> (or iPad, or iPod touch, or Mac; it just depends on the device), this feature is part of iCloud.<\/p>\n<p>In this article, I&#8217;ll explain how Find My iPhone works (I&#8217;ll use that name, even if I&#8217;m talking about other devices), how you can use it to find a lost or stolen device, and how you can send a command to remotely wipe your lost or stolen device so all its data is deleted.<\/p>\n<h3>How Find My iPhone Works<\/h3>\n<p>Have you ever misplaced your iPhone? Maybe you left it in a bag and forgot which one; maybe it slipped under a couch or sofa; maybe it&#8217;s in your car, or somewhere in your office, but you don&#8217;t know exactly where. You can always call the device (if it&#8217;s an iPhone, of course; you can&#8217;t do this with an iPad or Mac), but if it&#8217;s on silent, you might not hear it.<\/p>\n<p>Find My iPhone is a great way to find that missing device. If this feature is on (I&#8217;ll explain how to turn it on just below), you can go to iCloud.com in a web browser and search for it, and then have the device play a sound. Your device plays a loud beeping sound for two minutes, and you can recover it.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-49414\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-1024x622.png\" alt=\"find-iphone\" width=\"500\" height=\"304\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-1024x622.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-150x91.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-300x182.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-657x399.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone.png 1427w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Find My iPhone works by tracking your device&#8217;s location. You can see where it is on a map on iCloud.com, and you can perform actions on that device. If you have an iPhone or a cellular iPad, the location can be very precise; with a Mac or non-cellular iOS device, it&#8217;s less accurate, because the location information generally comes from Wi-Fi hotspots, and is not as precise as cellular towers.<\/p>\n<h3>Activating Find My iPhone<\/h3>\n<p>On iOS devices, go to\u00a0<strong>Settings<\/strong> &gt; <strong>iCloud<\/strong> to turn on Find My iPhone.<\/p>\n<p>On a Mac, the option to activate it is\u00a0in <strong>System Preferences<\/strong> &gt; <strong>iCloud<\/strong>.<\/p>\n<p>There are two options on iOS devices. The first turns on the feature, and the second tells your device to send its last location when its battery is low. This can help you find a device that&#8217;s run out of power. While you won&#8217;t be able to make the device play a sound, you&#8217;ll have an idea of where it was when its battery died.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-settings.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-49411\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-settings.png\" alt=\"find-iphone-settings\" width=\"500\" height=\"524\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-settings.png 752w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-settings-143x150.png 143w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-settings-286x300.png 286w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/find-iphone-settings-657x688.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h3>Find My iPhone Features<\/h3>\n<p>With Find My iPhone, you can do the following:<\/p>\n<ul>\n<li>Have your device play a sound,<\/li>\n<li>Display a message on your device, such as one saying that it&#8217;s lost, and providing contact information,<\/li>\n<li>Put the device into Lost Mode, so you can track its location, as well as turn off notifications on the device, block credit cards registered with Apple Pay, and more,<\/li>\n<li>Receive notifications by email and on an iOS device when a device is detected, and<\/li>\n<li>Remotely wipe the device, deleting all data. If you send a remote wipe command when the device is offline, it will activate the next time the device has a network connection.<\/li>\n<\/ul>\n<p>In addition to helping you find your device, Find My iPhone also prevents anyone from turning off the feature without entering your Apple ID and password. This feature, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-the-kill-switch-on-your-iphone-or-ipad\/\" target=\"_blank\" rel=\"noopener\">known as Activation Lock<\/a>, prevents people from erasing or reactivating your device.<\/p>\n<p>You should definitely activate Find My iPhone; there&#8217;s no reason to not use it. It can help you find a lost or stolen device, and the feature offers invaluable protection by wiping data from the device if it&#8217;s lost or stolen. If you haven&#8217;t turned on Find My iPhone yet, you should do so now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever misplaced your iPhone? Here\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.<\/p>\n","protected":false},"author":46,"featured_media":50302,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,10],"tags":[541,1117,2791,171,9,2788],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Have you ever misplaced your iPhone? Here\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Use Apple&#039;s Find My iPhone to Find and Wipe Your Device - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Have you ever misplaced your iPhone? Here\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-24T16:27:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-09T08:45:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg\",\"width\":400,\"height\":260,\"caption\":\"My My iPhone\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/\",\"name\":\"How to Use Apple's Find My iPhone to Find and Wipe Your Device - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#primaryimage\"},\"datePublished\":\"2016-02-24T16:27:21+00:00\",\"dateModified\":\"2024-02-09T08:45:39+00:00\",\"description\":\"Have you ever misplaced your iPhone? Here\\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Use Apple&#8217;s Find My iPhone to Find and Wipe Your Device\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How to Use Apple&#8217;s Find My iPhone to Find and Wipe Your Device\",\"datePublished\":\"2016-02-24T16:27:21+00:00\",\"dateModified\":\"2024-02-09T08:45:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#webpage\"},\"wordCount\":752,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg\",\"keywords\":[\"Activation Lock\",\"Find My\",\"Find My Mac\",\"iCloud\",\"iPhone\",\"Wipe Your Device\"],\"articleSection\":[\"Apple\",\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Have you ever misplaced your iPhone? Here\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/","og_locale":"en_US","og_type":"article","og_title":"How to Use Apple's Find My iPhone to Find and Wipe Your Device - The Mac Security Blog","og_description":"Have you ever misplaced your iPhone? Here\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-02-24T16:27:21+00:00","article_modified_time":"2024-02-09T08:45:39+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg","width":400,"height":260,"caption":"My My iPhone"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/","name":"How to Use Apple's Find My iPhone to Find and Wipe Your Device - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#primaryimage"},"datePublished":"2016-02-24T16:27:21+00:00","dateModified":"2024-02-09T08:45:39+00:00","description":"Have you ever misplaced your iPhone? Here\u2019s how Find My iPhone works, how you can use it to find a lost or stolen iPhone, and how to remotely wipe your lost or stolen device so all its data is deleted.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Use Apple&#8217;s Find My iPhone to Find and Wipe Your Device"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How to Use Apple&#8217;s Find My iPhone to Find and Wipe Your Device","datePublished":"2016-02-24T16:27:21+00:00","dateModified":"2024-02-09T08:45:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#webpage"},"wordCount":752,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg","keywords":["Activation Lock","Find My","Find My Mac","iCloud","iPhone","Wipe Your Device"],"articleSection":["Apple","How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Mac-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cNh","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49183"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49183"}],"version-history":[{"count":35,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49183\/revisions"}],"predecessor-version":[{"id":99794,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49183\/revisions\/99794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/50302"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}