{"id":99631,"date":"2024-01-24T04:29:58","date_gmt":"2024-01-24T12:29:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=99631"},"modified":"2024-07-24T16:36:18","modified_gmt":"2024-07-24T23:36:18","slug":"how-to-enable-stolen-device-protection-for-iphone","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/","title":{"rendered":"How to enable Stolen Device Protection for iPhone"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-99632\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device.png\" alt=\"\" width=\"1600\" height=\"900\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device.png 1600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-300x169.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-1024x576.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-768x432.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-1536x864.png 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-657x370.png 657w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<p>Apple released iOS 17.3 this week, and one of the new security features is Stolen Device Protection. This feature, when enabled, prevents potential thieves from changing your Apple ID and critical security features on your iPhone. Here\u2019s how Stolen Device Protection works, and how to enable it.<\/p>\n<h3 id=\"whatstolendeviceprotectiondoes\">Why is a feature like Stolen Device Protection needed?<\/h3>\n<p>Criminals often try to look over someone\u2019s shoulder as they enter their passcode on a device. This action, called shoulder surfing, is common at ATMs, where criminals try to see the PINs that people enter. Shoulder surfing is becoming an increasingly worrisome threat for smartphone users.<\/p>\n<p>Using a device with biometric identification (such as Apple&#8217;s Touch ID or Face ID) means that normally you don\u2019t need to enter your iPhone passcode. However, there are still situations where you may need to do so. For example, Touch ID may not work for you, such as when your hands are sweaty, or your iPhone may require that you enter the passcode for other reasons, such as after restarting the phone. In addition, <a href=\"https:\/\/support.apple.com\/guide\/iphone\/iph14a867ae\/\" target=\"_blank\" rel=\"noopener\">as Apple says<\/a>, if \u201cYou haven\u2019t unlocked your iPhone with the passcode in the last 6.5 days, and you haven\u2019t unlocked it with Face ID or Touch ID in the last 4 hours,\u201d then you\u2019ll be required to enter your passcode. In practice, I see these requests occasionally, even if I\u2019ve recently been using my iPhone, so there is another timer that kicks in as well.<\/p>\n<p>One scenario that thieves use is to pick up an iPhone and press and hold the power button and one of the volume buttons for a few seconds to trigger Emergency SOS mode. Pressing the power button again dismisses the Emergency SOS screen, and the next time the user wants to access the phone, they are met with a passcode request. The thief watches over the person\u2019s shoulder, and then later steals the phone.<\/p>\n<h3 id=\"whatstolendeviceprotectiondoes\">What does Stolen Device Protection do?<\/h3>\n<p>As seen <a href=\"https:\/\/www.intego.com\/mac-security-blog\/if-hackers-crack-a-six-digit-iphone-passcode-they-can-get-all-your-passwords\/\">in this article<\/a>, once someone can access your iPhone, they can change your Apple ID password, locking you out of your account entirely. You won\u2019t even be able to use <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-find-my-iphone-to-find-and-wipe-your-device\/\">Find My to put the device in lost mode<\/a>. Stolen Device Protection prevents this by limiting the locations where certain actions can be taken on the phone. If your iPhone is not in a familiar location, the following actions require biometric authentication and cannot be performed with just a passcode:<\/p>\n<ul>\n<li>Use passwords or passkeys saved in Keychain<\/li>\n<li>Auto-fill payment methods in Safari<\/li>\n<li>Turn off Lost Mode<\/li>\n<li>Erase all content and settings<\/li>\n<li>Apply for a new Apple Card<\/li>\n<li>View Apple Card virtual card number<\/li>\n<li>Take certain Apple Cash and Savings actions in Wallet<\/li>\n<li>Use your iPhone to set up a new device (using Quick Start)<\/li>\n<\/ul>\n<p>For other actions, Stolen Device Protection adds a security delay, if your iPhone is not in a familiar location. You authenticate using Touch ID or Face ID, then you must wait one hour before you can:<\/p>\n<ul>\n<li>Change your Apple ID password<\/li>\n<li>Sign out of your Apple ID<\/li>\n<li>Update Apple ID account security settings (such as adding or removing a trusted device, Recovery Key or Recovery Contact)<\/li>\n<li>Add or remove Face ID or Touch ID<\/li>\n<li>Change your iPhone passcode<\/li>\n<li>Reset All Settings<\/li>\n<li>Turn off Find My<\/li>\n<li>Turn off Stolen Device Protection<\/li>\n<\/ul>\n<p>This one-hour delay should be enough for you to mark your iPhone as lost if it is physically stolen from you. You can use the Find My app on another device you own, or on someone else\u2019s device to do this; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-the-find-my-app-to-locate-your-iphone-mac-apple-watch-airpods-and-friends\/\">see this article for more on using the Find My app<\/a>.<\/p>\n<h3 id=\"howtoenablestolendeviceprotection\">How to enable Stolen Device Protection<\/h3>\n<p>To enable Stolen Device Protection, you must have <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-two-factor-authentication-for-your-apple-id-and-icloud-account\/\">two-factor authentication enabled for your Apple ID<\/a>, your iPhone must have a passcode, Face ID or Touch ID, and Find My must be turned on. You must also turn on Significant Locations, and this setting is hard to find. Go to Settings &gt; Locations &gt; Location Services. Scroll down to the bottom of the list and tap System Services, then scroll down and tap Significant Locations. Toggle this on, if it isn\u2019t already. You\u2019ll see some familiar locations listed, such as your home or your work, and perhaps other locations you visit often.<\/p>\n<p>To enable Stolen Device Protection, go to Settings &gt; Face ID \/ Touch ID &amp; Passcode, then scroll down to the Stolen Device Protection section and tap Turn On Protection.<\/p>\n<p><img class=\"aligncenter size-full wp-image-99644\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-copy.png\" alt=\"\" width=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-copy.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-copy-300x251.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-copy-150x126.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3>Stolen Device Protection has its caveats<\/h3>\n<p>The only weakness of Stolen Device Protection is the fact that it is not active in familiar locations. If someone gets your passcode and tries to make changes to your iPhone at your home, at work, or at other locations you visit often, they won\u2019t be prevented from doing so. You should always be careful to not enter your iPhone\u2019s passcode when anyone can see you do so, and use some of the tips <a href=\"https:\/\/www.intego.com\/mac-security-blog\/if-hackers-crack-a-six-digit-iphone-passcode-they-can-get-all-your-passwords\/\">at the end of this article<\/a> to create a more secure passcode, in case someone manages to see some parts of the passcode but not all of it.<\/p>\n<p>If someone gets access to your iPhone with your passcode, they may not be able to make changes to your Apple account, but they may be able to access other accounts. They could go to some of your online accounts and say that they forgot the password. The sites will send the new password to your email address, which the thieves could access on your iPhone. They could then potentially access the accounts, make purchases, access your social media history, and more.<\/p>\n<p>There\u2019s one scenario where the security delay could pose a problem. I\u2019ve traded in old iPhones at Apple Stores, and they have you turn off Find My and then erase the phone. If you need to do this, you will have to turn off Stolen Device Protection before proceeding. But if the Apple Store is not a familiar location, you\u2019ll have to wait one hour after your first attempt to do so. It would be advisable, if you plan to trade in or sell your iPhone, to turn off Stolen Device Protection at home or at work before you leave to go to an Apple Store or another location. (Unless Apple treats their retail stores as familiar locations.)<\/p>\n<p>So, <strong>should you turn on Stolen Device Protection for iPhone? Yes<\/strong>, it&#8217;s probably a good idea. It\u2019s easy to do so, and there are few downsides.<\/p>\n<h3>Is there Stolen Device Protection for iPad or Mac?<\/h3>\n<p>So far, Apple has not announced Stolen Device Protection as a future iPadOS or macOS feature. This seems a bit odd, given that iPadOS is virtually the same operating system as iOS. And, of course, many people carry an iPad or MacBook with them wherever they go.<\/p>\n<p>Although &#8220;Stolen Device Protection&#8221; is not available on Macs, you can enable features that will protect your data in case your Mac gets stolen. See our related article, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-this-now-to-protect-your-mac-in-case-it-gets-stolen-device-protection\/\">Do this now to protect your Mac in case it gets stolen<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"NYeFGhwBfn\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-this-now-to-protect-your-mac-in-case-it-gets-stolen-device-protection\/\">Do this now to protect your Mac in case it gets stolen<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Do this now to protect your Mac in case it gets stolen&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/do-this-now-to-protect-your-mac-in-case-it-gets-stolen-device-protection\/embed\/#?secret=NYeFGhwBfn\" data-secret=\"NYeFGhwBfn\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security, and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\u2019re unlikely to be able to make changes to your Apple ID account. Here\u2019s how to enable it.<\/p>\n","protected":false},"author":46,"featured_media":99649,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[69,9,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\u2019re unlikely to be able to make changes to your Apple ID account. Here\u2019s how to enable it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to enable Stolen Device Protection for iPhone - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\u2019re unlikely to be able to make changes to your Apple ID account. Here\u2019s how to enable it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-24T12:29:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-24T23:36:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple iOS 17.3 Stolen Device Protection setting for iPhone\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\",\"name\":\"How to enable Stolen Device Protection for iPhone - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#primaryimage\"},\"datePublished\":\"2024-01-24T12:29:58+00:00\",\"dateModified\":\"2024-07-24T23:36:18+00:00\",\"description\":\"Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\\u2019re unlikely to be able to make changes to your Apple ID account. Here\\u2019s how to enable it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to enable Stolen Device Protection for iPhone\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How to enable Stolen Device Protection for iPhone\",\"datePublished\":\"2024-01-24T12:29:58+00:00\",\"dateModified\":\"2024-07-24T23:36:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#webpage\"},\"wordCount\":1286,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg\",\"keywords\":[\"iOS\",\"iPhone\",\"Security\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\u2019re unlikely to be able to make changes to your Apple ID account. Here\u2019s how to enable it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/","og_locale":"en_US","og_type":"article","og_title":"How to enable Stolen Device Protection for iPhone - The Mac Security Blog","og_description":"Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\u2019re unlikely to be able to make changes to your Apple ID account. Here\u2019s how to enable it.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/","og_site_name":"The Mac Security Blog","article_published_time":"2024-01-24T12:29:58+00:00","article_modified_time":"2024-07-24T23:36:18+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg","width":400,"height":260,"caption":"Apple iOS 17.3 Stolen Device Protection setting for iPhone"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/","name":"How to enable Stolen Device Protection for iPhone - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#primaryimage"},"datePublished":"2024-01-24T12:29:58+00:00","dateModified":"2024-07-24T23:36:18+00:00","description":"Stolen Device Protection is a feature that helps ensure that if someone steals your iPhone, even if they have your passcode, they\u2019re unlikely to be able to make changes to your Apple ID account. Here\u2019s how to enable it.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to enable Stolen Device Protection for iPhone"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How to enable Stolen Device Protection for iPhone","datePublished":"2024-01-24T12:29:58+00:00","dateModified":"2024-07-24T23:36:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#webpage"},"wordCount":1286,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg","keywords":["iOS","iPhone","Security"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/01\/stolen-device-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pUX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99631"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=99631"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99631\/revisions"}],"predecessor-version":[{"id":101197,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99631\/revisions\/101197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/99649"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=99631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=99631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=99631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}