{"id":602169,"date":"2023-01-28T07:48:58","date_gmt":"2023-01-28T13:48:58","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/28\/apples-mac-security-is-so-good-its-sending-used-m1-macbooks-to-the-scrap-heap\/"},"modified":"2023-01-28T07:48:58","modified_gmt":"2023-01-28T13:48:58","slug":"apples-mac-security-is-so-good-its-sending-used-m1-macbooks-to-the-scrap-heap","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/28\/apples-mac-security-is-so-good-its-sending-used-m1-macbooks-to-the-scrap-heap\/","title":{"rendered":"Apple\u2019s Mac security is so good, it\u2019s sending used M1 MacBooks to the scrap heap"},"content":{"rendered":"<article id=\"post-1485237\">\n<div>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.macworld.com\/wp-content\/uploads\/2023\/01\/macbook-air-2020-18.jpg?quality=50&#038;strip=all&#038;w=1024\" alt=\"MacBook Air 2020\" data-hero  ><\/p>\n<p><span>Image: IDG<\/span>\t\t\t\t<\/p>\n<\/p><\/div>\n<div>\n<div id=\"link_wrapped_content\">\n<body><\/p>\n<p>Apple\u2019s efforts to protect a user\u2019s data are a major selling point for customers. If your MacBook is stolen, it\u2019s extremely difficult for the thief to bypass the laptop\u2019s security measures and access the data as long as you\u2019ve taken advantage of the <a href=\"https:\/\/www.macworld.com\/article\/1432223\/mac-security-tips-password-find-my-users-lockdown-mode.html\" data-type=\"URL\" data-id=\"https:\/\/www.macworld.com\/article\/1432223\/mac-security-tips-password-find-my-users-lockdown-mode.html\">tools at your disposal<\/a> to lock down your machine. However, those same security measures can render a Mac useless in a legitimate sale on the second-hand market.<\/p>\n<p>A report by  highlights the frustrations of an independent computer repair specialist and refurbisher, John Bumstead, who tweeted about the \u201cmillions\u201d of MacBooks that have been \u201ccondemned\u2026to death\u201d because of . Activation Lock associates a device with an Apple ID, and is automatically turned on when Find My Mac is activated within the Apple ID settings on your Mac. With Activation Lock active, the Apple ID username and password have to be entered to gain access to the Mac, even if it has been erased.<\/p>\n<figure><\/figure>\n<p>Bumstead told Vice that Apple\u2019s security is \u201cformidable\u201d and has become practically impossible to jailbreak or bypass on Apple\u2019s M-series Macs. The T2 security chip that Apple introduced on Intel Macs in 2018 is now integrated into the M1 and M2 system on a chip and if it\u2019s not properly deactivated, it\u2019s causing Macs that are less than two years old to be scrapped and stripped for parts.<\/p>\n<p>Activation Lock has long been a problem for third-party resellers, as well as individuals involved in a legitimate transaction\u2013Macworld\u2019s Mac 911 help columnist <a href=\"https:\/\/www.macworld.com\/article\/1069844\/how-to-disable-activation-lock-on-broken-missing-apple-hardware.html\" data-type=\"URL\" data-id=\"https:\/\/www.macworld.com\/article\/1069844\/how-to-disable-activation-lock-on-broken-missing-apple-hardware.html\">often receives emails<\/a> asking about Activation Lock. As Bumstead points out, if Find My Mac hasn\u2019t been disabled, devices can\u2019t be used even though they are in good working condition. Users can turn off Find My Mac in the Apple ID settings of the Mac, but that also shuts off the ability to locate it. Activation Lock can\u2019t be toggled on or off separately.<\/p>\n<p>Bumstead wants Apple to be more active in helping people who are legitimately trying to access a device. He suggests that a user could make a request to access a machine and then Apple could \u201cexplore its records\u201d and \u201cquery the original owner,\u201d and if everything checks out \u201cand the original owner does not protest within 30 days,\u201d the restrictions can be lifted so the device can be used again.<\/p>\n<div>\n<figure><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/b2c-contenthub.com\/wp-content\/uploads\/2023\/01\/find-my-mac.jpg?quality=50&#038;strip=all&#038;w=1200\" alt=\"Turning off Find My Mac\"  width=\"1200\" height=\"800\" ><figcaption>\n<p>To disable Activation Lock on your Mac, you need to turn off Find My Mac.<\/p>\n<\/figcaption><\/figure>\n<p>Foundry<\/p>\n<\/div>\n<p>Apple has a way online to , but it involves performing a check of the device\u2019s serial number against the registered owner, which means that the second owner needs to be able to work with the original owner to get the request fulfilled. In some instances, that\u2019s difficult or impossible to do.<\/p>\n<p>It\u2019s important that if a device is being sold second-hand, the <a href=\"https:\/\/www.macworld.com\/article\/229253\/how-to-remove-a-previous-owner-s-apple-id-from-a-used-iphone-ipad-or-ipod-touch.html\">Apple ID must be disassociated<\/a> from it. If you\u2019re selling a device, you can\u2019t just wipe out the drive and reinstall the operating system, you also need to disable Find My Mac and Activation Lock. If you\u2019re buying a second-hand device, confirm with the seller that Activation Lock has been disabled and the product has been disassociated with the owner\u2019s Apple ID. Also, confirm that you can contact the seller for their Apple ID info if Activation Lock kicks in and that you can return a device you can\u2019t get access to.<\/p>\n<p>Apple encourages owners of older devices to participate in the company\u2019s <a href=\"https:\/\/apple.sjv.io\/c\/321564\/435031\/7613?subid1=1-1-1485237-1-0-0&#038;u=https:\/\/www.apple.com\/shop\/trade-in\" rel=\"nofollow\">trade-in program<\/a>. Eligible devices earn credit towards a purchase, while ineligible devices are recycled for free. Apple can presumably unlock Macs that are inaccessible due to Activation Lock.<\/p>\n<p><\/body><\/div>\n<div data-ga=\"article-footer-author\">\n<h3>\n\t\t<a href=\"https:\/\/www.macworld.com\/author\/rloyola\" rel=\"author\"><br \/>\n\t\tAuthor: Roman Loyola<\/a>, Senior Editor\t\t<\/h3>\n<div>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.macworld.com\/wp-content\/uploads\/2023\/01\/author_photo_Roman-Loyola_1662683660-431.jpg?quality=50&#038;strip=all&#038;w=150&#038;h=150&#038;crop=1\" height=\"125\" width=\"125\">\n\t\t\t\t<\/p>\n<p>Roman has covered technology since the early 1990s. His career started at MacUser, and he&#8217;s worked for MacAddict, Mac|Life, and TechTV.<\/p>\n<\/p><\/div>\n<ul>\n<li>\n\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.macworld.com\/mailto:rl*****@******ld.com\" data-original-string=\"J6L9Vq8sPgBebUQlE8Wl0Q==7f4eCllEtNlI8w4cUK7Xv5vc89TtQlwmg6uWPLBVWiRyOg=\" title=\"This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.\" title=\"Email\" target=\"_blank\" rel=\"noopener\"><svg viewBox=\"0 0 512 512\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\" \/><\/svg><\/a>\n\t\t\t\t\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.macworld.com\/article\/1485237\/mac-security-t2-chip-macbook-activation-lock.html\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Tama Wiers<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: IDG Apple\u2019s efforts to protect a user\u2019s data are a major selling point for customers. If your MacBook is stolen, it\u2019s extremely difficult for the thief to bypass the laptop\u2019s security measures and access the data as long as you\u2019ve taken advantage of the tools at your disposal to lock down your machine. However<\/p>\n","protected":false},"author":1,"featured_media":602170,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,20,46],"tags":[],"class_list":{"0":"post-602169","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apples","8":"category-security","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/602169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=602169"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/602169\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/602170"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=602169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=602169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=602169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}