If you have an iPad, iPad 3GS or later, iPhone, iPod touch 3rd generation or later, you can protect your device through encryption. This means that nobody has physical access to the device, to decipher secrets, which is stored on devices, including contacts, instant messages or texts, call logs and emails Code.
In fact, most modern Apple devices encrypt your default content with different levels of protection. But to protect against someone who obtain the data physically theft, you must link the phrase encryption or code that only you know. There are instructions on how to do this.
In devices with Cisco IOS IOS 4-7:
- Open the General Settings and choose passcode (or iTouch and password)
- Follow the prompts to create an access code to the instructions.
Controlled in the device under IOS-8 – IOS11
- Open the Settings app
- Click on Touch ID and password
- Follow the prompts to create an access code to the instructions
If the device running iOS 8 off key easy to create code that is more than 4 digits access. With the release of iOS 9 Apple default access code 6 digits.
If you choose a password that is entirely digital, a numeric keypad, where you need to unlock your phone, it can be easier, as a series of letters and symbols on a small virtual keyboard received the letter. However, we recommend that you choose a secret code, alphanumeric, and more than 6 characters, because it is just more difficult to decipher when the hardware of Apple designed to slow crack password tool itself.
To make the access code, select “Access Options” and “customized alphanumeric code.” To change the existing password, select “Change Password” and “Access Code Options” then. You must also specify the “Password required” to “immediately” so that the device is not activated when you are not using,
Once a password is set, scroll down on the page setup password down. You should see a “Data protection is enabled” message. This means that the encryption device is now linked to your code, and that most of the data on your phone to unlock the code required.
Here are some other functions of IOS that you should use when it comes to private data:
ITunes has the option of backing up your device to your computer. ITunes does not encrypt backups by default. If you select “Encrypt backup” on the Summary tab of the device in iTunes, a backup of confidential information (e.g. Wi-Fi passwords and email passwords) will be created, but everything will be encrypted before it is used to store on your computer. Don’t forget to save your password, here I have it for sure: recovering from a backup is a rare event, but additionally painful if you can’t remember the password to unlock a backup in case of emergency.
When we return to Apple iCloud, you have a long sentence for privacy and security by using this sentence. Although Apple has encrypted most of the data from backups, it may be possible to access the company for law enforcement purposes, and Apple also controls the key for encrypting the iCloud used.
If privacy is enabled as described above, you can also quickly and securely delete the device.
The ID and password of the sensor configuration, you can set the device to delete all data after 10 failed access attempts. If you do, make sure that your backup phone in this case if someone intentionally enters an incorrect password.
According to the old law, Apple Guide “Apple can delete certain categories passcode active data iOS devices locked. In particular, the user creates active files on the iOS device that is included in the native Apple applications, and for data that use the access code (“User Guide Files Assets”) can be extracted encrypted and made available for external media enforcement. Apple can make this process so that data on devices can later be retrieved using IOS IOS IOS 4 or higher. Please note that there is only one category of user-generated active files available that can be sent to law enforcement agencies according to a search warrant for a valid registration: SMS, call pictures, videos, contacts, audio recording, and history. Apple cannot provide a third-party email address, calendar entry, or data application.
The above information applies only to devices with IOS firmware version 8.0.
Well, Apple says that “for all devices with iOS 8.0 or higher, Apple is not able to extract data from the IOS device to do this, usually the data is collected by the security forces in an encrypted format, and Apple does not have a key.
NOTE: While Apple is able to extract data directly from the phone when the device is set to synchronize with iCloud or backed up with a computer, much of it is from the same data where the forces are provided to order. In most cases, the IOS encryption is only effective when the device is completely turned off (or restarted without being unlocked). Some attackers may be able to extract valuable data from the device’s memory when it is turned on. (You may even be able to recover data if you were only turned off). Remember, and if possible, try turning off (or restarting) the device (and cannot be shared) if you think it’s likely to be seized or stolen. At the time this manual was published, a number of companies said that they were able to break the access code iPhone or iPads for law enforcement, but surrounded the details of these requirements are unclear.
If you’re worried about your lost or stolen device, you can also set up your Apple device so you can remotely delete the Find My iPhone or iPad feature. Note that this will enable the Apple Remote location for device queries at any time. You need to balance the benefit of removing data if you lose control of the device at the risk of revealing its own location. (Mobile phones transmit this information touching the phone company as a routine, Wi-Fi devices such as iPads and iPods do not.)