{"id":20203,"date":"2018-01-16T14:52:17","date_gmt":"2018-01-16T19:52:17","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=20203"},"modified":"2018-04-09T15:14:02","modified_gmt":"2018-04-09T19:14:02","slug":"ipad-erased-by-too-many-failed-passcode-entries","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2018\/01\/16\/ipad-erased-by-too-many-failed-passcode-entries\/","title":{"rendered":"iPad Erased By Too Many Failed Passcode Entries"},"content":{"rendered":"<p><a href=\"http:\/\/tidbits.com\/article\/17727\">Josh Centers<\/a>:<\/p>\n<blockquote cite=\"http:\/\/tidbits.com\/article\/17727\">\n<p>Alas, I know this problem all too well because I have a tech-addled toddler who likes to use the iPad Lock screen as a drum, so he disables his iPad regularly. And before you ask, no, this feature is not related to the Erase Data feature in Settings &gt; Touch ID &amp; Passcode that erases the data on your iOS device after 10 incorrect passcode entries. This is a <a href=\"https:\/\/support.apple.com\/en-us\/HT204306\">built-in security feature<\/a> that cannot be disabled.<\/p> \n<p>How many incorrect passcode entries it takes before the iPad locks is up for debate. Apple&rsquo;s support document says six. In my testing, that isn&rsquo;t true. It took only five tries with random passcodes to disable my iPad for 1 minute.<\/p>\n<p>[&#8230;]<\/p>\n<p>Once you kick off the process, it works like this: the device is disabled for 1 minute. There is no way to bypass it being disabled &mdash; you just have to sit in time out like a naughty child. Once that time is up, you get one chance to get the passcode correct or your device is disabled for 5 minutes. Get it wrong again and it&rsquo;s disabled for 15 minutes! The next failure disables it for another 15 minutes. After that, 1 hour. Get it wrong one more time, and you won&rsquo;t be able to get in directly on the device ever again. Your only solution at that point is to erase all content and settings and restore from backup.<\/p>\n<p>[&#8230;]<\/p>\n<p>Worse, this feature can render a device completely useless and potentially cause a user to lose data, if the device wasn&rsquo;t set to back up or its backups were failing for some reason. I&rsquo;ve never seen a non-optional security feature that could brick a consumer-level device even if an authorized user could later authenticate themselves.<\/p>\n<\/blockquote>\n\n<p>Update (2018-04-07): <a href=\"https:\/\/twitter.com\/davedelong\/status\/982430984745316353\">Dave DeLong<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/davedelong\/status\/982430984745316353\">\n<p>Working myself up to write a righteously angry blog post about how pathetically terrible the parental controls on iOS are.<\/p>\n<p>This time it&rsquo;s that f***ing &ldquo;finish setting up your iPad&rdquo; nag that tells them to set a passcode.<\/p>\n<p>They set a passcode. They forget the passcode. They enter a wrong one. I now have to DFU the stupid thing and spend an hour bringing it back to life.<\/p>\n<p>Meanwhile, all app data is lost<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Josh Centers: Alas, I know this problem all too well because I have a tech-addled toddler who likes to use the iPad Lock screen as a drum, so he disables his iPad regularly. And before you ask, no, this feature is not related to the Erase Data feature in Settings &gt; Touch ID &amp; Passcode [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2018-04-09T19:14:04Z","apple_news_api_id":"7b33d54a-5137-4945-881c-3c0b6102c415","apple_news_api_modified_at":"2018-04-09T19:14:05Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AezPVSlE3SUWIHDwLYQLEFQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[],"tags":[1650,31,1472,981,48],"class_list":["post-20203","post","type-post","status-publish","format-standard","hentry","tag-children","tag-ios","tag-ios-11","tag-passwords","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/20203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=20203"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/20203\/revisions"}],"predecessor-version":[{"id":21161,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/20203\/revisions\/21161"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=20203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=20203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=20203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}