How do we protect our Apple ID when a code is displayed on the phone?
We’ve just explained what double and bottom authentication is for how to use and use it on our devices, and the title still offers a lot. Today we’ll see how certain idiosyncrasies of two-factor authentication work on our devices and how we can fix certain information that is very important for good performance.
Some of the most frequently asked questions during training are about two-factor authentication What’s the point?
At first glance it may appear that when the code needed to enter the Apple ID is received from the device, it does not represent a major security upgrade. But we must look at a more important issue: devices remain locked.
Seen this way, to access our Apple ID, you need a password and, in addition, access and be able to unlock one of our trusted devices. We call a reliable telephone line We’ve already signed in with our Apple ID sometime and that, therefore, it can show us the security codes needed to sign in again.
If a third party has access to someone else’s device and is unlocked, access to the two-factor verification codes There really is very little to worry about. In the case of all Apple ID information and management options, how to change a password for example, is therefore a very serious situation.
And if I don’t have a device in hand
Another important question is what happens when I don’t have my device nearby. Two-factor authentication is designed to give us access to our Apple ID from many other Apple devices. This way when we try to get into the new iPad we get the code on our iPhone or Mac or our Apple Watch. But what happens when we only have one device? And, even more so, what happens if we don’t have the tool then?
Even having a single device, activating two-factor authentication provides the same security in our Apple ID account as if we have multiple points where we can get the code. Remember that Apple promises to send us a SMS code when we don’t have our device
It is very important that we properly review the reliable phone numbers that can get our code when we need it. In addition, especially when traveling abroad, and especially if we do it with our iPhone onlyIt is interesting that we add the phone number of our family or friends to a list of trusted numbers. The reason is simple: In case the iPhone disappears, to get a duplicate of the SIM card, it is necessary to get the codes and be able to access the new iCloud or device, which can be extremely difficult or precisely impossible by following the operator.
We can Manage reliable phone numbers
Importance of SIM and eSIM
In terms of the reliable phone numbers we just mentioned, some details to keep in mind about the security codes sent by SMS are that the physical card of the iPhone can be removed from the phone. In turn when using eSIM we can be sure that the phone is only available installed you can receive codes sent by SMS. This way, if we have the option of using eSIM with our operator, we can process the change. Changes that will help us in other SMS-based services are to send codes.
All in all, proving the validity of the Double factor in our Apple ID is a small workaround with several interesting details in its operation. At first glance it may seem easy, and Apple has invested a lot of time in doing so, but if we work on it we will see that it has important information to know.