Default post cover image

Secure your iPhone data with pair locking

Felix

by Felix

With the release of iOS 8, Apple are pushing their platform as one of the most secure operating systems available at the moment. The new iOS version comes with great security enhancements that made FBI Director James Comey say that he is "very concerned" about the privacy steps the Silicon Valley technology giants are taking lately.

This comes as a response to Apple no longer unlocking iOS devices for police and the US government.

On Apple's privacy page, Tim Cook make a strong point that they value privacy more than anything, and that unlike their competitors, they're not spying on your activity to sell ads and personal data.

At Apple, we believe privacy is a fundamental human right. And so much of your personal information — information you have a right to keep private — lives on your Apple devices.

Our smartphones are the best tracking devices a hacker could ever dreamed of. They have a microphone and a camera that can be turned on at any time. iPhone stores passwords and bank details and even have a fingerprint reader.

After celebrity iCloud hacks, there's been debate on how secure iOS devices actually are. In this article we're going to take a closer look at an obscure but highly effective way of increasing your phone's security: pair-locking.

What is pairing?

Pairing creates a trusted connection between your iPhone and a computer. For example, when you connect your iPhone with an USB cable, you are asked to grant full access and once accepted, pairing takes place and a trust key is kept for future connections. A connection is created between your iPhone and your computer so that applications like iTunes can communicate with your device. The bad news is that forensic applications which might harvest your data can use the same connection key to remotely communicate with your iPhone.

Once an iPhone is paired with a computer, that computer will have full access to all the personal information stored on your device. This means the computer will have access to all photos, notes, videos, messages, and -- with the right knowledge -- hackers can even break passwords from third party applications. Your iPhone can be accessed even when it's locked with a PIN code.

What is pair-locking?

By pair-locking your iPhone you're basically blocking any forensic application that tries to communicate with your iOS device, by preventing new pairings. You're pairing it with a single computer -- yours -- and preventing it from ever pairing with any other.

Is your iPhone paired with your computer already?

A private key is being created when paired your iPhone. This key is stored both on your iPhone and on the computer you have paired with. You can find a pairing record of your device easily, like this:

  • On macOS, open Terminal and paste the following: open /var/db/lockdown
  • If you are using Windows, go to %ProgramData%/Apple/lockdown in Explorer

Steps you need to take to pair-lock your iPhone

  1. Download Apple Configurator from the App store on your Mac and open it

  2. Click "Prepare"

    Apple Configurator's "Prepare" button
    Apple Configurator's "Prepare" button

  3. Choose any name you would like and toggle on "Supervision"

  4. Uncheck the box "Allow devices to connect to other Macs"
  5. Create a new profile by clicking on the plus sign at the bottom of Apple Configurator

    Creating the pairing profile in Apple configurator
    Creating the pairing profile in Apple configurator

  6. You can use any name you would like for this profile, then click on "Restrictions" and on "Configure"

    Restrict your iPhone
    Restrict your iPhone

  7. Uncheck "Allow pairing with non-Configurator hosts" to disable pairing, then click "Save"

    Enable pair-locking for iPhone or iPad
    Enable pair-locking for iPhone or iPad

  8. Select your newly created profile and click on "Prepare"

    Sync pair locking profile
    Sync pair locking profile

  9. Fill in the organization information: only the name field is required, and you can input anything you would like on phone, email and address

  10. Connect your iPhone or iPad and click "Done"
  11. You'll get a warning message asking if you are sure you want to apply these settings to all connected USB devices, click "Apply" and your device will only be accessible from the computer you've paired with

    Apply changes to USB devices with Apple configurator
    Apply changes to USB devices with Apple configurator

Just remember: if you do this, you won't be able to sync or connect your iPhone with any other computer. But neither will the bad guys.

Felix

by Felix on , last updated

We've helped over 3,000,000 people recover their lost iPhone data. Let us help you too.

Related posts

Submit a comment

© 2008 - 2018 Reincubate Ltd. Registered in England and Wales: #5189175, VAT GB151788978. Built with ❤️ in London.

Reincubate is a registered trademark. All rights reserved. Terms & conditions. Privacy Policy. It's your data, not ours. We recommend 2FA.

close

For personal users

For businesses and pro users

Scroll down for business and pro plans

Basic

$34.95

iTunes support

Works with Windows and Mac

Customer support

Preview iCloud device list

BUY BASIC

Premium

$69.95

iCloud and iTunes support

Works with Windows and Mac

Customer support

5 iCloud devices

BUY PREMIUM
Jonathan

This is iPhone Backup Extractor, think of it as a "personal forensics" utility. It's pretty awesome.

Jonathan Zdziarski

Forensics and iOS expert

For business and pro users

Business

$299.95

25 iCloud devices

High priority customer support

Commercial license

All benefits of our premium plan

BUY BUSINESS
ricloud
Demo our APIs for enterprise

Need iCloud access, forensic tooling, bulk recovery of deleted SQLite data?

Learn about our APIs at www.reincubate.com.