iOS 17.3 now available with Stolen Device Protection and Apple Music Collaborative Playlists

by Wire Tech

Apple has released iOS 17.3 for iPhone, bringing with it Stolen Device Protection, which will add a second layer of security in the event that a device is stolen and the thief knows the user’s device passcode, and Apple Music Collaborative Playlists, which allow users to create a shared playlist in which invitees can add, reorder, and remove songs.

Apple announced Stolen Device Protection late last year. When Stolen Device Protection is turned on, Face ID or Touch ID authentication is required for users to perform sensitive actions, such as viewing stored passwords or erasing all content and settings. Without Face ID or Touch ID authentication, there will be no option to enter a passcode to bypass the security, meaning that there will be no way for the thief to make those changes or see those settings with only a passcode.

Further more, for sensitive actions performed outside of a familiar location, such as the user’s home, like turning off Lost Mode or changing the password of the Apple ID account associated with the iPhone, Apple will require users to authenticate with Face ID or Touch ID, wait one hour, and authenticate with Face ID or Touch ID again.

When a user is at home or at one of their familiar locations, the one-hour security delay will not be required.

With Apple Music Collaborative Playlists, as the name suggests, users can invite friends to collaborate on a playlist in the Music app. In the group playlist, users can add, reorder, and remove songs. In addition, users can react with an emoji to a song added to a playlist.

Other new features in iOS 17.3 include a new Unity wallpaper that honors Black history and culture in celebration of Black History Month, AirPlay hotel support and Crash detection optimizations.

The post iOS 17.3 now available with Stolen Device Protection and Apple Music Collaborative Playlists first appeared on The Apple Post.

________________________________________________________________________________________________________________________________
Original Article Published at The Apple Post
________________________________________________________________________________________________________________________________

You may also like

Unlock the Power of Technology with Tech-Wire: The Ultimate Resource for Computing, Cybersecurity, and Mobile Technology Insights

Copyright @2023 All Right Reserved