Q: Apple ID Policy
I have a problem, which is that I have had my email address stolen. It is being used to create Facebook accounts and to join other web sites in Africa. I thought a simple solution to this problem would be to change my email address. Apple has restrictions on email addresses ending with me.com, if they are being used as an Apple ID. The only method of getting rid of the email address is to close my iCloud account. What this means is that I lose all my music, books and apps which I have purchased from Apple! The other solution I was given was to create a Gmail account and use my gmail account. I was shocked that Apple would tell me to go to Google for a solution. Once I have my gmail account, I could then use my Apple email just as my Apple ID but not as my email address. This solution to me is like hiding my head in the sand. My email address which has been compromised is still out there but I am pretending it is not?
I am also very disappointed that Apple is insisting on using a simple email address as a primary identifier (which can never be changed) given all its claims to caring about protecting customer privacy and security. Surely there is a way to create a secure identifier without using an email address which is both very public and easily hacked.
If anyone has created a more secure work around to this problem or has has the identity stolen and thus needed to change things like email addresses and Apple ID, I would love to hear how you managed to solve your problem.
Many thanks.
Posted on Sep 7, 2016 10:22 AM
Any hack of your Apple ID would be due to a password issue, not the Apple ID's complexity or it's domain. A Gmail based Apple ID is no more or less secure than any other domain.
Your first action should have been to change and strengthen the password, not change the email address.
If you have a strong password or better yet, 2 Factor Authentication for your Apple ID, you could almost use trytohackme@icloud.com as your Apple ID and be safe.
It's been proven that most hacks come from phishing schemes or weak and easy-to-guess passwords.
Posted on Sep 7, 2016 11:38 AM