DoulCi was introduced to the internet community back in 2013 as a tool for bypassing the iCloud activation lock on iPhones that had possibly been stolen. Showing us once again that there is no such thing as a perfect security system; even Apple is at risk! The iCloud activation lock by Apple had been over ridden, being passed by two hackers.
The simplicity of the creators of DoulCi’s method reminds us how truly complex the concept of data security truly is. All they actually did was bypass the iCloud activation screen. Billions of people would never have been able to figure it out on their own. Yet, with an ever expanding community of highly educated individuals do we really think this kind of digital system can ever be completely secure? After all, iCloud is basically just a security system!
ICloud was introduced with the sole purpose of protecting iOS devices from being used by random people who may have access to it or who may have acquired it through illegitimate means. ICloud allows an individual to lock their iOS if their iPhone, iPad or iTouch is ever lost or stolen. The goal is to prevent the person who stole it from using it and erase and protect your personal data.
The two hackers who are known by the internet ID’s of AquaXetine and MerrukTechnolog had discovered a flaw in the flow of information. This security flaw allowed them to unlock or unbrick any Apple device. These two individuals wasted no time in creating doulCi and releasing it to the internet community in 2013.
When you purchase an Apple device through legitimate sources and activate it, it contacts Apple servers to validate security credentials and unlocks the device. What they have done is, they intercept the security validation request, then send information that it is safe to unlock. DoulCi is ‘iCloud’ spelled backwards as the process reroutes the iCloud lockdown, thereby unbricking any iPhone, iPad or iPod touch.
Apparently AquaXetine and MerrukTechnolog contacted Apple about their achievement. Apple either never actually read their admission or simply chose to ignore it. The end result was the launch of doulCi. The pair of hackers have indicated that Apple did contact them after they released their methods, but by then it was too late.
As amazing as this story is, as many of you know, Apple has not changed its security system and the bypass still works. The hackers still capture the data and reroute it. Those who do utilize this tool are sending their iOS information to the hackers. No one knows what they do with it once they have it!