matt (support) wrote:... Note even having a password with: a few number substitutions, a couple of words together, or having a few random characters is not enough to prevent a brute force attack.
I don't know if that is related to your account compromise at all, just more of a public service reminder that folks should use randomly generated passwords with lots of entropy.
def get_partition(self):
# TODO: log if debug
body = json.dumps({
"clientContext":{
"appName":"FindMyiPhone",
"appVersion":"%s" % FMIP_API_ID,
"buildVersion":"145",
"deviceUDID":"0000000000000000000000000000000000000000",
"inactiveTime":2147483647,
"osVersion":"4.2.1",
"personID":0,
"productType":"iPad1,1"
kw123 wrote:where / how do you do it? in the plugin?
Karl
did you change it here?
- Code: Select all
def get_partition(self):
# TODO: log if debug
body = json.dumps({
"clientContext":{
"appName":"FindMyiPhone",
"appVersion":"%s" % FMIP_API_ID,
"buildVersion":"145",
"deviceUDID":"0000000000000000000000000000000000000000",
"inactiveTime":2147483647,
"osVersion":"4.2.1",
"personID":0,
"productType":"iPad1,1"
and to what?
Users browsing this forum: No registered users and 2 guests