★ The four most common scams when trading used Apple devices — and how to avoid them

★ The four most common scams when trading used Apple devices — and how to avoid them

2024-04-25 18:00:00

Buying and selling used items over the internet has become one of the most common ways of purchasing products from Apple no Brazil. Used vehicle trading applications, such as OLX, Mercado Livre and Enjoei, soared in popularity during the pandemic and are still frequently used by those looking to save money when purchasing a new electronic device or, perhaps, earn extra income by disposing of it. of your old models.

The problem is that every time the public becomes accustomed to some technology to make their daily lives easier, criminals find ways to abuse this trust to carry out dangerous scams that are costly and, in many cases, cannot be reversed.

Lists of specialists such as ExpressVPN points out several scams digital technologies that grew in 2024, and the situation is likely to get worse. Therefore, we have separated the four most common scams that frequently affect those who trade Apple products on platforms online. Check out!

Scams involving the Pix system

The first category of scam that is extremely common on used platforms involves the Pix payment system, and affects anyone who wants to sell their used device.

Introduced a few years ago by the Central Bank, the use of Pix has already surpassed all other payment methods in the country, mainly thanks to its versatility, agility and absence of fees. However, this habituation with Pix transactions can create automatic habits that become targets for scammers.

The most common tactics are:

  • False receipt: using third-party applications or some web platforms, the scammer is able to quickly generate an image or PDF document of a Pix receipt with the correct negotiation value, seller’s Pix key and buyer data — however, the receipt is fake and does not represent an actual transaction. To further convince the victim, the scammer can send a real Pix with a low value so that the notification on the smartphone increases the illusion that the receipt is real.
  • Scheduled Pix: several banking applications support Pix transaction scheduling, allowing the customer to select an amount to be sent at a future date. In these cases, an appointment receipt is automatically generated, but the money has not been sent and the transaction can be canceled at any time — with no guarantees.

In both cases, the scammer hopes that the victim is distracted or rushed enough to not manually check whether the amount has gone into their account, instead relying on the receipt quickly shown on the screen or the screenshot sent.

Therefore, it is essential to check that the entire real value is already in your account before closing the negotiation and delivering the product. Pix transactions are immediate, that is, there is no excuse to justify the lack of money once a receipt is presented.

Third-party battery and screen

Buying a used device requires that, in exchange for a reduced price, the buyer is willing to face possible cosmetic defects or parts worn out due to use. Scratches on the casing or screen, battery life shorter than the new product and other details are part of choosing a used device — and are often explained by sellers in the product description field.

However, an extremely common scam on Apple devices — especially iPhones — involves exchanging an original component for a low-cost counterfeit model, without this information being passed on to the buyer and without the price being adjusted to reflect this problem. .

The battery is the component most often associated with this practice. As official repairs are expensive and the value of iPhones with worn-out batteries is greatly reduced, sellers can install third-party batteries that have modified firmware to simulate an original battery with high capacity.

Devices with modified batteries have low autonomy, little durability and even heating problems that can, in rare cases, lead to a risk of fire.

The high-definition screens used by Apple also involve a high cost of repair if they are damaged — clandestine repair kiosks are capable of using low-quality LCD or OLED panels in place of the original model, at the expense of low fidelity in color reproduction , reduced brightness, lower refresh rate and possible incompatibilities with iOS updates.

There is no direct trick that will allow you to detect a fake component in an iPhone. However, some signs may arouse suspicion among buyers: casing screws with marks or signs that they have already been opened, screens that lose brightness when viewed from certain angles or faded colors, system features such as True Tone disabled or battery that loses percentage quickly when testing the device.

It is interesting, when possible, to take another device of an equivalent model — even if borrowed — to compare the screen brightness and color fidelity, in addition to the expected battery drain when watching a video.

Devices with Search (Find My) blocked and IMEI restricted

Apple devices can be protected by two layers of security that seek to reduce the impact of theft and theft of electronics. The first is available throughout Brazil for any smartphone — IMEI blocking. The IMEI is a unique code generated for each device that connects to mobile phone networks and allows it to be identified by the network.

In Brazil, with the help of a police report, victims can register an IMEI as a theft product, and as a result the device will be banned and cannot be used by telephone operators. Furthermore, police operations can request the IMEI and seize stolen devices.

In addition to this system, Apple devices linked to an Apple ID have Search protection (Find My) which, together with the Secure Enclave of Apple chips, prevent the device from being used and activated without the original owner’s password.

Although fake websites and advertisements on the internet promise to remove the block, there is no possibility of removing and using the device without authorization from the account owner or presenting an invoice and personal document at an Apple store.

The scam consists of selling stolen devices as if they were used by the seller himself. During the negotiation, the scammer claims that the device is discharged and cannot be tested or that he does not have time to allow the buyer to try to activate the device, only allowing him to quickly check the screen and other details.

After the purchase, the seller disappears and the victim will have a useless device that has no resale value. It is therefore essential to quickly check the IMEI on the portal GOV.BR and continue with the initial activation until the device requests the Apple ID, ensuring that there is no blockage before transferring the money.

Fake confirmation email

Finally, a scam that has accumulated a large number of victims over the last year has as its main target sellers who tend to advertise frequently but are not professionals, that is, people who usually use apps to sell their used cars but do not yet have one. a methodical system for submissions and confirmations.

The scam consists of negotiating the purchase of a product advertised on applications such as OLX and, when everything is agreed, asking the seller to create an advertisement on a different platform such as Mercado Livre.

The scammer will claim that he needs to use the balance saved on the platform, or that he prefers the other website’s shipping system and that he will buy through the ad even if there is an additional shipping fee. As soon as the victim prepares the ad and sends it to the supposed buyer, the scammer uses an online platform to send emails that simulate official sales confirmation emails from Mercado Livre.

The email received will use images copied from official emails, readable text in good Portuguese, and the statement that the product has been purchased and must be sent urgently for the money to be received.

In many cases, the email will also include a Post Office label already filled in with the address. The idea is for the seller to believe the email and send it, when in reality no purchase was made and the message is not official from the platform.

The main mechanism to protect yourself from this scam is to pay attention to the email account that sent the message — ignore the contact name and check the email directly. If the address is suspicious, use unusual or unusual characters, do not open attachments and do not respond to the message.

Furthermore, always check on the platform where the advertisement was made whether there is, in fact, a pending purchase and what steps the platform suggests to proceed with your sale. Do not create registrations or advertise on platforms you have never used before.


With these tips, buying and selling used Apple devices can be a more affordable way to buy your new device, get money to reduce the cost of upgrading to the new model, or pay your expenses.

1714069062
#common #scams #trading #Apple #devices #avoid

Leave a Replay