Feeds

Carrier-sold iPad 2 Sim locks snag unwary buyers

Caveat bites emptor

High performance access to file storage

Buying an iPad 2 from a network operator - or one of its third-party resellers - comes at a price beyond the cost of the data contract and the hardware, it seems: the 'magical... again' gadgets are Sim-locked.

So says Reg Hardware reader Ryan who, having tracked down an iPad 2 at his local Phones4U - he had to stump up for the 64GB model in his haste to possess the new tablet - found that the gadget, sold with an Orange Sim, is locked to that network.

The retailer's in-store rep, he claims, told him that was not the case, that iPad 2s are not locked.

To be fair, some seemingly are not. Apple sells 3G-enabled iPads 2s with or without a Sim, and makes no distinction between them. "The iPhone sold by the Apple Online Store is Sim-free," Apple says.

So is the iPad 2. Since Apple doesn't know which network you may subsequently connect the tablet to, the gadget has to be unlocked. Not that Apple's website makes this clear, mind you.

The moral: if you want an unlocked device, don't buy it from a carrier or one of its agents. You wouldn't expect a phone sold by O2 - or any other operator - to be unlocked, so don't expect 3G iPads - or any other tablet - to be either.

If you buy from a retailer who can only supply devices with a specific network's mobile broadband package, it's a good bet the tablet will be locked to that network.

Ryan is currently trying to get a refund from Phones4U - we wish him luck. But emptors who wish to avoid this particular caveat should learn from his example. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.