User Receives Android Clone After Ordering iPhone 15 Pro Max

iPhone 15 pro max

A Reddit user recently shared an intriguing experience involving an unexpected item in a package he ordered from Apple. Instead of receiving the iPhone 15 Pro Max he purchased, the user, known as “theEdmard,” claimed to have received a counterfeit Android device disguised with an iOS 17-style interface.

Ed, who resides in the UK, had placed his order for the iPhone 15 Pro Max directly through Apple. Upon opening the box, he immediately noticed discrepancies. The device had a screen protector, which is unusual for new iPhones. Further, the screen quality itself raised suspicions. Ed observed that the screen did not exhibit the characteristics of an OLED display, noting its unusual lighting of black areas and the presence of a bottom ‘chin’ – features not consistent with genuine iPhones.

Upon powering on the device, Ed quickly realized it was not an iPhone 15 Pro Max, but an Android phone modified to resemble an iPhone. The tracking number on the box matched the information on Apple’s website, adding to the confusion.

The counterfeit iPhone 15 Pro Max was pre-loaded with apps like YouTube, Facebook, and TikTok, which are not typically pre-installed on real iPhones. Ed described the operating system as “glitchy and horrible,” with a camera function that was subpar and prone to crashing.

The situation suggests that the genuine iPhone 15 Pro Max Ed ordered was replaced with a knock-off at some point during the delivery process. Ed contacted the delivery company, Dynamic Parcel Distribution (DPD), but they insisted that the package had not been opened or tampered with during transit.

This incident is not isolated. Another user on TikTok reported a similar experience, receiving an Android phone instead of the ordered iPhone 15.

Ed has opened a support ticket with Apple, and while the issue remains unresolved, he mentioned that Apple has been accommodating so far.

This situation serves as a cautionary tale. Ed wisely chose not to complete the setup process on the counterfeit device, avoiding potential security risks like entering his Apple ID or credit card information. Many users, however, might not be as vigilant and could inadvertently compromise their personal information.


Leave a Reply

Your email address will not be published. Required fields are marked *