I
iMore Question
I have spent considerable time doing as instructed in emails ostensibly from Apple to establish that I am person I claim to be. How do I know that these instructions come from Apple, not from a hacker who will benefit from knowing my Apple ID, password and Recovery Key?