Author Archives: mike

ChatGPT and Generative AI Will Be an Increasingly Large Part of Our Future

Have you heard of ChatGPT? It’s likely—the service was launched in November 2022 and gathered 1 million users in the first week. It now has over 100 million users. However, many people are still unaware of it. If you haven’t heard of ChatGPT—or have heard of it but are unclear on what it is or what effect it and similar AI services might have on the world—read on.

ChatGPT is an AI-powered chatbot designed to mimic a human conversationalist. Its goal is to make communicating with computers more natural. Type anything into ChatGPT, and it will respond in clearly written English. You can also ask it to write things for you, like email responses or school essays, and it can generate text in a wide variety of styles, generating fairy tales, poetry, and even computer code. Unlike most chatbots, ChatGPT remembers what you’ve said and considers that context in its replies.

One way to think of ChatGPT is as a sort of search engine like Google or Microsoft’s Bing. There are three huge differences, however. First, ChatGPT answers your queries directly, rather than presenting you with a list of websites that contain information about your query. Second, although it sounds confident, ChatGPT often gets facts wrong. Third, if you ask ChatGPT the same question twice, you might not get precisely the same answer—there’s an element of randomness in its responses.

How could this be? ChatGPT is what’s called a “large language model,” a neural network that trains itself on extremely large quantities of text—reportedly 300 billion words from 570 GB of datasets. That means ChatGPT doesn’t “know” anything. Instead, it looks at a prompt and generates a response based on the probability that one word follows another. In some ways, it’s the ultimate form of auto-complete. Ask ChatGPT to write a fairy tale, and it will start “Once upon a time” because in its training data, text that matches the prompt of “fairy tale” very likely begins with those words. That’s also the source of its mistakes—just because words occur near one another says nothing about their relationship.

It’s difficult to avoid anthropomorphizing ChatGPT and similar AI-driven chatbots that are flooding the market. Their answers sound utterly convincing, but again, they don’t “know” anything. Despite AI being short for “artificial intelligence,” they don’t think (whatever that might mean). They have no agenda and aren’t trying to convince or mislead.

Rather than think of an AI as a person on the other side of the screen, it’s essential to realize its limitations, a few of which include the following:

  • AI-generated text tends to use generalities without much supporting detail, at least without further prompting. Non-experts may not notice, but experts often cringe when they read AI-generated text.
  • When details are present, there’s no guarantee that they’re correct. They could be slightly off or ludicrously wrong, so you must double-check everything before assuming it’s true.
  • If the desired information isn’t in the training set or is only weakly included, conversations about it can get weird. Notably, ChatGPT’s training data is from before 2021, so it can’t converse about anything more recent than that. Plus, it can completely fabricate answers. (When asked about American marathoner Keira D’Amato, ChatGPT stated that she held the world record for the mile while balancing a fruit basket on her head, which has no basis in reality.)
  • When prompts contain words that have multiple meanings, like break, run, and set, AI chatbots can return nonsensical results that confuse the different meanings.
  • Although the programmers behind AI chatbots try to head off requests aimed at producing obviously racist, sexist, or otherwise offensive responses, the training data includes all sorts of biased and even hateful text. As a result, AI chatbots can say things that are either explicitly or implicitly problematic.

Despite these very real concerns, the AI genie is out of the bottle. The two highest-profile announcements have come from Microsoft and Google. Microsoft has invested in ChatGPT-maker OpenAI and integrated the technology behind ChatGPT into a new version of its Bing search engine (available only in the Microsoft Edge browser for now), whereas Google, which pioneered the technology underpinning ChatGPT, has now released its own AI chatbot, Bard.

Those are just the tip of the iceberg. We’ve also seen AI appearing in products that can help write code, summarize meeting notes, polish email messages, and even create unlimited text adventure games. CARROT Weather, the famously snarky iPhone weather app, has even integrated ChatGPT and tuned it to respond with attitude.

It’s early days, but many people have already found good uses for ChatGPT. For instance:

  • If you’re faced with writing a difficult email, consider asking ChatGPT to draft it for you. It likely won’t be perfect, but you might get some text that you can tweak to make it better serve your needs. In fact, for many forms of writing, ChatGPT can both give you a draft to start from and suggest improvements to what you write. This is especially useful for people who struggle with writing in English.
  • ChatGPT can help generate code. For inexperienced programmers, it’s a good start, and for long-time coders, ChatGPT can save typing and debugging time. We tried asking it to write an AppleScript that would create a sequentially numbered calendar event every Monday, and although it didn’t work on the first try, after telling it about the errors generated by the code, it arrived at a functional script.
  • We know people who enjoy composing doggerel for birthday cards. If you’d like to do that but can’t come up with the words or rhymes, ask ChatGPT. For instance, try asking it to write a “roses are red” poem on a particular topic. Or ask it for a country music song— but don’t buy a ticket to Nashville.
  • Need to come up with a clever name for a project or event? Ask ChatGPT to give you ideas that are three or four words long and include certain concepts. Keep asking it to refine or nudge it in new directions. It may not generate exactly what you want, but it will give you lots of ideas to combine on your own.
  • If you’re editing some confusingly written text, you can ask ChatGPT to simplify the language in the paragraph. Again, it may not be perfect, but it might point you in a useful direction.

What all these examples have in common is that they use ChatGPT as a tool, not as a replacement for a person. It’s at its best when it’s helping you to improve what you already do. For instance, it won’t replace a programmer, but it can help get you started with simple scripts. The hard part is learning how to prompt it to output the results you want, but remember, it’s not a person, so you can keep asking and nudging until you’re happy with the results.

There are many reasons to be skeptical of how AI services are being used, and we recommend using them cautiously. But given the levels of interest from businesses and users alike, it seems that they’re here to stay.

(Featured image by iStock.com/Userba011d64_201)

Need to Back Up or Export a Messages Conversation? Try PDF or iMazing

Occasionally, we hear from a client who needs to document a Messages conversation with timestamps, perhaps as part of a lawsuit. The only way to do that on an iPhone or iPad is to take a series of screenshots, but if you have a Mac, there are additional options. The easiest approach is to select the conversation, choose File > Print, and save it as a PDF. If you need a different format, try the macOS iMazing app, which can export all or selected messages from an iPhone backup in PDF, Excel, CSV, and text. It can also export attachments. The trial version lets you extract up to 25 items, and it’s only $39.99 if you have more significant iPhone exporting needs.

(Featured image by iStock.com/Morakot Kawinchan)

You Can Now Upgrade to macOS 13 Ventura When You’re Ready

When upgrading to a new version of macOS, we err on the side of caution, at least in our recommendations. (We’ve been using macOS 13 Ventura for some time now and often install beta releases on secondary machines for testing purposes.) Upgrading is easy, but if you upgrade too soon, the new macOS version could make key apps inoperable, create workflow interruptions, or cause other negative consequences. On the other hand, waiting too long can cause problems—it’s important to stay in sight of the cutting edge for security reasons and to take advantage of Apple’s advances. Upgrading is not an if question; it’s a when question.

That when could be now. There’s no reason you must upgrade to macOS 13 Ventura right away, but if you want to, you should now be able to do so without undue interruptions. Ventura has been quite stable and has received only three updates since its initial release in October 2022:

  • macOS 13.0.1 provided just unspecified bug fixes and two security fixes.
  • macOS 13.1 introduced the Freeform digital whiteboard app, Advanced Data Protection for iCloud, improved searching for photos in Messages, participant cursors for shared notes in Notes, and the option to play sounds in the Find My app. There were also a couple of bug fixes and important security fixes.
  • macOS 13.2 added support for Security Keys for Apple ID for those who need the utmost security, fixed a few bugs, and blocked more security vulnerabilities.

Apple may have another feature or two up its sleeve for Ventura, and we’ll undoubtedly see more updates to address bugs and newfound security vulnerabilities, but there’s no significant reason to wait any longer.

That said, you can continue to delay as long as you’re running macOS 11 Big Sur or macOS 12 Monterey and are staying up to date with Apple’s security releases. (Both have received important updates recently.) Earlier versions of macOS no longer receive security fixes, rendering them more vulnerable to attack. Reasons to delay include:

  • You’re too busy. The upgrade process will take a few hours, and it may take additional time to configure everything properly afterward. When you are ready to upgrade, aim for when a little downtime will be convenient.
  • You’re still using incompatible software. The jump from Big Sur or Monterey to Ventura isn’t a big one, so most modern apps should have been updated to ensure compatibility with Monterey by now. But if you’re still running macOS 10.14 Mojave or earlier with 32-bit apps, you’ll lose access to them if you upgrade. (That first happened with macOS 10.15 Catalina in 2019.) With Mojave no longer receiving security updates, you need to find replacements for those apps and upgrade soon.
  • You need consistent versions for workflow reasons. We’re unaware of any examples here, but it’s not inconceivable that a coworker could be stuck on an older version of macOS and thus older versions of shared productivity apps. If your upgrade would force you to update those apps and introduce compatibility issues when collaborating with that coworker, you may have to wait until your coworker can upgrade as well.

Ventura won’t upend your experience of using a Mac, but it has numerous useful features, large and small. Along with the features mentioned above that shipped in updates, the new iCloud Shared Photo Library enables you to share photos and videos with up to five family members in a separate shared library. Stage Manager provides a new paradigm for window management. Messages lets you edit messages, undo sending, and mark conversations as unread. Similarly, Mail lets you undo sending, schedule messages to send later, and get follow-up reminders for replying. For better videoconferencing quality, Continuity Camera enables you to use your iPhone as a webcam, complete with Desk View for showing what’s on your desk during a call. The Mac finally gets its own Weather app. Perhaps even more important, Ventura shares some of these features with Apple’s other operating systems: iOS 16, iPadOS 16, watchOS 9, and tvOS 16. To take full advantage of those features across all your Apple devices, your Mac must be running Ventura.

However, we want to be upfront about one downside to upgrading to Ventura. Apple replaced System Preferences with System Settings. While we wouldn’t have described System Preferences as having a stellar user interface, it was at least familiar after decades of use. The new System Settings, which tries to mimic the Settings app in iOS and iPadOS, moves numerous settings around and makes some odd and unfortunate design decisions. You may find yourself relying heavily on its search field to find commonly used options.

Before You Upgrade

Once you’ve decided to upgrade to Ventura, you have three main tasks:

  • Update apps: Make sure all your apps are as up-to-date as possible. If you regularly put off updates, now’s the time to let them complete so you have Ventura-compatible versions.
  • Clear space: Ventura needs about 25 GB of free space to upgrade, and the Ventura installer itself is about 12 GB, so we recommend making sure you have at least 37 GB free. Don’t cut this close—you should always have at least 10–20% free space for virtual memory, cache files, and breathing room. Check by choosing About This Mac from the Apple menu and then clicking Storage.
  • Make a backup: Never, ever install an update to macOS without ensuring that you have at least one current backup first. In an ideal world, you’d have an updated Time Machine backup, a bootable duplicate, and an Internet backup. That way, if something goes wrong, you can easily restore.

Upgrading

After completing the above-listed tasks, ensure you don’t need your Mac for a few hours. There’s no telling exactly how long the upgrade will take, so never start an upgrade if you need the Mac soon.

Initiating the upgrade is just a matter of opening System Preferences > Software Update, clicking the Upgrade Now button, and following the instructions. If you’d like more handholding, check out Joe Kissell’s ebook Take Control of Ventura.

After You Upgrade

Part of the reason to set aside plenty of time for your Ventura upgrade is that there are usually cleanup tasks afterward. We can’t predict precisely what you’ll run into, depending on what version of macOS you’re running now and what apps you use, but here are a few situations we’ve noticed in the past:

  • macOS may need to update its authentication situation by asking for your Apple ID password, your Mac’s password, and if you have another Mac, its password too. Don’t worry that your Mac has been compromised by malware—it’s fine.
  • Some apps may have to ask for various permissions even though you previously granted them. Again, that’s fine and won’t happen again.
  • If you use your Apple Watch to unlock your Mac and apps (and you should, it’s great!), you may need to re-enable that in System Settings > Touch ID & Password (it’s an example of something that moved; previously, it was in System Preferences > Security & Privacy > General).
  • If you use Gmail, Google Calendar, or other Google services, you may need to log in to your Google account again.
  • Websites that usually remember your login state may require that you log in again. If you’re using a password manager like 1Password, that’s easy.
  • You may have to re-enable text message forwarding to your Mac. You do this on your iPhone in Settings > Messages > Text Message Forwarding.

With all that housekeeping done, it’s time to check out all the new features in Ventura!

(Featured image by Apple)

Find Devices and People from Your HomePod

This feature evokes one of those “living in the future” moments for us. The recently released HomePod Software 16.3 now supports Find My, which means you can ask Siri to locate one of your devices or a friend or family member who shares their location with you. If you have a HomePod, ask Siri, “Where is my iPhone?” Assuming your HomePod has updated (and if not, update it manually in the Home app), Siri will respond by causing your iPhone to play a sound. Or ask where someone is—Siri will respond with more details for nearby people and city locations for those far away.

(Featured image based on an original by Apple)

A Practical Guide to Identifying Phishing Emails

Phishing is becoming an ever more common way for people to get in trouble when using the Internet. A phishing attack is some communication, usually an email, that tries to lure you into revealing login credentials, financial information, or other confidential details.

A State of Phishing report from security firm SlashNext claims that there were more than 255 million phishing attacks in 2022, a 61% increase from the year before. Luckily, according to the Verizon Data Breach Investigations Report for 2022, only 2.9% of employees click through from phishing emails, but with hundreds of millions of email addresses targeted, the raw numbers are still high. We’ve been noticing—and hearing from clients—that phishing emails are also slipping through spam filters more than in the past.

To help you avoid falling prey to phishing tricks, check out our example screenshots below from real phishing emails, complete with annotations calling out the parts of a message that give it away. All phishing emails are trying to lure you into clicking a link or button to a website that will encourage you to enter your password or other confidential information. Once you realize that a message is a phishing attack, you won’t get suckered into clicking a link or revealing your personal information.

Fake Password Expiration Scam

Our first example is a password expiration scam—it’s trying to get you to click a button to keep your password from expiring. What’s ironic about this scam is that passwords should never expire—forcing users to change them regularly is terrible security practice. If a password is strong and unique, there is no reason to change it unless the site suffers a breach. Let’s look at what identifies this message as a phishing attack.

  1. Note that the Reply-To address is generic and doesn’t match either the email domain used throughout the message or even a major email service provider, which would never send such a message.
  2. Using your email address instead of your name is something scammers do to make the message seem personalized. If this email really came from your IT support staff, they’d be more likely to use your name or leave the email address out. And they’d never send such a message either.
  3. The body of the message uses likely words, but they don’t quite sound like a native English speaker wrote them. The phrasing is slightly off, and quoting words like “send and receive” while not quoting the button name feels strange.
  4. Be careful of things that look like buttons—we’re trained to click them without thinking. In many email apps, you can hover the pointer over a button or link to see where it will go. If you look at the URL at the bottom of the window, you can see that it’s completely different from any other domain listed—a clear sign that this is a phishing message.
  5. “See full terms and conditions” is a strange thing to say in a password-expiration message. What terms and conditions could possibly apply? This is an example of someone who’s not a native English speaker throwing in random phrases they’ve seen elsewhere.
  6. The copyright line is a similar tell. No organization would go to the effort of claiming copyright on a simple support message, and even if it did, it would use its name, not “Email server.”

Spurious Account Access Scam

Our second example pretends to be alerting you to a sign-in to your email account, with the goal of trying to scare you into resetting your password. Frankly, this phishing email stands a good chance of fooling people. You have no way of knowing if your account has been compromised, and if it were compromised, resetting your password is the right thing to do. However, never click through from an email to change a password! You can’t tell if you’re on the right site. Instead, navigate to the site manually, log in, and then change the password. Persuasive though this message is, it does make some mistakes.

  1. The capitalization of “Mail” in the Subject and this line should give you pause. Most people wouldn’t capitalize the word, or they’d refer to something more specific, like your “Gmail” or “Outlook” account.
  2. Another slight strike against this message is the specificity in the timestamp. There’s no reason to include the seconds or the time zone, and most normal people wouldn’t.
  3. There are three mistakes in this line that could tip off a savvy Internet user. It claims to provide the IP address from which the sign-in occurred, but real IP addresses are four sets of numbers from 0 to 255. This one has five sets of numbers, the first of which is way too high at 719. The missing space before the parenthetical makes it look wrong, and finally, the parenthetical claim that the IP address is located in Moscow is overdoing it by invoking scary Russian hackers.
  4. Note that the “reset your password” link doesn’t have an underline, unlike the other two links. Again, that could happen in a legitimate message, but it’s another slight tell. Hovering over the link reveals the fleek.ipfs.io URL at the bottom—clearly nothing associated with your email account and a dead giveaway.
  5. A line saying “Please do not reply to this message” is commonplace in transactional messages, so it makes the message seem more real, but a real warning from an IT department would want to make sure you could contact the support staff.

Fraudulent DocuSign Confirmation

Our final example pretends to be confirmation of a document that you’ve already signed in DocuSign. That’s more clever than trying to get you to sign a document (which we’ve seen in other phishing messages) because most people won’t sign something without looking at it carefully. But you might want to see what document this message is talking about and be suckered into clicking through. What’s trickiest about this message is that it has merely changed some of the text in a real DocuSign message, so someone familiar with DocuSign might think it was real. But there are always giveaways.

  1. The Subject line of this message is a tell because its grammar is atrocious.
  2. The Reply-To address should also ring warning bells because it’s so generic that it couldn’t possibly go with an organization with which you were signing documents.
  3. The yellow line claiming that the email has been scanned for viruses will likely seem unusual to you—even if an email app presented such a message, it likely wouldn’t do so in the body of the message.
  4. There’s nothing wrong with the View Completed Documents button, which looks exactly as it would in a real DocuSign message. However, hovering over it reveals the URL at the bottom, which has nothing to do with docusign.net.
  5. Someone familiar with DocuSign messages might notice that there’s no email address under “Administrator,” as there should be. But that’s a long shot, we know.
  6. As with an earlier example, personalizing with an email address is a definite tell. A real person would have entered your name there, if anything.
  7. Once again, the phrasing isn’t what a native English speaker would say, but even more problematic is how it asks you to sign the enclosed file, whereas the text and button in the blue box say that the document is completed. The mismatch is a complete giveaway.

We didn’t have room to show the rest of this message, which adds to the verisimilitude by continuing to copy text from a real DocuSign message. The two remaining tells further down are links that are empty when you hover over them and an unknown name in the fine print at the bottom, which reads (bold added for emphasis):

This message was sent to you by sefanya maitimoe who is using the DocuSign Electronic Signature Service. If you would rather not receive email from this sender you may contact the sender with your request.

Overall Advice

Let’s distill what we’ve seen in the examples above into advice you can apply to any message:

  • Pay close attention to emails that are very simple, like our second example above, because there’s less they might get wrong.
  • With legitimate-looking messages copied from large firms like DocuSign or PayPal, pay special attention to unfamiliar names and email addresses.
  • Don’t click anything in an email unless you’ve given it a close-enough look that you’re sure it’s legitimate. It’s too easy to skim and click without thinking, which the scammers count on.
  • Read the text of messages with an eye for capitalization, spelling, and grammatical mistakes. Scammers could write correct English, but if they don’t speak the language natively, they’re likely to make mistakes.
  • Evaluate any claim about something happening within your organization against what you know to be true. It’s always better to ask someone if passwords need to be reset or accounts are being deactivated instead of assuming a random email message is true.
  • Fight the urge to click big, legitimate-looking buttons. They’re easy to make and hard to resist, but if you can preview the URL under one before clicking, it will often reveal the scam.
  • None of our examples fell into this category, but if an email message is just an image that’s being displayed in the body, it’s certainly fake.

Stay safe out there!

(Featured image by iStock.com/Philip Steury)

Quickly Put Lots of Files in a Folder with One Command

Imagine that you’re working with a bunch of files, and you want to put a set of them in a new folder. You could stop what you’re doing, make a new folder, select all the files, and drag them into the folder, like an animal. Or you could take advantage of a slick Finder command that Apple added in macOS 11 Big Sur. Simply select the files you want to put in a folder, Control-click one of them, and choose New Folder with Selection (X Items) from the top of the contextual menu. A folder called “New Folder With Items” appears, with your selected files inside. This feature may not be life-changing, but some people use it often.

(Featured image by iStock.com/ArLawKa AungTun)

FAQs about Apple’s Messages App and What Can Go Wrong When Using It

Most of us rely on Messages every day to text with family, friends, and colleagues. Not surprisingly, we’ve fielded numerous questions surrounding common confusions with this popular app. We hope our answers here will help you use Messages more effectively and work around problems.

What’s the difference between blue and green bubble conversations?

A common question is why some conversations have blue bubbles and others have green bubbles. The answer is that the color indicates whether the conversation uses iMessage or SMS/MMS. Blue bubble conversations use iMessage and are solely between Apple users, whereas green bubble conversations are with friends using SMS/MMS on Android or other phones.

What are iMessage and SMS/MMS, and how do they differ?

Messages supports two protocols for text messaging: iMessage and SMS/MMS. Although the end result is the same, apart from the color of the conversation bubbles, the two are quite different.

SMS (Short Message Service) and MMS (Multimedia Messaging Service) are cellular technologies that require only a wireless plan from a cellular carrier. SMS is limited to 160 characters of text, though longer messages are usually broken into multiple segments and reassembled upon receipt. MMS enables sending of pictures, audio, video, and more, as long as the message size doesn’t exceed carrier limits, which range from 300 KB to 3 MB). Because SMS uses extremely small amounts of bandwidth, SMS text messages may get through even when cellular service is too weak to place a call, a useful fact to know in emergencies.

In contrast, iMessage is proprietary to Apple and works only in Messages on Apple devices, including the iPhone, iPad, Mac, and Apple Watch. Apple has said the size limit for a message is 100 MB, but people have transferred even larger files. That’s possible in part because iMessage relies on Internet access, which requires either Wi-Fi or a sufficiently strong cellular connection. If an Internet connection isn’t available for either party when you want to send a message using iMessage, Messages tries to fall back on SMS/MMS, which can result in blue and green bubbles in the same conversation.

How does Messages work on Apple devices that lack cellular connectivity?

It’s no problem for all Apple devices to use iMessage when they have Internet connectivity through Wi-Fi, but you can also send and receive SMS/MMS messages on a Mac or iPad that has no native cellular connectivity. Apple extends SMS/MMS support to Messages on such devices by routing through your iPhone. In the iPhone’s Settings > Messages > Text Message Forwarding, you can specify which of your devices can send and receive SMS/MMS messages through your iPhone.

Keep this setting in mind if you stop receiving SMS/MMS text messages on your Mac or iPad, for instance. It’s not unheard of for it to get turned off after a major operating system upgrade.

How are iMessages addressed, and can that cause problems?

As cellular technologies, SMS and MMS are tied to a phone number. iMessage, however, can send and receive messages from one or more phone numbers and email addresses. The first time someone sets up an iPhone, it registers that iPhone’s number with Apple’s iMessage servers. That’s why, when you type in a phone number to start a new Messages conversation, Messages knows whether to make the conversation blue or green.

Because iMessage also supports email addresses, you can start Messages conversations with a fellow iMessage user when all you know is their email address, as long as they’ve enabled that email address to send and receive messages.

In Settings > Messages > Send & Receive, you can specify which of your email addresses can receive messages and reply to them. If you want to be easily findable, select all of them, in addition to your phone number. Otherwise, turn off the email addresses you don’t want used. You can add an email address or phone number to this list on appleid.apple.com in Personal Information > Reachable At.

You can also specify which of your phone numbers or email addresses is used to start new iMessage conversations. In general, we recommend sticking with your phone number unless you plan to change it soon.

As you can imagine, changing these settings can cause problems. If you disable receiving for an email address used by an existing conversation, people in that conversation won’t be able to send you messages anymore. Even worse would be changing your main Apple ID address, which would break a lot of conversations, all of which would have to be started afresh with the new Apple ID.

Changing phone numbers is also problematic for the same reasons, though that probably happens less often. If you’ve temporarily attached a second phone number to your iPhone using eSIM while traveling, for instance, be careful how you initiate conversations from it because they’ll break as soon as you disable the associated plan.

Finally, switching from an iPhone to a non-Apple phone can cause delivery problems for SMS/MMS messages. To prevent that, either turn off iMessage in Settings > Messages before you switch or deregister iMessage online.

What happens when a message fails to send, and how do I fix it?

Occasionally, when you try to send a message, you may see one or more red exclamation points and an alert that says “Not Delivered.”

Most of the time, the problem is just poor connectivity, either for you or your recipient. First, just click an exclamation point and try again in case it was a one-time problem. If a second try doesn’t succeed, check your Internet connection in Safari, and if it seems to be working, tap Try Again. If you’re using iMessage and it remains stuck, tap Send as Text Message, which switches from iMessage to SMS. If that’s not it, there are a few other possibilities:

  • Make sure iMessage is enabled in Settings > Messages.
  • See if you have another phone number or email address for the recipient. If they disabled message receiving for the one you were using, that could cause failures.
  • If the problem occurs when sending to an SMS recipient while using a device without cellular connectivity, make sure the device is enabled in Settings> Messages > Text Forwarding.
  • If the problem occurs with an image or other file sent via MMS, it might be too large. If so, you may have to resort to email.
  • To ensure the iPhone isn’t temporarily confused, restart it (which is best done using Siri if you’re running iOS 16—just say, “Hey Siri, reboot.”) and try again.

Why do I see slightly different conversations on my iPhone and Mac?

With text message forwarding turned on for all your devices and each device logged into the same Apple ID, Messages should have the same conversations everywhere. In practice, that’s not always true, so Apple introduced Messages in iCloud, which uses iCloud as a centralized location for all messages. When it’s turned on, everything (other than failed SMS messages) should stay in sync.

Turn on Messages in iCloud in Messages > Settings/Preferences > iMessage on the Mac and in Settings > Your Name > iCloud > Apps Using iCloud > Show All > Messages on the iPhone or iPad. Make sure to enable it for every device.

Can someone eavesdrop on my Messages conversations?

SMS isn’t at all secure, so don’t use it for truly sensitive information (and whenever possible, use an authentication app instead of SMS for two-factor authentication codes). In contrast, Apple encrypts all iMessage conversations, so there’s no worry about someone listening in when you’re using a public Wi-Fi network at a hotel. However, iMessage conversations are not end-to-end encrypted by default, which means that law enforcement could compel Apple to turn over your data stored in its data centers. To provide full end-to-end encryption, Apple lets you turn on Advanced Data Protection for iCloud; the downside is that Apple can no longer help you recover your account if you forget your Apple ID password.

Other messaging apps also focus on security, most notably the free Signal, which is open source, provides end-to-end encryption, and lets you secure the app with an additional password. Messages can be set to self-destruct after a certain amount of time. The only downside is that you have to convince the people you want to message to use it. WhatsApp also provides end-to-end encryption, but you have to enable encryption for backups. It also shares a boatload of other information with Facebook to help it personalize ads, including your phone number, contacts, location information, device information, and more.

Don’t get the wrong impression—Messages usually works well. But on those rare occasions when you have problems, we hope this information explains more of what’s happening and helps you work around your issues.

(Featured image based on an original by iStock.com/fizkes)

What’s the Difference between Removing and Deleting an App?

There are many reasons you might want to get rid of apps from your iPhone or iPad. To begin, touch and hold on a blank spot on a Home Screen to enter “jiggle mode.” Then tap the ⊝ icon for any app to see the question about whether to delete the app entirely or merely remove it from the Home Screen. Delete the app if you don’t want to use it anymore or need to reclaim the space it occupies. (You can download it from the App Store again.) Remove the app from the Home Screen if you want to reduce clutter, keep the app on your device, and don’t mind opening it from the App Library (swipe left past all the Home Screens) or from Search (swipe down from the middle of the screen).

(Featured image based on an original by iStock.com/Photosbypatrik)

Is Your Wi-Fi Network a Security Risk?

With Wi-Fi security, it’s easy to fall into the “out of sight, out of mind” trap. Your Wi-Fi router probably lives in a corner or closet, and of course, Wi-Fi’s radio waves are invisible. But the ease of connecting your devices to your Wi-Fi network means it’s equally as easy for a hacker to connect to your network and eavesdrop on your traffic. Or rather, it’s easy unless you take advantage of the security options available in every Wi-Fi router.

Before looking at those options, let’s discuss the importance of securing your wireless network. The fact is, we all send sensitive data over Wi-Fi and onto the Internet. That data includes passwords, financial information, and personal details, all of which could be used for identity or outright theft. For those who work at home, it may also include important corporate credentials and information. In addition, if your Wi-Fi network is open for everyone and has a bandwidth cap, you could be throttled or incur additional charges due to extra usage from someone using your network without your knowledge. Worse, someone could engage in illegal activity from your network, potentially putting you at legal risk.

Here are six ways you should secure your Wi-Fi network, plus another that’s usually not worth the effort. Exactly how you go about these tasks varies depending on your Wi-Fi router, but they should all be easy to accomplish.

1. Change Your Wi-Fi Router’s Default Password

Every Wi-Fi router has an app- or Web-based administrative interface where you can adjust settings, including security options. The first thing you should do when setting up a new Wi-Fi router is change the password for accessing that admin interface. (And if you didn’t do that when you set up your current Wi-Fi router, go do it now. Immediately. We’ll wait.) The default passwords are well known to hackers, who can use them to take over routers and turn off all the other security settings.

2. Change the Default Network Name (SSID)

Every Wi-Fi network has a name—technically an SSID, or Service Set Identifier. There’s no security benefit in changing it to anything in particular, but you should change it from the default name. That’s because default names often identify the router’s manufacturer, such as “Netgear” or “Linksys,” and some routers have known vulnerabilities or password styles that make it easier to break in. Of course, the main advantage of changing the network name is that it makes it easier to pick out from any other nearby networks.

3. Update Your Wi-Fi Router’s Firmware

Wi-Fi router manufacturers frequently fix security vulnerabilities and release new firmware versions. Check to make sure your Wi-Fi router has the latest firmware available, and if there’s an option for it to update its firmware automatically, turn that on.

4. Disable WPS (Wi-Fi Protected Setup) If Possible

When you connect a new device to your Wi-Fi network, you need to enter your Wi-Fi password. That’s entirely reasonable, and Apple devices automatically offer to share that password with your other Apple devices and other people in your Contacts. More generally, a technology called Wi-Fi Protected Setup (WPS) was designed to enable connecting without typing the Wi-Fi password, either by entering an 8-digit PIN or pressing a button on the router. The button is fine—no one can connect without physical access to the router. But the PIN is horribly insecure and can be brute forced with readily available cracking software. If your router supports WPS—not all do, happily—turn it off entirely.

5. Create a Guest Network

You’ll probably want to give visitors access to your Wi-Fi network so they can get to the Internet. The best way to do that is to create a guest network—a feature in nearly all Wi-Fi routers—separate from your main Wi-Fi network. It has a different name and password, and its traffic is isolated from yours, ensuring that even if a hacker were to access it, they wouldn’t be able to eavesdrop on your communications. It can have a simpler password since all it’s protecting is your bandwidth. One additional tip—put “Internet of Things” devices like smart appliances, video game consoles, and the like on your guest network to ensure they don’t provide access to your main network’s traffic if they’re hacked. You probably won’t want to do that with HomeKit devices, which will work better on the same network as your Apple devices.

6. Use Strong WPA2 or WPA3 Encryption

After changing the default admin password, this is the second-most important piece of Wi-Fi security advice. All traffic on a Wi-Fi network can (and should) be encrypted so hackers can’t eavesdrop with impunity. The first wireless security protocol was WEP (Wired Equivalent Privacy), which was commonly used from the late 1990s through 2004. Unfortunately, WEP is so easily broken today that it’s no longer considered secure. If you still use WEP, immediately switch to WPA2 (Wi-Fi Protected Access). There’s also WPA3, which is even more secure but is available only in hardware sold in the last few years.

Don’t Bother Hiding Your SSID

Finally, you may see suggestions that you should hide your Wi-Fi SSID, which prevents nearby devices from displaying it when they list available networks. That might seem like it would improve security, but all it does is prevent the sort of people who aren’t a threat anyway from seeing it. Anyone with the necessary software and skills to break into an unprotected or weakly protected Wi-Fi network can still detect and access a hidden network. They might even be more interested in what’s there, given that the network owner took the trouble to hide it. As long as you follow all the other advice in this article, there’s no benefit in hiding the SSID as well.

(Featured image by iStock.com/CASEZY)

Featured website launch: eBike Nomads

Occasionally, I like to showcase websites that we’ve recently built. The latest, eBike Nomads, was really a blast to work on. David Garcia, from North Bend, Washington, is an avid cyclist and expert in European traveling. We built this site to show off his 2023 season of travels. 10 unique, fully-supported eBike tours through some of the most spectacular settings in Europe: Italy, Austria, Germany, Czech Republic, and Slovenia. He’s looking for people to join him, so feel free to get in touch with him if that sounds interesting.

On the technology side, I was proud that we put together a great looking site with some cool features, like a sticky bar at the bottom of the page, cool hover effects over the images, nice fading effects as you scroll the page, fun galleries, and a very usable open/close toggle to handle frequently asked questions. Plus of course we had fantastic images to work with.