Category Archives: Apple

What’s the Difference between Removing and Deleting an App?

There are many reasons you might want to get rid of apps from your iPhone or iPad. To begin, touch and hold on a blank spot on a Home Screen to enter “jiggle mode.” Then tap the ⊝ icon for any app to see the question about whether to delete the app entirely or merely remove it from the Home Screen. Delete the app if you don’t want to use it anymore or need to reclaim the space it occupies. (You can download it from the App Store again.) Remove the app from the Home Screen if you want to reduce clutter, keep the app on your device, and don’t mind opening it from the App Library (swipe left past all the Home Screens) or from Search (swipe down from the middle of the screen).

(Featured image based on an original by iStock.com/Photosbypatrik)

Is Your Wi-Fi Network a Security Risk?

With Wi-Fi security, it’s easy to fall into the “out of sight, out of mind” trap. Your Wi-Fi router probably lives in a corner or closet, and of course, Wi-Fi’s radio waves are invisible. But the ease of connecting your devices to your Wi-Fi network means it’s equally as easy for a hacker to connect to your network and eavesdrop on your traffic. Or rather, it’s easy unless you take advantage of the security options available in every Wi-Fi router.

Before looking at those options, let’s discuss the importance of securing your wireless network. The fact is, we all send sensitive data over Wi-Fi and onto the Internet. That data includes passwords, financial information, and personal details, all of which could be used for identity or outright theft. For those who work at home, it may also include important corporate credentials and information. In addition, if your Wi-Fi network is open for everyone and has a bandwidth cap, you could be throttled or incur additional charges due to extra usage from someone using your network without your knowledge. Worse, someone could engage in illegal activity from your network, potentially putting you at legal risk.

Here are six ways you should secure your Wi-Fi network, plus another that’s usually not worth the effort. Exactly how you go about these tasks varies depending on your Wi-Fi router, but they should all be easy to accomplish.

1. Change Your Wi-Fi Router’s Default Password

Every Wi-Fi router has an app- or Web-based administrative interface where you can adjust settings, including security options. The first thing you should do when setting up a new Wi-Fi router is change the password for accessing that admin interface. (And if you didn’t do that when you set up your current Wi-Fi router, go do it now. Immediately. We’ll wait.) The default passwords are well known to hackers, who can use them to take over routers and turn off all the other security settings.

2. Change the Default Network Name (SSID)

Every Wi-Fi network has a name—technically an SSID, or Service Set Identifier. There’s no security benefit in changing it to anything in particular, but you should change it from the default name. That’s because default names often identify the router’s manufacturer, such as “Netgear” or “Linksys,” and some routers have known vulnerabilities or password styles that make it easier to break in. Of course, the main advantage of changing the network name is that it makes it easier to pick out from any other nearby networks.

3. Update Your Wi-Fi Router’s Firmware

Wi-Fi router manufacturers frequently fix security vulnerabilities and release new firmware versions. Check to make sure your Wi-Fi router has the latest firmware available, and if there’s an option for it to update its firmware automatically, turn that on.

4. Disable WPS (Wi-Fi Protected Setup) If Possible

When you connect a new device to your Wi-Fi network, you need to enter your Wi-Fi password. That’s entirely reasonable, and Apple devices automatically offer to share that password with your other Apple devices and other people in your Contacts. More generally, a technology called Wi-Fi Protected Setup (WPS) was designed to enable connecting without typing the Wi-Fi password, either by entering an 8-digit PIN or pressing a button on the router. The button is fine—no one can connect without physical access to the router. But the PIN is horribly insecure and can be brute forced with readily available cracking software. If your router supports WPS—not all do, happily—turn it off entirely.

5. Create a Guest Network

You’ll probably want to give visitors access to your Wi-Fi network so they can get to the Internet. The best way to do that is to create a guest network—a feature in nearly all Wi-Fi routers—separate from your main Wi-Fi network. It has a different name and password, and its traffic is isolated from yours, ensuring that even if a hacker were to access it, they wouldn’t be able to eavesdrop on your communications. It can have a simpler password since all it’s protecting is your bandwidth. One additional tip—put “Internet of Things” devices like smart appliances, video game consoles, and the like on your guest network to ensure they don’t provide access to your main network’s traffic if they’re hacked. You probably won’t want to do that with HomeKit devices, which will work better on the same network as your Apple devices.

6. Use Strong WPA2 or WPA3 Encryption

After changing the default admin password, this is the second-most important piece of Wi-Fi security advice. All traffic on a Wi-Fi network can (and should) be encrypted so hackers can’t eavesdrop with impunity. The first wireless security protocol was WEP (Wired Equivalent Privacy), which was commonly used from the late 1990s through 2004. Unfortunately, WEP is so easily broken today that it’s no longer considered secure. If you still use WEP, immediately switch to WPA2 (Wi-Fi Protected Access). There’s also WPA3, which is even more secure but is available only in hardware sold in the last few years.

Don’t Bother Hiding Your SSID

Finally, you may see suggestions that you should hide your Wi-Fi SSID, which prevents nearby devices from displaying it when they list available networks. That might seem like it would improve security, but all it does is prevent the sort of people who aren’t a threat anyway from seeing it. Anyone with the necessary software and skills to break into an unprotected or weakly protected Wi-Fi network can still detect and access a hidden network. They might even be more interested in what’s there, given that the network owner took the trouble to hide it. As long as you follow all the other advice in this article, there’s no benefit in hiding the SSID as well.

(Featured image by iStock.com/CASEZY)

Featured website launch: eBike Nomads

Occasionally, I like to showcase websites that we’ve recently built. The latest, eBike Nomads, was really a blast to work on. David Garcia, from North Bend, Washington, is an avid cyclist and expert in European traveling. We built this site to show off his 2023 season of travels. 10 unique, fully-supported eBike tours through some of the most spectacular settings in Europe: Italy, Austria, Germany, Czech Republic, and Slovenia. He’s looking for people to join him, so feel free to get in touch with him if that sounds interesting.

On the technology side, I was proud that we put together a great looking site with some cool features, like a sticky bar at the bottom of the page, cool hover effects over the images, nice fading effects as you scroll the page, fun galleries, and a very usable open/close toggle to handle frequently asked questions. Plus of course we had fantastic images to work with.

Protect Your iPhone Passcode by Using Face ID or Touch ID

This is troubling. Joanna Stern and Nicole Nguyen of the Wall Street Journal have published an article (paywalled) and accompanying video that describes attacks on hundreds of iPhone users in major cities throughout the United States. Some attacks involve drugging people in bars or even violence, but the most avoidable involve the thief or a confederate surreptitiously observing the iPhone user entering their passcode before snatching the iPhone and running.

However it happens, once the thief has a user’s iPhone and passcode, they change the user’s Apple ID password—which is shockingly easy for them to do. With the new password,  they disable Find My, making it impossible for the iPhone’s owner to erase it remotely. Then they use Apple Pay to buy things and access passwords stored in iCloud Keychain. They can even look in Photos for pictures of documents containing confidential information, such as credit cards and ID cards. After that, they may transfer money from bank accounts, apply for an Apple Card, and more, all while keeping the user locked out of their account. Of course, they’ll resell the iPhone too. (Apparently, Android users are susceptible to similar attacks, but Android phones have a lower resale value, so they aren’t being targeted as much.) Victims have reported thefts of tens of thousands of dollars, and many of them remain unable to access their Apple accounts.

We fervently hope Apple addresses this vulnerability in iOS 17, if not before. At a minimum, Apple should require users to enter their current Apple ID password before allowing it to be changed, much as the company requires at the Apple ID website. Plus, Apple would ideally do more to protect access to iCloud Keychain passwords from a passcode-wielding iPhone thief. (The closest we have now is a different Screen Time passcode, which can prevent account changes, but it blocks access to so many settings that most people will find it too annoying and turn it off.)

Although the chances of you falling prey to one of these attacks is vanishingly low, particularly if you don’t frequent urban bars or areas that suffer from snatch-and-run thefts, the consequences of a passcode theft are so severe that it’s worth taking steps to deter the malicious use of your passcode. With luck, you’re already doing many of these things, but if not, take some time to re-evaluate your broader security assumptions and behavior.

Pay More Attention to Your iPhone’s Physical Security While in Public

Most importantly, you don’t want to make it easy for a thief to grab your iPhone. Apart from a wrist strap, there’s no reliable way to prevent someone from snatching it from your hand. When you’re not actively using your iPhone, stash it in a secure pocket or purse instead of leaving it out on a bar or table. Many people are blasé about protecting their iPhones, so if you take more precautions, you’re less likely to have problems.

Always Use Face ID or Touch ID When Unlocking Your iPhone in Public

The easiest thing you can do to protect yourself from opportunistic attacks is to rely solely on Face ID or Touch ID when using your iPhone in public. If a thief sees you entering a passcode, you could become a target.

We know people who avoid Face ID or Touch ID based on some misguided belief that Apple controls their biometric information, but nothing could be further from the truth. Your fingerprint or facial information is stored solely on the device in the Secure Enclave, which is much more secure than passcode entry in nearly all circumstances.

We’ve also run across people for whom Face ID or Touch ID works poorly—if that’s you, conceal your passcode from anyone watching, just as you would when entering your PIN at an ATM.

Use a Strong Passcode

By default, iPhone passcodes are six digits. You can downgrade that security to four digits, but don’t—that’s asking for trouble. You can also upgrade the security to an alphanumeric passcode that can be as long as you like, but that’s overkill, in our opinion. Video would still capture you entering it, and if you’re focused on entering it accurately, you’re less likely to be aware of someone shoulder-surfing behind you.

That said, make sure your passcode isn’t trivially simple. Basic patterns like 333333 and 123456 are far more easily observed or even guessed. There’s no reason not to use a passcode that’s memorable but unguessable, such as your high school graduating class combined with your best friend’s birth month.

Don’t Share Your Passcode Beyond Trusted Family Members

Even those who don’t have motivated thieves targeting them need to be careful to protect their passcode. Our simple rule of thumb is that if you wouldn’t give someone complete access to your bank account, you shouldn’t give them your passcode. If extreme circumstances require you to trust a person outside that circle temporarily, reset the passcode to something they’ll remember—even 111111—and change it back as soon as they return your iPhone.

Switch from iCloud Keychain to a Third-Party Password Manager

Although Apple keeps improving iCloud Keychain’s interface and capabilities, having all your Internet passwords accessible to a thief who has your iPhone and passcode is unacceptable. Instead, we suggest you use a third-party password manager like 1Password or BitWarden (we no longer recommend LastPass). Even when a third-party password manager allows easier unlocking with Face ID or Touch ID (which both 1Password and BitWarden do), they fall back on their master password, not the device’s passcode. After you move your passwords from iCloud Keychain to another password manager, be sure to delete everything from iCloud Keychain.

Delete Photos Containing Identification Numbers

Many people take photos of their important documents as a backup in case the original is lost. That’s a good idea, but storing photos of your driver’s license, passport, Social Security card, credit cards, insurance card, and more in Photos leaves them vulnerable to a thief who has your iPhone and your passcode. With the information in those cards, the thief has a much better chance of impersonating you when opening credit cards, accessing financial accounts, and more. Instead, store those card photos—or at least the information on them—in your password manager.

A Security Wakeup Call

Again, although it’s very unlikely that you would fall prey to one of these attacks, we appreciated the encouragement to re-evaluate our security assumptions and behaviors, and we suggest you do the same.

(Featured image by iStock.com/AntonioGuillem)

How to Share a Contact Card without Sharing Everything in iOS 16

Apple makes it easy to share contact cards on the iPhone or iPad—just scroll down in a contact and tap Share Contact. But what if you don’t want to share every piece of data on that card? To avoid oversharing in iOS 16 or iPadOS 16, tap Filter Fields at the top of the Share sheet and deselect the private items. If the card has a lot of data and you want to share only a few items, tap Deselect All Fields at the bottom of the sheet and select only what you want to share. Unfortunately, your selections aren’t remembered if you share the same card again later, so be sure to reset your selections each time you share.

(Featured image by iStock.com/diane39)

You Can Use Face ID in iOS 16 on Newer iPhones When You’re Lying on Your Side

If you’ve ever tried to use Face ID to unlock an iPhone while lying on your side in bed, you may have noticed that it didn’t work. That’s because Face ID used to require that the iPhone be upright, in portrait mode. In iOS 16, however, Apple has improved Face ID so it will unlock your iPhone even when you’re lying on your side and the iPhone is in landscape orientation. Alas, this capability requires an iPhone 13 or iPhone 14, but if you have one of those phones, give it a try in bed tonight—you don’t need to adjust any settings.

(Featured image by iStock.com/Kateryna Onyshchuk)

What Is Google Web & App Activity, and Should You Leave It Enabled?

Earlier this year, some of our clients received an email from Google reminding them that they have Web & App Activity turned on. Those with a healthy dose of caution were concerned that it might be a phishing attack, but no, it’s legitimate. Their next questions were often, “Wait, what is Web & App Activity, and do I want it enabled?” Here are some answers.

What Is Web & App Activity at Google?

Simply put, Web & App Activity is a record of almost everything you do on Google sites, apps, and services. It includes your searches and activity in Google Search, Google Maps, Google Assistant, Google News, Google Photos, YouTube, and more. If you use Google Chrome as your browser, it includes your browsing history. It also stores usage and diagnostic information from Android smartphones. What’s less obvious is that Web & App Activity can even include information from sites and apps that partner with Google to show ads or that use Google services. Activity can be saved even when you’re offline or signed out.

That sounds like a lot, and it is! One reason there’s so much is because Google is such a dominant provider of services on the Internet today. Google Search is by far the most popular search engine, only recently has Apple Maps competed head-to-head with Google Maps, YouTube is the main source of video on the Internet, and so on. It’s hard to avoid Google, even if you wanted to, which most people don’t.

In addition to offering a lot of services, there are two more reasons why Google collects so much information about its users: personalization and advertising:

  • Personalization: When a service knows what you’ve searched for and how you’ve used it in the past, it can adjust its behavior to improve future usage. For instance, Google Search can suggest search results that are nearby you if it knows where you are, and YouTube can recommend videos based on what you’ve watched previously.
  • Advertising: The bulk of Google’s revenue comes from companies that pay Google to display their ads. We’re talking hundreds of billions of dollars per year, which is why it’s important to Google to learn as much about you as possible in order to give advertisers the best chance of enticing you to click their ads.

For many (most?) people, there’s a tension between personalization and advertising. You want Google to know more about you so its services work better, but you may not want the company to know so much about you that it can charge advertisers a higher price for access to you. Ad-driven companies like Google claim people prefer personalized ads, but most people we talk with dislike having ads—particularly for already purchased items or past vacations—follow them around the Internet. That’s what Apple is channeling with its Tracked video.

How Should You Configure Web & App Activity?

What you should do depends on how much benefit you feel you derive from the personalization of Google apps and services, and what you think about personalized ads. On your Activity Controls page, Google provides a single master switch that lets you pause Web & App Activity, though you’ll have to acknowledge that it may impact your experience of Google sites, apps, and services signed in to your account. Make sure to scroll down on this page to access the settings for Location History, YouTube History, and Personalized Ads.

By clicking the icons for each service under “See and delete activity,” you can get a sense of just what Google has recorded about you, and you can delete data manually if it perturbs you. Google can also automatically delete activity older than 3 months, 18 months, or 36 months. The utility of keeping data longer is if you want to review what you did in the past. Google says that auto-deleting data sooner will reduce personalization, but that feels like a stretch.

There are two important subsettings:

  • Chrome: In the Web & App Activity card, under Subsettings, there’s a checkbox for including Google Chrome history and activity from sites, apps, and devices that use Google services. We suggest disabling this—it seems unlikely that it would improve your Internet experience sufficiently to warrant the privacy intrusion.
  • Audio: You’ll also find another checkbox for voice and audio activity, which Google uses to improve its audio capabilities. The reason to turn this setting off is that human reviewers may listen to your audio samples. Google anonymizes and deletes the data after 7 days, but it may still feel icky to have people listening to your audio clips.

Scrolling down, you hit cards for the three major privacy settings that Google separates from Web & App Activity. (You can also access these on Google’s Data & Privacy page, where you can also start a privacy checkup.)

  • Location History: With this setting on, Google knows where you go with your devices, even when you aren’t using a specific Google service, to give you personalized maps, location-based recommendations, and more. If you look through this data and are creeped out by the fact that it shows your every movement, turn it off.
  • YouTube History: This setting saves the videos you search for and watch to provide better recommendations, remember where you left off, and more. This option may feel innocuous as long as you don’t mind your video watching being associated with your account—if you’re viewing content that would embarrass you if it got out, perhaps disable this setting.
  • Ads: You can disable personalized ads from Google, which prevents Google from using your information to help advertisers entice you to buy more stuff. You’ll still see the same number of ads, but they should be less aimed at you personally.

Finally, there’s a grab-bag collection of lesser-known Google services that track your activity. To find these and delete the data they stored about you, go back to the Web & App Activity card, click Manage All Web & App Activity at the bottom, and then click Other Activity in the sidebar. It includes controls for Google Pay, Google Wallet, Google Workspace search history, YouTube channel subscriptions, YouTube “Not interested” feedback, and many other Google-related services. Most of this stuff seems unobjectionable, but delete it if it bothers you.

It’s hard to say if leaving any of these settings on or turning them off make a real difference in your life. If Google collecting all this data bothers you, try disabling everything and see if the lack of personalization makes for a worse experience. Or pick and choose based on things that perturb you more (like location tracking and ads) or less (like YouTube history). There’s no harm in testing!

(Featured image by iStock.com/ValeryBrozhinsky)

Use Quick Look to Preview Spotlight Results in Ventura

When you search using Spotlight on the Mac, it provides a decent amount of information about each result, including name and other metadata. But what if you want to see what’s behind the search result? In macOS 13 Ventura, Apple added Quick Look support to Spotlight so you can easily preview the search results. Do a search, click or use the arrow keys to select a search result, and then press the Space bar to open it in a Quick Look window. It even renders websites!

(Featured image based on an original by iStock.com/Nastco)

The Amazingly Convenient Way to Scan Documents Using Your iPhone or iPad

On occasion, we all need to scan a document—an invoice, a recipe, instructions from a book—but far more people have an iPhone or iPad than a hardware scanner. Luckily, Apple has built a scanning capability into iOS, iPadOS, and macOS for some years now. The next time you’re faced with a piece of paper that you need in digital form, follow the instructions below.

Scan Directly with an iPhone or iPad

The little-known key to scanning with an iPhone or iPad is the Files app, which lets you scan one or more pages and save a PDF anywhere you like. Since it’s particularly easy to use iCloud Drive with Files, it’s a good way to create a file you can work with on your Mac later. (You can also scan into a note using the Notes app, but that’s mostly useful for storing information rather than creating files you can upload to the Web, send via email, or share in other ways.)

  1. Open the Files app, tap Browse in the toolbar, and navigate to the folder where you want the scanned document to end up.
  2. Tap the icon at the upper right and select Scan Documents.
  3. The camera viewfinder appears. At the top of the screen, note the controls for the flash (the lightning bolt), the color filter, and the Auto/Manual toggle (below left). Immediately tap Auto to switch to Manual—we recommend using Manual until you’ve become fluid enough with the controls to let your device scan for you. You seldom need to change the flash setting, but you can force the flash on or off if you like. Similarly, the color filter option defaults to a color scan, but you can set it to grayscale or black-and-white if you want. It’s easier to make that change afterward.
  4. Hold the iPhone steady so it can detect the edges of the paper. When it has, tap the round white shutter button to take a photo (above left). In Auto mode, it will just keep taking images for you, which is efficient with multiple pages but stressful if you aren’t ready.
  5. Examine the scan to see if it looks good. You can drag the corners to adjust the selection to capture just paper, or if the image isn’t right, tap Retake for a do-over (above right). When you have it as you want it, tap Keep Scan.
  6. If you want to scan additional pages, put them in the viewfinder and repeat Steps 4 and 5 (below left). Or, if you’re done, tap Save and jump directly to naming your file (below right).
  7. If a page isn’t exactly the way you want it, tap the image well to the left of the shutter button to make changes. On the edit page, the crop icon at the bottom returns you to the previous screen to adjust the corners again. The color filter icon lets you choose from Color, Grayscale, Black & White, and Photo—stick with color or grayscale for most documents. If the document came in at the wrong orientation, tap the rotate icon. If the image still isn’t to your liking, you can retake it or tap the trash icon to delete it. If you’ve scanned multiple documents, you can swipe between them. Tap Done when you’re finished, and return to Step 6 to save.

Scan to Your Mac with Your iPhone or iPad

It’s easy enough to save a scanned document to iCloud Drive or another file sharing service so you can access it on the Mac or move it from the Files app to the Mac. But if your goal is to scan directly to the Mac, you can do that too.

In Preview, choose File > Import from iPhone > Scan Documents. (Preview will know about all your devices, so it will have sections for each device.) A dialog will appear on the Mac, and your device will immediately switch to the scanning interface.

Everything works just as it does if you initiated scanning from the device, including the Auto/Manual switch and the need to tap Save when you’re done. However, instead of saving the document to Files, it will appear as a new document in Preview, where you can work with it like any other PDF and save it to your drive.

Final Thoughts

There are two caveats to scanning documents using your iPhone or iPad:

  • This approach to scanning does not do optical character recognition (OCR) to make the scanned text selectable—the resulting PDF pages are just images. Online tools can perform OCR on a PDF; we’ve seen good results from AvePDF’s OCR PDF tool. This might not be a good idea with sensitive documents.
  • Scanned documents tend to be large. If your scan ends up too big to share via email, for instance, other online PDF compression tools can shrink files. If you use AvePDF to OCR your document, another click on its Hyper-Compress PDFs tool can compress the same document by as much as 90%.

Overall, you’ll probably get better quality from a hardware scanner—particularly a flatbed—because it’s easier to position the pages perfectly, the light is stronger and more even, and there’s no need to deskew (straighten) the scanned page images, as Apple’s software attempts to do when you’re not directly over the page. But it’s hard to beat the convenience of a quick scan with your iPhone when quality isn’t paramount.

(Featured image by Adam Engst)

It’s Time to Try Dictation in iOS 16 and iPadOS 16

Apple has long provided a microphone button in the keyboard to invoke dictation on the iPhone and iPad. But, it wasn’t always easy to hit, and you had to switch back to the keyboard to fix the inevitable mistakes. (Apple’s dictation is a huge timesaver but far from perfect, particularly with homonyms and proper nouns.) With iOS 16 and iPadOS 16, Apple made the microphone button larger and repositioned it to make it easier to tap. More importantly, the keyboard remains available while dictation is active, enabling you to work with text manually during dictation. You can fix mistakes, reposition the insertion point, select and delete text, and so on. For instance, if dictation inserts the wrong word, double-tap the word to select it and speak the replacement. Or, if you want to add something, tap in the text to move the insertion point and start speaking again. Dictation can even add punctuation for you, but it’s a little haphazard at that, so you might want to disable that option in Settings > General > Keyboard.

(Featured image by iStock.com/fizkes)