This Is Included When Apple Sends You Your Data Dump

Apple has made it possible for users in Europe to request a dump of their data. This includes all sorts of historical information, such as all the repairs and support chats you’ve been involved in, everything you’ve purchased – and even updates you’ve downloaded – from the App Store and iTunes Store, Apple Music activity, and more.

I requested my data a week ago, and nothing stood out; except this. There is a special CSV file for this, and I really don’t know why.

U2 again

You thought you could forget about this…

Instapaper Service Temporarily Suspended in Europe Due to GDPR – Mac Rumors

Popular read-it-later service Instapaper has temporarily suspended user access across Europe as it comes to terms with the EU’s impending General Data Protection Regulation (GDPR) laws.

In a message sent to users yesterday — subsequently shared via Twitter courtesy of tech reporter Owen Williams – the bookmarking service said it needs extra time to make necessary changes to comply with GDPR before the deadline on Friday, May 25.

WTF?

Instapaper gave no indication how long the service would be suspended, and offered no further details on why it has waited until now to take action, almost two years after companies were informed of the GDPR timeline.

Two years. Seriously.

Source: Instapaper Service Temporarily Suspended in Europe Due to GDPR – Mac Rumors

How to Easily Remove Old Tweets and Facebook Posts

Your social media accounts are a reflection of your life–at least the part of your digital life that you share with your friends, family members, and perhaps strangers. People post all sorts of things on social media: photos of selfies and vacation pics, links to articles you find interesting, comments about your favorite sports teams, random thoughts about movies, music, politics, and more.

While fun to banter on social media, if you were to take a look back at comments you’ve posted on Facebook and Twitter over the years, you may cringe. There may come a time in your life when you want to clean up what you’ve shared on social media; not that what you’ve posted is necessarily wrong, but this unfiltered content, often composed in the spur of the moment, may not be flattering when taken out of context years later.

In this article, I’ll show you how to use free tools to easily delete old tweets and clean out your Facebook content.

Read the rest of the article on The Mac Security Blog.

How to Choose and Answer Security Questions

To help you keep your online accounts safe, most web and cloud services have you answer a number of security questions. You are asked a few things that you know, and that you can remember–such as your first pet’s name, or your mother’s maiden name–so you can access your account and prove your identity, if you forget or lose your password.

Yet sometimes these security questions are too simple, and the answers you provide may be things that people can find out about you far too easily in a web search or on social media. You may tweet a photo of your first dog, and mention that his name was Rex. You may post on Facebook that you met your second grade teacher, Mrs. Harrison. And your mother’s maiden name may be so widely used that anyone who hacks into a large database of user information could find it.

Fortunately, there are ways to get around this. This post explains how to choose the best security questions you should answer, and how to securely answer them so no one can figure them out.

Read the rest of the article on the Mac Security Blog.

How to Manage Privacy Settings on Popular iOS Apps

Kids and teens are using apps to stay in touch with friends, follow celebrities, and get news — they’re all doing it. These social media apps allow them to share their lives online, but there’s a danger in children telling too much. Earlier this week we explained what your kids should never tell anyone online, and today we’ll discuss how you can manage privacy settings on some of the most popular iOS apps.

Most social media apps have privacy settings that can help keep kids safe, but they’re not always easy to find. It’s a good idea to ensure that none of these accounts are public, so your kids won’t be harassed. They can still tweet and view photos from others, and they can invite their friends to share with them, but they’ll be safe from online predators and bullies.

Following is a look at some of the popular social media apps for iPhone and iPad, and how you can set up your kids’ accounts so they stay private.

Read the rest of the article on The Mac Security Blog.

Evernote Revisits Privacy Policy Change in Response to Feedback – Evernote Blog

After receiving a lot of customer feedback expressing concerns about our upcoming Privacy Policy changes over the past few days, Evernote is reaffirming its commitment to keep privacy at the center of what we do. As a result, we will not implement the previously announced Privacy Policy changes that were scheduled to go into effect January 23, 2017.

Amid the popular protests on social media, regarding Evernote’s new privacy policy that would allow their employees to read all your notes, the company has backed down. But they need to offer end-to-end encryption, because there’s nothing – aside from some terms and conditions – than prevent them from doing so now.

Source: Evernote Revisits Privacy Policy Change in Response to Feedback – Evernote Blog

Evernote’s New Privacy Policy Lets Staff Read Customers’ Notes to ‘Improve the Service’ – Mac Rumors

Some users of Evernote have threatened to stop using the note-taking service after the company announced a new privacy policy scheduled to go into effect on January 24 that effectively allows employees to read customers’ notes.

I’ve been using Evernote for about six months, and I’ve found it to be the perfect tool for my information collection and storage. But this is making me re-think whether I want to continue using the service. I don’t store anything seriously confidential (such as credit card numbers) in Evernote, but there are things that are for my eyes only.

I really wish Apple Notes was better. For example, if I want to clip a web page to refer back to it, I can do this with Evernote and save the entire page; Notes only saves a link to it, together with a brief description.

I don’t want to use Microsoft OneNote, because its interface is only slightly more agreeable than that of a long-distance airplane. What other apps are as flexible as Evernote for storing information? (And please don’t tell me about some home-brew combination of apps and scripts; I need something simple, and something that integrates with macOS and iOS share sheets, and with IFTTT, if possible.)

Source: Evernote’s New Privacy Policy Lets Staff Read Customers’ Notes to ‘Improve the Service’ – Mac Rumors

Some Thoughts on Apple v FBI

I’ve held off writing about the case where a court has ordered Apple to develop software to break into an iPhone 5c used by a terrorist. You can read about this on thousands of websites, so I won’t go into detail here. But I do have a few thoughts I wanted to toss out for consideration.

  • Tech journalists should not write about legal issues without consulting with attorneys. I’ve seen lots of articles, and heard some podcasts, that address legal questions with little or no legal knowledge, and that offer information that is simply wrong, and proven so shortly after editors have clicked Publish. Get some lawyers to explain things to you, or don’t talk about the law.
  • Take a deep breath and think carefully each time you read a new article about this case. Information has been released that is biased and incorrect, only to be corrected the next day. It’s best to take a long view of this issue, not to believe anything you read today.
  • Do read what real computer security experts have to say about this. Especially regarding the consequences of this case for the future. (You might want to read what Christopher Soghoian has written…)
  • Remember, both Apple and the FBI are spinning this case. They both have agendas.
  • I wonder what will happen if Apple is held in contempt of court. Is Tim Cook willing to go to jail for this issue?

This looks like an issue that won’t be easily resolved. There will be lots of articles and opinions on this issue. I don’t know enough about the law to offer my own, though I strongly believe that what the FBI is asking would open the door to potential abuse.

One final point:

  • Does the US government really want their elected officials, employees, agents, and citizens to carry around communication devices that have known backdoors when they are in other countries? Because unless the CIA is building their own smartphones, this is what the world would be like if backdoors were required. Other governments would potentially be able to access information on devices owned by US citizens, as well as their own.

How to Manage Gmail and Google Security and Privacy Settings

Lots of people use Gmail for their email, either using Google’s website in a web browser, or through an email client. You may use a @gmail address, or you may have a domain hosted on Google Apps for Work. When you use Google for your email–as well as for search, maps, and more–you have a number of security and privacy options you can set.

Google has a good set of tools for checking and tweaking your security settings, for both Gmail and for the rest of its services. In this article, you will discover how to run a Google Security Checkup, a Privacy Checkup, and how to tweak Google’s settings, so your account is secure. And I’ll walk you through Google’s Gmail Security Checklist.

Read the rest of the article on The Mac Security Blog.

Control What Information Apps Can Access on Your Children’s iPhone or iPad

I recently explained how to enable and set up Restrictions on an iOS device, to ensure that your children don’t have free reign on their iPhone or iPad. If you don’t turn on Restrictions, however, you might still want to help your children ensure that their privacy is respected. You can control what information and features certain apps can access on an iPhone, iPad or iPod touch. You might want to do it for your kids’ devices, and you also might want to do it for your own.

When you launch a new app that wants to access any personal information or hardware features (such as location services, the camera, and the microphone), you’ll see a dialog asking you to allow the app to access these. You can refuse or grant access, and you can always change these settings later. Here’s how to check and adjust these settings.

Read the rest of the article on The Mac Security Blog.