The reason that privacy and security can be so difficult for average users of Mac, iPhone and iPad is the same as using a computer. complex password is difficult. Humans are like water and we tend to go down. It is natural to do what is easiest. Complex passwords are hard to remember, that's why password, and 123456, and qwerty, and abc123, and ape are among the most common passwords and the most difficult ones use.
True confidentiality and security require us to use our devices – Mac, iPhone, iPad or any other item connected to the Internet or subject to theft or unauthorized use – with care and consideration. Why can not we just sit back and use what we want to use without worrying about thieves, hackers, criminals, neighbors and co-workers, or spooky government wandering in our files?
on a seatbelt. Things happen. It's better to be prepared. Most computer users are not prepared for privacy and security breaches, let alone a catastrophic failure without a backup plan. Earlier this year, David Nield wrote an interesting article on follow-up.
How to avoid being tracked on your laptop, your phone or your fitness follower
The truth is the truth. If these devices are connected online, someone follows you. It's an axiom of online life. Pull the plug, lock the doors, turn off the lights. But if you are online, someone is trying to get into your device and someone is watching you. The best you can hope for is that the one who does the tracking does not know who he is following, it is you.
Today, we are all followed by more gadgets than ever and in a way that might not be immediately obvious; but it is possible to impose restrictions on the data that your laptop, your smartphone and even your fitness follower can collect about you, especially about where you are and what you are doing with your device.
Color me skeptical, but good luck with that.
The problem should be obvious, but we have not known for many years. Privacy and security are made up of too many moving parts and we, the simple users, simply can not handle all the parts, even with a firewall, with Little Snitch, with a VPN and with the addition of ad blockers in each browser.
Even Apple follows Mac, iPhone and iPad customers. The difference between Apple and those who live by legitimate violations of privacy and security (Google, Facebook, Amazon, etc., I look at you) is that Apple is doing a lot to monetize its activities. Apple earns money in the old days. By selling you something.
Mainly. But not completely.
Apple receives a few billion dollars a year from Google to make its search engine the default engine of Safari. Your Mac phone applications are for their developers, collision tracking websites, advertisers, analytics followers, and more, and unless Little Snitch is used. never know it.
on the other hand, Apple is part of the tracker community and is complicit because it allows such tracking and does not provide customers and users with more robust mechanisms to reduce or prevent such tracking.
A secure computer is a computer turned off. If you turn on a Mac and it connects to the Internet, you are subject to tracking features and privacy and security are being compromised.
All stages of Nield are similar to those I have already followed. promoted for years and implemented, this can reduce trackers and excursions in your privacy and online security, but for most Apple customers, even these elements are too difficult to ask.
Just like a complex password . .