- đď¸â Your Security Checklist
- đđď¸ Test Your Security Skills
- đ° Your Weekly Security Update
- 𤨠This Should Be on Your Radar đĄ
- đ Security Fail of the Week đ
- đđą Security Updates from Apple đ
If you take nothing else from this newsletter, just do these three things to protect yourself:
- Enable Private Wi-Fi Address. If you see a Privacy Warning next to your Wi-Fi network name, we recommend enabling Private Wi-Fi Address.
- Stop apps from tracking your activity. Apps sometimes request permission to track your data across different apps, but you can disable app tracking altogether and never see these requests again.
- Lock your Private Browsing tabs with Face ID. If you donât want others to be able to access your Safari Private Browsing tabs, you can lock them with Face ID.
What should you do in the following scenario?
When going to do some holiday shopping on your iPhone, you log in to Amazon. The website asks if youâd like to set up a passkey. What should you do? đ¤Â
- Set up the passkey.
- Leave it for later.
Scroll to the bottom to see how you did!
The US Cybersecurity and Infrastructure Security Agency (CISA) has just released an update to its guidance document for how to best protect your iPhone from data theft. Itâs only a two-page document, so itâs a quick read. Guidance about using a password manager, encrypted apps for messaging such as Signal, and a privacy-preserving web browser are all unchangedâstill good ideas. The one thing that CISA has changed about its recommendations, and the one area in which those recommendations differ from what we teach in our security course, is they now say firmly that you should not use a consumer VPN.Â
We at iPhone Life think this is very interesting guidance that should probably be taken with a grain of salt. They offer two main complaints about consumer VPNs:Â
1: There are many on the market with poor or very poor security practices. Some are even malicious! Even if a consumer VPN has a good reputation and is not actively spying on its users, a consumer VPN may still be easier to hack than an Internet Service Provider (ISP).
2: Using a consumer VPN only shifts your trust from your internet service provider ISP to the VPN. To explain that, normally your ISP can see everything you do on the internet. When you use a VPN, the ISP is blinded, but the VPN can still see everything. Since most consumer VPNs are less trustworthy than ISPs, using a low-trust VPN actually makes the user less secure.
This is basically sound logic, but there are advantages to a VPN that the report doesnât address. For example, if youâre not using a VPN, then your IP address may be visible to every website or web service you use, from Facebook to Zoom to OnlyFans, to a multiplayer game of Call of Duty. That may not be safe for you or your family, especially if your IP address is linked to your physical address (it usually is). Your IP address may also be used to track your behavior and build a profile of you for advertising and other purposesâprofiles which are a gift to scammers and identity thieves. For these reasons, it may still be useful to employ a consumer VPN.
The Bottom Line: CISAâs concerns about consumer VPNs are legitimate and need to be taken seriously, but we suggest softening their final recommendation. Rather than âdonât use a consumer VPN,â weâd say to be cautious about which VPN you use. Make sure to use only the best VPNs with the best reputation, protected by data sovereignty laws and strict no-log policies. Do not use free consumer VPN services.
The Wired Guide to Digital Privacy for Teens
Wired recently released a fantastic article aimed at teens, but really applicable to everyone, exploring how to protect your anonymity online (and why you might want to). The advice is excellent, and itâs well worth a read. In the early days of the internet, we mostly took it for granted that you should not share your real name and identity online. Every account and serviceâIRC, ICQ, LiveJournal, etc.âexpected you to use a pseudonym. Then came the MySpace and Facebook days of social media. Facebook somehow convinced us to give up our real faces and names, plus many more details besides. We did this, even though Facebook was transparent about its intention to surveil us in incredible depth for the purposes of targeted advertising. Teens especially should consider using pseudonyms and avatars instead of names and pictures, as a way to reduce the risks of cyberbullying and stalking. It sounds like good advice to us.
The Bottom Line: Avoid using your true name in online accounts, keep accounts separate from each other, do not share personal information with strangers, and never show your address. Read Wiredâs full guide.
This New Cellular Provider Lets You Sign Up with Just Your Zip Code
A company called Phreeli is making it easy and private to sign up for a new cellular data plan. All you need to sign up for Phreeli is a zip code. You donât need to give out your name, your physical address, your email address, or even your credit card information. You can pay using tough-to-trace cryptocurrency if you desire. If you do pay by credit card, the company uses its own encryption system that allows you to pay your bill without the company keeping a record of your credit card number. Phreeliâs service relies on T-Mobile infrastructure but separates the âpersonally identifiable information of a person from their activities on the phone system.â Read more about Phreeli and its founder, Nicholas Merrill, at Wired.
The Bottom Line: If you want to maximize your mobile privacy, Phreeli sounds like a viable option. With its commitment to personal privacy and the ease of signing up, weâre hoping Phreeli gains more traction.
Porsches in Russia Rendered Inoperable
All across Russia, Porsches as old as 2013 were disabled throughout the past month. These particular models are all equipped with an anti-theft system that requires satellite connectivity to operate. It is assumed that the Porsches in Russia have been completely disconnected from the satellite service, rendering the vehicles inoperable, though the exact cause is still unknown. Drivers have found various workarounds to get their cars rolling again, such as disconnecting and reconnecting the battery. Read more at Autoblog.
The Bottom Line: This story demonstrates why requiring a constant internet connection to use important devices, such as your car, is a bad idea. We recommend avoiding purchasing vehicles that need to maintain a constant connection to satellites to work.
Should You Try Out an AI Web Browser? Security Experts Say Never
A new breed of web browser has appeared on the market lately, so-called AI Browsers such as Perplexity, Comet, or Opera Neon. The big idea is that the browser will use generative AI to actually fulfill tasks on your behalf. For example, you ask the browser for a recipe to cook for dinner, and then it can actually order the groceries necessary for that dish. Security experts at Gartner have examined this new breed of browser to identify its risks, and say that the technology cannot be safely used on corporate networks because it fundamentally prioritizes user experience over security. Gartner notes in its report that this is likely to stay true for the foreseeable future. The problem is the browserâs AI agent is essentially as vulnerable to social manipulation as if it were a person, except unlike people, the same strategy will work on every single instance of the AI. Thus, it is very easy to manipulate the AI into performing tasks that would compromise your computer, private data, or safety. While Gartnerâs advice is targeted at executives and large companies with company secrets to protect, we would add that the same risks apply at a smaller scale to individuals.Â
The Bottom Line: Do not use AI Browsers. An AI Browser is defined, in this case, as one that allows the AI agent to take material actions. It doesnât just generate text, it actually performs tasks on web pagesâa feature called agency.
X/Twitter Fined by the EU
The European Commission is fining X/Twitter for âŹ120 million (about $140 million USD) for violating the EUâs Digital Services Act (DSA). The Commission alleges that the social media company deceived its users by changing the blue user verification checkmark into a paid feature. X/Twitter also refused to turn data over to researchers, which was required under the DSA. The company has 90 days to comply with the DSA or face further fines. You can read more at EDRi.
The Bottom Line: No real practical advice for you or me to follow, but if X/Twitter wishes to continue operating in the EU, it will need to pay the fine and comply with any other requirements set forth by the DSA.
Both iPhone & Android Users Targeted by Spyware
Apple and Google are warning both iPhone and Android users of a possible cyber threat. Apple sent specific users in over 150 countries notifications on December 2, telling them that their devices could be targeted by state-backed hackers. These attacks typically target high-profile individuals like politicians, government officials, journalists, activists, etc. Read more at Reuters.
The Bottom Line: If you received one of these notifications, we recommend activating Lockdown Mode on your iPhone and taking the necessary steps to secure your other digital devices. Also, we would like to hear from you! If you received one of these notifications, please consider taking a screenshot and sending it to us at security@iphonelife.com.
Related: Protect an iPhone from Cyberattack with Lockdown Mode
Smart Toilet Camera Not as Encrypted as Originally Claimed
What could go wrong with having a smart camera in your toilet? No, seriously. Earlier this year, Kohler released a device that attaches to the side of your toilet, with a smart camera pointing downward into the bowl. The idea is that the camera can capture images of your waste, analyze it, and give you information about your health that you might not even know yourself. Itâs a nice idea in theory, but like most smart devices, it means entrusting a private company with private, sensitive images. Initially, when the product launched, Kohler claimed that the images captured by the device were end-to-end (E2E) encrypted.
Traditionally, E2E encryption means that the data is encrypted on your device and cannot be unencrypted by the companies that transmit or store it, only by the intended recipientâin this case, youâmeaning not even Kohler should be able to access the data. Thatâs how iMessage and WhatsApp work. However, a security researcher recently published a blog post claiming that while the images captured by the smart toilet camera are encrypted on the userâs device and while in transit to the companyâs servers, Kohler does have access to the images on its server. Not only that, but if users opt in, the company can de-identify the images and use them to train AI. This falls outside the definition of E2E encryption. However, according to TechCrunch, Kohler has since updated the product page for its toilet camera to remove any mentions of E2E encryption.
The Bottom Line: Encrypted or not, most of us probably donât want cameras pointing at our toilet bowls.
Everything you need to know about Appleâs latest software updates.
- The most recent iOS and iPadOS is 26.1
- The most recent macOS is 26.1
- The most recent tvOS is 26.1
- The most recent watchOS is 26.1
- The most recent visionOS is 26.1
Read about the latest updates from Apple.
The correct answer is 1: set up the passkey. Passkeys are far more secure, and also more convenient, than passwords. Use your password manager to save the passkey. If you donât use a password manager (you should!), your new passkey for Amazon will save to the Passwords app, which comes with your iPhone.Â
If youâd like to know more, hereâs How Passkeys Work & How to Use Them on iPhone
There is far too much security and privacy news for us to cover it all. When building this newsletter, we look for scams, hacks, trouble, and news to illustrate the kinds of problems Apple enthusiasts may encounter in our private lives, and the self-defense we can practice to keep our devices, accounts, and lives secure. Our commentary focuses on practical advice for everyday people. This newsletter was written by Cullen Thomas and Rhett Intriago and edited by August Garry.
Want to keep your passwords secure? Check out:
|

