Master networking, privacy, and security for iOS and iPadOS!

Take Control of
iOS & iPadOS Privacy and Security

Second Edition
Glenn Fleishman

Ensuring that your iPhone or iPad’s data remains secure and in your control and that your private data remains private isn’t a battle—if you know what boxes to check and how to configure iOS and iPadOS to your advantage. Take Control of iOS & iPadOS Privacy and Security takes you into the intricacies of Apple’s choices when it comes to networking, data sharing, and encryption. Updated for iOS 15 and iPadOS 15!

All Take Control books are delivered in three ebook formats—PDF, EPUB, and Mobipocket (Kindle)—and can be read on nearly any device.

Clear

Your iPhone and iPad have become the center of your digital identity, and it’s easy to lose track of all the ways in which Apple and other parties access your data legitimately—or without your full knowledge and consent. While Apple nearly always errs on the side of disclosure and permission, many other firms don’t. This book comprehensively explains how to configure iOS 15 and iPadOS 15 to best protect your privacy while messaging, email, browsing, and much more, and how to ensure your devices and data are secure from intrusion.

Take Control of iOS & iPadOS Privacy and Security covers how to configure the hundreds of privacy and data sharing settings Apple offers in iOS and iPadOS, and which it mediates for third-party apps. You’ll learn how Safari has been increasingly hardened to protect your web surfing habits, personal data, and identity—particularly with the addition of the iCloud Private Relay, an option for iCloud+ subscribers to anonymize their Safari browsing.

In addition to privacy and security, this book also teachers you everything you need to know about networking, whether you’re using cellular, Wi-Fi, Bluetooth, or combinations of all of them, as well as about AirDrop, AirPlay, Airplane Mode, and Personal Hotspot and tethering.

You’ll learn how to:

  • Master all the options for a Personal Hotspot for yourself and in a Family Sharing group.
  • Troubleshoot problematic Wi-Fi connections.
  • Set up a device securely from the moment you power up a new or newly restored iPhone or iPad.
  • Manage Apple’s new built-in second factor verification code generator for extra-secure website and app logins.
  • Protect your email by using an address Apple manages and relays messages through for you.
  • Understand Safari’s blocking techniques and how to review websites’ attempts to track you.
  • Anticipate Apple’s potentially privacy-challenging changes designed to improve the safety of children, both those using Apple hardware and those who suffering abuse.
  • Optimize cellular data use to avoid throttling or overage charges, while always getting the best throughput.
  • Understand why Apple might ask for your iPhone, iPad, or Mac password when you log in on a new device using two-factor authentication.
  • Share a Wi-Fi password with nearby contacts and via a QR Code.
  • Differentiate between encrypted data sessions and end-to-end encryption.
  • Stream music and video to other devices with AirPlay 2.
  • Deter brute-force cracking by relying on a USB Accessories timeout.
  • Configure Bluetooth devices.
  • Transfer files between iOS and macOS with AirDrop.
  • Block creeps from iMessage, FaceTime, text messages, and phone calls.
  • Secure your data in transit with a Virtual Private Network (VPN) connection.
  • Protect Apple ID account and iCloud data from unwanted access.
Glenn Fleishman

About Glenn Fleishman

Glenn Fleishman is a veteran technology writer who has contributed to dozens of publications across his career, including Macworld, Fast Company, and Increment. He has also written dozens of editions of books in the Take Control series. He spent 2019 and 2020 building 100 tiny type museums full of real printing artifacts. Glenn lives in Seattle with his wife and two children.

What’s New in Version 2.1 and 2.1.1

Apple made four changes in iOS 15.2/iPadOS 15.2 that this version addresses:

  • Hide My Email in Mail: Starting with this release, you can invoke Hide My Email to create an anonymized return address directly within the Mail app. See “Hide Your Email.”
  • App Privacy Reporting: Apple has added a new tool that, when enabled, lets you review the last seven days of sensor, location, contact, network, website, and other access by apps. See “App Privacy Report Reveals App Behavior.”
  • Communication Safety: Apple said in August 2021 that they would delay rolling out planned changes to iOS 15/iPadOS 15 and macOS 12 Monterey intended to provide more protection for children from exploitation and unwanted exposure to sexually explicit imagery. In iOS 15.2/iPadOS 15.2, a portion of what Apple calls Community Safety appears, shifting from “sexually explicit” to “nudity.” The part included allow parents to have their children privately warned about sending or receiving images with nudity in them. See “Manage Messages for Minors” to learn more.
  • Siri, Spotlight, and Safari Search help with child exploitation: Apple also updated how various search interfaces respond to queries involve child exploitation. People asking about resources will be more precisely guided to them; people seeking material about exploitation will be told it’s harmful and problematic. See “Search Provides Better Abuse Support.”

One feature expected in iOS 15.2/iPadOS 15.2 didn’t appear in the release version. In a future release, Apple will add an option to the iPhone and iPad native Find My apps to learn if there is an AirTag or other Find My item near you. I explain this upcoming feature in “Uncovering Find My Items Near You.”

  • Read Me First
    • What’s New in Version 2.1 and 2.1.1
    • Updates and More
  • Introduction
  • Connect and Secure Quick Start
  • Connect to a Wi-Fi Network
    • Join a Network
    • Manage Wi-Fi Connections
    • Drill Down to Network Details
    • Turn Wi-Fi Off
    • Capture the Page
  • Troubleshoot Wi-Fi
    • Can’t See Any Wi-Fi Networks or a Network You Need
    • No Wi-Fi Signal Strength in the Indicator
    • Too Many Wi-Fi Networks
    • Correct Password Not Accepted
    • No Internet Service After Connecting
  • Make a Mobile Hotspot
    • Work with Personal Hotspot Settings
    • Other Ways To Connect
  • Choose Between Cellular Data and Wi-Fi
    • Which Network Are You On?
    • Select Which Service to Use
  • Manage Cellular Features
    • Consider Bandwidth Usage
    • Place Cellular Calls via Wi-Fi
  • Manage Airplane Mode
    • What’s Airplane Mode?
    • When Radios Turn Off
  • Set Up Bluetooth
    • Bluetooth Basics
    • Pairing Any Device
    • Hands-Free Profile
    • Audio Devices
  • Pass Files with AirDrop
    • Configure AirDrop
    • Share with AirDrop
  • Stream via AirPlay
    • Configure AirPlay Destinations
    • Select AirPlay Devices
    • Other Ways to Use AirPlay
  • Control Privacy Leaks
    • Where Data Lives
    • What Kinds of Data
    • What Can Be Extracted and Learned
  • Apple Blocks Tracking in Safari
    • Safari Blocks Cookies
    • Apple Breaks One-to-One Ad Tracking
    • See a Privacy Report in Safari
    • Block Content in Safari with Apps
  • Understand Apple’s Child Protection Approach
    • Manage Messages for Minors
    • Search Provides Better Abuse Support
    • Understand Apple’s CSAM Scanning
    • Be Informed on Privacy Concerns
  • Set Up for Privacy
  • Control System Privacy
    • Manage Siri Privacy
    • Work with Safari Privacy
    • Enable Email Privacy
    • Mediate Location Access
    • Decide Access by Apps
  • Keep Creeps Away
    • What Apple Doesn’t Block
    • Block Numbers and Email Addresses
    • Call-Blocking Apps
    • Filter iMessages and SMS
  • Manage Passwords and Second Factors
    • Examine Stored Passwords
    • Examine Security Recommendations
    • Learn About Second Factors
    • Use Passwords on Sites and with Apps
  • Connect to a Secure Wi-Fi Network
    • Connect to a Small Network
    • Connect to an Enterprise Network
  • Use Two-Factor Authentication
    • What Have You Got in Your Pocket?
    • The Risk of SMS 2FA Factors
    • Turn On Apple’s 2FA
    • Log In with 2FA to Apple Sites and Services
    • Log In to Services with App-Specific Passwords
    • Manage 2FA Devices, Contacts, and Email
    • Recover Account and Access
    • A Secure Second Factor for the Web
  • Protect Privacy and Security on a Network
    • Protect Privacy with an Anonymity-Preserving Relay
    • Protect Security with a VPN
  • Protect Your Device
    • Use a Passcode
    • Use a Biometric Login
    • Block Unwanted USB Connections
  • About This Book
    • Ebook Extras
    • About the Author
    • About the Publisher
  • Copyright and Fine Print

Reviews

There are no reviews yet.

Be the first to review “Take Control of iOS & iPadOS Privacy and Security”

You may also like…