Master networking, privacy, and security for iOS and iPadOS!

Take Control of
iOS & iPadOS Privacy and Security

Second Edition
Glenn Fleishman

Ensuring that your iPhone or iPad’s data remains secure and in your control and that your private data remains private isn’t a battle—if you know what boxes to check and how to configure iOS and iPadOS to your advantage. Take Control of iOS & iPadOS Privacy and Security takes you into the intricacies of Apple’s choices when it comes to networking, data sharing, and encryption. Updated for iOS 15 and iPadOS 15!

All Take Control books are delivered in three ebook formats—PDF, EPUB, and Mobipocket (Kindle)—and can be read on nearly any device.


Your iPhone and iPad have become the center of your digital identity, and it’s easy to lose track of all the ways in which Apple and other parties access your data legitimately—or without your full knowledge and consent. While Apple nearly always errs on the side of disclosure and permission, many other firms don’t. This book comprehensively explains how to configure iOS 15 and iPadOS 15 to best protect your privacy while messaging, email, browsing, and much more, and how to ensure your devices and data are secure from intrusion.

Take Control of iOS & iPadOS Privacy and Security covers how to configure the hundreds of privacy and data sharing settings Apple offers in iOS and iPadOS, and which it mediates for third-party apps. You’ll learn how Safari has been increasingly hardened to protect your web surfing habits, personal data, and identity—particularly with the addition of the iCloud Private Relay, an option for iCloud+ subscribers to anonymize their Safari browsing.

In addition to privacy and security, this book also teachers you everything you need to know about networking, whether you’re using cellular, Wi-Fi, Bluetooth, or combinations of all of them, as well as about AirDrop, AirPlay, Airplane Mode, and Personal Hotspot and tethering.

Also available: You can save money by buying this book as part of a three-book bundle, which also includes Take Control of Wi-Fi Networking and Security and Take Control of Securing Your Mac. Buy all three books for $25.78, which is 40% off the combined cover prices of $42.97. Add 3-Book Bundle to Cart

You’ll learn how to:

  • Master all the options for a Personal Hotspot for yourself and in a Family Sharing group.
  • Troubleshoot problematic Wi-Fi connections.
  • Set up a device securely from the moment you power up a new or newly restored iPhone or iPad.
  • Manage Apple’s new built-in second factor verification code generator for extra-secure website and app logins.
  • Protect your email by using an address Apple manages and relays messages through for you.
  • Understand Safari’s blocking techniques and how to review websites’ attempts to track you.
  • Anticipate Apple’s potentially privacy-challenging changes designed to improve the safety of children, both those using Apple hardware and those who suffering abuse.
  • Optimize cellular data use to avoid throttling or overage charges, while always getting the best throughput.
  • Understand why Apple might ask for your iPhone, iPad, or Mac password when you log in on a new device using two-factor authentication.
  • Share a Wi-Fi password with nearby contacts and via a QR Code.
  • Differentiate between encrypted data sessions and end-to-end encryption.
  • Stream music and video to other devices with AirPlay 2.
  • Deter brute-force cracking by relying on a USB Accessories timeout.
  • Configure Bluetooth devices.
  • Transfer files between iOS and macOS with AirDrop.
  • Block creeps from iMessage, FaceTime, text messages, and phone calls.
  • Secure your data in transit with a Virtual Private Network (VPN) connection.
  • Protect Apple ID account and iCloud data from unwanted access.
Glenn Fleishman

About Glenn Fleishman

Glenn Fleishman is a veteran technology writer who has contributed to dozens of publications across his career, including Macworld, Fast Company, and Increment. He has also written dozens of editions of books in the Take Control series. He spent 2019 and 2020 building 100 tiny type museums full of real printing artifacts. Glenn lives in Seattle with his wife and two children.

What’s New in Version 2.2

This version updates the book to reflect changes to iOS and iPadOS with the release of 15.4 of both operating systems:

  • Mask ID: Apple added an option to train Face ID on phones that include to allow wearing a mask and glasses. See “Use Face ID.”
  • Change in SMS verification codes and matching: Apple has enabled domain-bound SMS codes that provide better resistance to phishing attempts. As a user, you don’t see anything different, but are more secure. See “Apple Improves the Scope of an SMS.”
  • Prompt for account name for saving logins: iOS/iPadOS now notices if it doesn’t detect an account name when creating or storing a password. You’re prompted to enter one. This is covered in a couple of places in “Manage Passwords and Second Factors.”
  • Notes in iCloud Keychain fields: You can now annotate entries in iCloud Keychain to remind you of why you make those entries in the first place. See “Examine Security Recommendations.” Also in that section, I added an additional high-priority password warning that Apple added at some point in the last few months.
  • More anti-tracking features: Apple announced a number of future improvements to deter stalking and unwanted tracking via its AirTags and other Find My items. It has added one so far in 15.4. See “Uncovering Find My Items Near You.”
  • Read Me First
    • What’s New in Version 2.2
    • What Was New in Versions 2.1 and 2.1.1
    • Updates and More
  • Introduction
  • Connect and Secure Quick Start
  • Connect to a Wi-Fi Network
    • Join a Network
    • Manage Wi-Fi Connections
    • Drill Down to Network Details
    • Turn Wi-Fi Off
    • Capture the Page
  • Troubleshoot Wi-Fi
    • Can’t See Any Wi-Fi Networks or a Network You Need
    • No Wi-Fi Signal Strength in the Indicator
    • Too Many Wi-Fi Networks
    • Correct Password Not Accepted
    • No Internet Service After Connecting
  • Make a Mobile Hotspot
    • Work with Personal Hotspot Settings
    • Other Ways To Connect
  • Choose Between Cellular Data and Wi-Fi
    • Which Network Are You On?
    • Select Which Service to Use
  • Manage Cellular Features
    • Consider Bandwidth Usage
    • Place Cellular Calls via Wi-Fi
  • Manage Airplane Mode
    • What’s Airplane Mode?
    • When Radios Turn Off
  • Set Up Bluetooth
    • Bluetooth Basics
    • Pairing Any Device
    • Hands-Free Profile
    • Audio Devices
  • Pass Files with AirDrop
    • Configure AirDrop
    • Share with AirDrop
  • Stream via AirPlay
    • Configure AirPlay Destinations
    • Select AirPlay Devices
    • Other Ways to Use AirPlay
  • Control Privacy Leaks
    • Where Data Lives
    • What Kinds of Data
    • What Can Be Extracted and Learned
  • Apple Blocks Tracking in Safari
    • Safari Blocks Cookies
    • Apple Breaks One-to-One Ad Tracking
    • See a Privacy Report in Safari
    • Block Content in Safari with Apps
  • Understand Apple’s Child Protection Approach
    • Manage Messages for Minors
    • Search Provides Better Abuse Support
    • Understand Apple’s CSAM Scanning
    • Be Informed on Privacy Concerns
  • Set Up for Privacy
  • Control System Privacy
    • Manage Siri Privacy
    • Work with Safari Privacy
    • Enable Email Privacy
    • Mediate Location Access
    • Decide Access by Apps
  • Keep Creeps Away
    • What Apple Doesn’t Block
    • Block Numbers and Email Addresses
    • Call-Blocking Apps
    • Filter iMessages and SMS
  • Manage Passwords and Second Factors
    • Examine Stored Passwords
    • Examine Security Recommendations
    • Learn About Second Factors
    • Use Passwords on Sites and with Apps
  • Connect to a Secure Wi-Fi Network
    • Connect to a Small Network
    • Connect to an Enterprise Network
  • Use Two-Factor Authentication
    • What Have You Got in Your Pocket?
    • The Risk of SMS 2FA Factors
    • Turn On Apple’s 2FA
    • Log In with 2FA to Apple Sites and Services
    • Log In to Services with App-Specific Passwords
    • Manage 2FA Devices, Contacts, and Email
    • Recover Account and Access
    • A Secure Second Factor for the Web
  • Protect Privacy and Security on a Network
    • Protect Privacy with an Anonymity-Preserving Relay
    • Protect Security with a VPN
  • Protect Your Device
    • Use a Passcode
    • Use a Biometric Login
    • Block Unwanted USB Connections
  • About This Book
    • Ebook Extras
    • About the Author
    • About the Publisher
  • Copyright and Fine Print


There are no reviews yet.

Be the first to review “Take Control of iOS & iPadOS Privacy and Security”

You may also like…