Video from TCO Author: How to Use Siri in the Car
Take Control of Siri is available at http://takecontrolbooks.com
Apple Warns on Fake ‘Apple Support’ Calls
NYT Parental Control Controversy
The NYT article implied that Apple removed certain apps from the App Store because Apple was killing competition for its own apps. However, Apple indicated there was a privacy issue for data on children.
Link 1 - Summary
Link 2 - Original Article
Link 3 - Apple Response
Link 4 - iMore on Journalism Quality
Report Released on ‘Credential Stuffing’
Whatever you do, do not reuse passwords. It is likely that any password you used in the past is in these databases.
‘Notarization’ of Mac Code Coming
This will look for malicious code automatically, and if none is found, the code will be blessed and hence passed by the Gatekeeper automatically when you load it onto your computer.
Intelligent Tracking Prevention Gets an Update
Web browsers, including Safari, can prevent web client code from tracking you over multiple web sites.
Apple & Qualcomm Settle Dispute
Sudden unexpected settlement. This may relate to Apple’s need for 5G chips. The terms are secret.
SCOTUS Rules Against Apple
It says that civil suits are allowed in these circumstances, but did not say anything about the merit of any particular suit.
Investor Class Action Suit against Apple
Apple Quoting 1 Day Turn Around for MBP Keyboard Issues
Apple Highlights Trade-In for iPhones
Apple will recycle old iPhones, and maybe give you some cash for it.
Apple Helping Environment with Mangroves
Apple Holds Apple Park Ceremony & Tribute to Steve
Apple Stores “Lose Their Luster”?
Bloomberg says so, but our membership begs to differ. The Palo Alto downtown store has recently initiated a quiet zone section to the store, to help persons who need a quiet environment to interact with the staff.
Apple’s Famous Design Team - Changes…..
Apple Watch Found in Ocean after Six Months
Apple Reports 2Q Results & Conference Call
B of A Says Apple is Still Innovating
Buffett Still Likes AAPL
AAPL Could be Hurt by Trade War
ALL are Security Updatates
MacOS Mojave 10.14.5
MacOS High Sierra 10.13.6
Mac OS Sierra 10.12.6
Watch OS 5.2.1
Mac Pro and Apple Display
Featured Presentation: Talking Two Factor Authentication
“I’ve stopped using my pet’s name for all of my passwords! Isn’t that enough?!?” Sadly, no. While being smart with passwords is a good first step, even the strongest single factor leaves you one step away from having your data accessed or stolen - hence the need for two-factor authentication (2FA). We’ll address what 2FA is, look at various types of 2FA, address a question some Mac users have about the way Apple implements 2FA, and answer what questions we can.
ABOUT OUR SPEAKERS: Ken Ray and August Trometer
This will be a remote presentation.
August Trometer has over twenty years experience building web, Mac, and iOS apps. He created the first podcasting app, iPodderX, and had one of the first apps in the iOS App Store. For the last ten years, he’s served as CTO for several startups, and was the HIPAA Security Officer for two different health care companies, HomeHero and Harvey. August joined the podcast called The Checklist in the fall of 2018.
Follow August on Twitter: @August
Ken Ray has worked in audio since 1994, filling roles in radio on both the production and operations sides. He began tech news work in 1998, writing business news for the Bay Area’s KBPS. In January of 2000, he served as a primary host for ZDTV Radio/TechTV Radio. After a short time away from audio and tech, podcasts came a calling. Ken worked with Scott Sheppard on Inside Mac in 2005. In 2006, he launched his own daily Apple news podcast - Mac OS Ken, which turned 13 years of age in January 2019. Ken also hosts The Checklist by SecureMac, which he helped develop.
Follow Ken on Twitter:@macosken
Ken was impressed by SecureMac back in 2010, and eight years later had the opportunity to do a podcast about them.
Authentication is the mans by which you identify yourself to an account. Two step authentication protects you against increasingly common password leaks. It increases the level of work that a hacker would have to do.
Authentication relies on three possible factors:
Something you know (a password, security questions)
Something you have (an iPhone, a USB key)
Something you are (fingerprints, facial features, DNA)
With two factor authentication, you will fulfill at least two of the above. However, note that using two pieces of information (things you know) is not sufficient these days. It is best to use something you know combined with something you have. A lot of personal information is available by examining social media. When security questions are set up, it is recommended that the questions and answers be nonsense. For example: “what is your favorite color” might be answered as “plaid”. However, it is absolutely better to use know-have two factors.
ATM have always used two factors: your bank card and your PIN.
Biometric factors are perhaps the most secure factor. So passwords combined with a biometric is the most secure.
One of our members commented that there is a problem with users of older Mac OS that the two factor system is not implemented. Ken has asked that details be sent to him, for investigation.
It is true that two factor authentication is a pain, but it is worth it.
Generally, a backup method is provided in the event you lose a device or forgot a password.
Be sure to print emergency security codes for Google, and get app-specific codes for Apple.
Open Source Presentation: “Battle of Wesnoth”
Q and A