May 20, 2019 SVMUG


Video from TCO Author: How to Use Siri in the Car

Take Control of Siri is available at


Apple Warns on Fake ‘Apple Support’ Calls

NYT Parental Control Controversy

The NYT article implied that Apple removed certain apps from the App Store because Apple was killing competition for its own apps. However, Apple indicated there was a privacy issue for data on children.

Link 1 - Summary

Link 2 - Original Article

Link 3 - Apple Response

Link 4 - iMore on Journalism Quality

Report Released on ‘Credential Stuffing’ 

Whatever you do, do not reuse passwords. It is likely that any password you used in the past is in these databases.

‘Notarization’ of Mac Code Coming

This will look for malicious code automatically, and if none is found, the code will be blessed and hence passed by the Gatekeeper automatically when you load it onto your computer.

Intelligent Tracking Prevention Gets an Update

Web browsers, including Safari, can prevent web client code from tracking you over multiple web sites.



Apple & Qualcomm Settle Dispute

Sudden unexpected settlement. This may relate to Apple’s need for 5G chips. The terms are secret.

SCOTUS Rules Against Apple

It says that civil suits are allowed in these circumstances, but did not say anything about the merit of any particular suit.

Investor Class Action Suit against Apple


General News:

Apple Quoting 1 Day Turn Around for MBP Keyboard Issues

Apple Highlights Trade-In for iPhones

Apple will recycle old iPhones, and maybe give you some cash for it.

Apple Helping Environment with Mangroves

Apple Holds Apple Park Ceremony & Tribute to Steve

Apple Stores “Lose Their Luster”?

Bloomberg says so, but our membership begs to differ. The Palo Alto downtown store has recently initiated a quiet zone section to the store, to help persons who need a quiet environment to interact with the staff.

Apple’s Famous Design Team - Changes…..

Apple Watch Found in Ocean after Six Months



Apple Reports 2Q Results & Conference Call

B of A Says Apple is Still Innovating 

Buffett Still Likes AAPL

AAPL Could be Hurt by Trade War



ALL are Security Updatates

MacOS Mojave 10.14.5

MacOS High Sierra 10.13.6

Mac OS Sierra 10.12.6

iOS 12.3

Watch OS 5.2.1

tvOS 12.3

Safari 12.1.1



Mac Pro and Apple Display


Featured Presentation:  Talking Two Factor Authentication

“I’ve stopped using my pet’s name for all of my passwords! Isn’t that enough?!?” Sadly, no. While being smart with passwords is a good first step, even the strongest single factor leaves you one step away from having your data accessed or stolen - hence the need for two-factor authentication (2FA). We’ll address what 2FA is, look at various types of 2FA, address a question some Mac users have about the way Apple implements 2FA, and answer what questions we can.  

ABOUT OUR SPEAKERS:  Ken Ray and August Trometer

This will be a remote presentation.

August Trometer has over twenty years experience building web, Mac, and iOS apps. He created the first podcasting app, iPodderX, and had one of the first apps in the iOS App Store. For the last ten years, he’s served as CTO for several startups, and was the HIPAA Security Officer for two different health care companies, HomeHero and Harvey. August joined the podcast called The Checklist in the fall of 2018.

Follow August on Twitter: @August

Ken Ray has worked in audio since 1994, filling roles in radio on both the production and operations sides. He began tech news work in 1998, writing business news for the Bay Area’s KBPS. In January of 2000, he served as a primary host for ZDTV Radio/TechTV Radio. After a short time away from audio and tech, podcasts came a calling. Ken worked with Scott Sheppard on Inside Mac in 2005. In 2006, he launched his own daily Apple news podcast - Mac OS Ken, which turned 13 years of age in January 2019. Ken also hosts The Checklist by SecureMac, which he helped develop.

Follow Ken on Twitter:@macosken

Ken was impressed by SecureMac back in 2010, and eight years later had the opportunity to do a podcast about them.

Authentication is the mans by which you identify yourself to an account. Two step authentication protects you against increasingly common password leaks. It increases the level of work that a hacker would have to do.

Authentication relies on three possible factors:

Something you know (a password, security questions)

Something you have (an iPhone, a USB key)

Something you are (fingerprints, facial features, DNA)

With two factor authentication, you will fulfill at least two of the above. However, note that using two pieces of information (things you know) is not sufficient these days. It is best to use something you know combined with something you have. A lot of personal information is available by examining social media. When security questions are set up, it is recommended that the questions and answers be nonsense. For example: “what is your favorite color” might be answered as “plaid”. However, it is absolutely better to use know-have two factors.

ATM have always used two factors: your bank card and your PIN.

Biometric factors are perhaps the most secure factor. So passwords combined with a biometric is the most secure.

One of our members commented that there is a problem with users of older Mac OS that the two factor system is not implemented. Ken has asked that details be sent to him, for investigation.

It is true that two factor authentication is a pain, but it is worth it.

Generally, a backup method is provided in the event you lose a device or forgot a password.

Be sure to print emergency security codes  for Google, and get app-specific codes for Apple.




Open Source Presentation: “Battle of Wesnoth”


Q and A

  1. Can I use an iPad with more than one user, i.e. each has their own data under their own Apple ID?
  1. iPads for educational installations have a multiple user capability, however consumer versions do not. There is a rumor that Apple may add this feature someday.
  1. I have a previously owned MacBook Pro. It was supposed to have been cleaned of previous data and apps, but it keeps trying to set up the apps that were purchases by the previous owner.
  1. Either the Mac was not actually cleaned, or it may be effected by a registration on iCloud. You must contact the previous owner and ask that person to deregister the computer.