Next meeting: April 12, 2025, 10 am.
LOCATION CHANGE: Yavapai College, Building 31, Room 101. Click for more information.

Mary Ann Clark

Why Not in Include Personal Details in AI Chats

We knew this would happen soon. Which is another reason Apple’s approach to AI is more private and secure… submitted by Frank Croft

PSA: Here’s another reason not to include personal details in AI chats

Summary

The article discusses the potential risks of including personal details in AI chats. Security researchers have discovered a malicious prompt that instructs an AI chatbot to gather and upload personal data to a server. The attack is disguised as a helpful prompt, making it difficult for users to detect. The researchers tested the attack method on two LLMs, LeChat and ChatGLM, and found that it was successful.

​Read at https://9to5mac.com/2024/10/17/psa-heres-another-reason-not-to-include-personal-details-in-ai-chats/

Share

Why is my iPhone showing SOS? Here's what it means and how to fix it

Brandon Girod
https://www.palmbeachpost.com/story/news/local/2024/09/30/iphone-only-showing-sos-heres-what-it-means-and-how-to-fix-it/75451640007/

An elevated number of iPhone users across the country on Monday are reporting their phones have been put into SOS mode, cutting off their cellular service.

Over the past 24 hours, Verizon reported more than 105,000 users are reporting an outage, with a smaller number of users with AT&T, T-Mobile and United Cellular also reporting problems.

SOS and SOS only on iPhones are features that kick in when your phone loses connection to its cellular network, typically during a network outage. Rather than completely cutting you off from the world, however, SOS mode still allows you to call emergency services if necessary.

Here’s what to know about the feature and how you can potentially fix it.

My iPhone is showing SOS or SOS only

When iPhones aren’t connected to a cellular network, they will typically alert the user by giving an indication in the phone’s status bar. Those notifications usually say “No Service” or “Searching,” but your phone may also say “SOS” or “SOS only.”

When your phone goes into SOS mode, it can still make emergency calls. When you make an emergency call with your iPhone, it automatically calls the local emergency number and shares your location information with emergency services.

Pensacola severe weather:'This event will go from 0 to 100 very quickly': EF-2 tornadoes, 70 mph gusts forecast

Additionally, you can add emergency contacts under your phone’s medical ID options in the settings. Adding an emergency contact will alert them to your location with a text message after an emergency call ends.

How to get your phone out of SOS mode

In many cases, if your phone is in SOS mode, external circumstances outside your control could be responsible. However, there are some troubleshooting steps you can take on your end:

  • Make sure you’re in an area with cellular network coverage

  • Turn your cellular data off and then on:

    • Go to settings

    • Toggle cellular or mobile data off and then back on

  • If you’re traveling internationally, make sure your phone is set up for data roaming:

    • Go to settings

    • Tap cellular

    • Cellular data options

    • Toggle data roaming

  • Try restarting your device

  • Check your carrier settings for an update

    • Make sure your device is connected to Wi-Fi or a cellular network

    • Open settings and navigate to General > About. If an update is available, you’ll see it here

  • Turn your cellular line off and back on

    • Open settings

    • Tap Cellular and see if your cellular line is turned on

    • Don’t see a cellular line in settings? Setup an eSim or reinsert your physical SIM card

  • Reset your network settings

    • Open settings

    • Tap General > Transfer or Reset [Device] > Reset > Reset network settings

    • Note: This will reset your Wi-Fi networks and passwords, cellular settings, VPN and APN settings you used before

  • Update your iPhone to the latest version of iOS

    • Plug your device into power and connect to Wi-Fi

    • Go to settings > General and then tap “Software Update”

    • Choose the update you want to install

  • Contact your wireless carrier

    • If all else fails, reach out to your carrier to see if there are any outages in the area, ensure your account is in active and good standing and make sure your device isn’t being blocked from receiving cellular service

Fallen tree:Tree falls on Myrtle Grove home during storms leaving two with minor injuries

How SOS works on iPhones

Making an SOS call on an iPhone 8 or newer is an easy, two-step process:

  • Press and hold the side button and one of the volume buttons (either work) until the Emergency SOS slider appears.

  • Drag the Emergency Call slider to call emergency services.

If you continue to hold down the side and volume buttons but don’t make an SOS call, a countdown will begin, and an alert will sound. Releasing the buttons after the countdown will automatically call emergency services.

Making SOS calls on iPhone 7 or earlier is just as simple:

  • Rapidly pressing the side or top button five times will bring up the Emergency Call slider.

  • Drag the SOS slider to call emergency services.

How to end an SOS call you made by accident

You can easily cancel an SOS call you started by accident, even after the countdown begins. To do so on an iPhone 8 or later, release the side button and the volume button before the countdown ends. To stop an SOS call on an iPhone 7 or earlier, press the stop button and then tap “Stop Calling.”

If the call begins, don’t hang up. Simply wait until a responder answers and explain that you made the call by mistake. Otherwise, the dispatcher may send responders to your phone’s location.

How to add emergency contacts

Here’s how you can add emergency contacts to your iPhone:

  • Open the Health app and tap on your profile picture

  • Open Medical ID

  • Tap edit, then scroll to emergency contacts

  • Tap the add button

  • Tap a contact and add their relationship

  • Tap done to save your settings

How to remove emergency contacts

Here’s how to remove emergency contacts:

  • Open the Health app and tap on your profile picture

  • Open Medical ID

  • Tap edit, then scroll to emergency contacts

  • Tap the delete button next to a contact

  • Tap done to save your settings

How to turn on Wi-Fi calling

Here's how you can turn on Wi-Fi calling on your iPhone:

  • Navigate to settings

  •  Tap Phone

  •  Then tap Wi-Fi calling

You may need to enter or confirm your address for emergency services, according to Apple.

Once Wi-Fi calling is available, you will see "Wi-Fi" in the status bar while viewing the Control Center.

When cellular service is available, your iPhone uses it for emergency calls. If you turn on Wi-Fi Calling and cellular service isn't available, emergency calls might use Wi-Fi calling.

Your device's location may be used to aid response efforts when you place

Share

Don’t ever hand your phone to the cops

Image: Cath Virginia / The Verge; Getty Images

You should never voluntarily hand your phone to a police officer.

It’s going to become increasingly tempting for the cops to ask and for you to comply, especially as more and more states adopt digital ID systems that allow driver’s licenses and state IDs to be added to Apple Wallet on iOS and Google Wallet on Android. Californians can now add their driver’s licenses and state IDs to their iPhones and Apple Watches in addition to Android devices, making the state one of seven — alongside Arizona, Colorado, Georgia, Maryland, Hawaii, and Ohio — to allow storing digital IDs through Apple’s system.

These particular digital IDs are so far pretty limited. California’s are for use at “select TSA checkpoints” and participating businesses, for instance — they aren’t meant to be used as identification in traffic stops or other police interactions, which means users are supposed to continue carrying their physical IDs. But other states — including Louisiana and Colorado — have rolled out their own digital IDs that can be used during traffic stops and other police interactions, which may have fewer privacy protections. And Apple’s vision for Apple Pay has long been explicitly to replace your entire wallet, which means that eventually, these IDs will be meant for use during police stops.

No matter what, teaching people they can add their IDs to their phones means some people will inevitably leave the house without physical ID, and that means creating the opportunity for cops to demand phones — which you should never, ever do. Technical details of your digital ID aside, handing your phone to a police officer grants law enforcement a lot of power over some of your most intimate personal data.

In Riley v. California, the Supreme Court unanimously held that police need a warrant to search through cell phones, even during otherwise lawful arrests. But if you hand over your unlocked phone to a police officer and offer to show them something, “it becomes this complicated factual question about what consent you’ve granted for a search and what the limits of that are,” Brett Max Kaufman, a senior staff attorney in the ACLU’s Center for Democracy, told The Verge. “There have been cases where people give consent to do one thing, the cops then take the whole phone, copy the whole phone, find other evidence on the phone, and the legal question that comes up in court is: did that violate the scope of consent?”

If police do have a warrant to search your phone, numerous courts have said they can require you to provide biometric login access via your face or finger. (It’s still an unsettled legal question since other courts have ruled they can’t.) The Fifth Amendment typically protects giving up passcodes as a form of self-incrimination, but logging in with biometrics often isn’t considered protected “testimonial” evidence. In the words of one federal appeals court decision, it requires “no cognitive exertion, placing it firmly in the same category as a blood draw or fingerprint taken at booking.”

The court said its ruling shouldn’t necessarily extend to “all instances where a biometric is used to unlock an electronic device” because Fifth Amendment questions “are highly fact dependent and the line between what is testimonial and what is not is particularly fine.” And as Recode pointed out in 2020, a defense attorney could argue that any evidence found this way is illegal and should be suppressed — but that’s a risky bet. “It’s fair to say that invoking one’s rights not to turn over evidence is stronger than trying to have the evidence suppressed after the fact,” Andrew Crocker, a senior staff attorney for the Electronic Frontier Foundation, told Recode for that piece.

You might be thinking at this point: you’ve got nothing incriminating on your phone! And an officer may well come to that conclusion. But they could also find something you didn’t even realize was there. “There are a lot of laws on the books, and if a prosecutor or police officer decides to go after you, are you sure you didn’t do anything?” Jay Stanley, a senior policy analyst with the ACLU’s Speech, Privacy, and Technology Project, told The Verge. “You’re only opening yourself to abuse, to errors, to mistakes. There could be a coincidence that placed you at the scene of a crime that you weren’t even aware of.” Even if you assume most officers are acting in good faith, there are plenty of documented instances of officers abusing their power and facing no legal repercussions. There’s no reason to preemptively hand over something that could be used against you.

There are some minor protections built into Apple and Google’s current systems — you can display an encrypted ID without fully unlocking your phone, and various authorities can scan your ID wirelessly if they have special readers. But you don’t want to be in a situation where you’re searching the web for the technical and policy details of your digital ID system when a cop demands your phone — you’re much better off handing over your physical ID card.

Woman sent herself an Apple AirTag to help catch mail thieves

A California woman whose mail was recently stolen used technology as bait to track down the thieves, the Santa Barbara County Sheriff’s Office says.

Authorities in Los Alamos arrested two suspects on Monday with the help of an Apple AirTag locator device the woman had mailed to herself, the sheriff’s office said in a news release.

Share

YC Bookstore Now Apple Product Seller

The Yavapai College bookstore is now an official Apple product seller. Some of the computers must still be purchased online but it looks like they will have some of the smaller items as well as cables, chargers, adaptors, covers, tags, and iPods in stock. The prices seem to match those of the Apple Store, nice and handy.

https://www.bkstr.com/yavapaistore/shop/electronics/computers-tablets/apple?cm_sp=AppleFY25-_-PersistentComponentBTSPromo-_-218

Share

Apple gives you one main reason to use Safari in new ad

José Adorno

In a new global ad campaign, Apple is highlighting the privacy features of the Safari browser. While Google Chrome is the most popular browser, Apple wants to ensure users of its ecosystem are aware of the benefits of its built-in solution.

In this almost two-minute ad, Apple shows pesky birds and bats transformed into security cameras. They hover around smartphone users while they browse the web on their Android smartphones. People try to avoid this surveillance at all costs by running, shouting, or hiding their phones.

However, the only way to actually protect themselves from this plague is solved by an iPhone user when they open Safari, and these cameras explode in mid-air. The ad ends with Apple’s slogan: “Privacy. That’s iPhone.”

See great article, but even better ad…


https://bgr.com/tech/apple-gives-you-one-main-reason-to-use-safari-in-new-ad/

Submitted by Frank Croft, Jul 17, 2024

Share

MacOS TIP: Keychain vs Keychain Access

Author: You.com AI enhanced with Claude 3 Sonnet, July 14, 2024

Editor: John Carter

Apple's Keychain and Keychain Access have been integral parts of macOS for securely

storing and managing passwords, encryption keys, and other sensitive information.

Here's an overview of their historical and present usage:

Keychain

The Keychain is a secure storage system introduced in macOS (previously called Mac

OS X) to store passwords, encryption keys, certificates, and other sensitive data. It uses

robust encryption to protect this information, which can only be accessed with the user's

login password or a specific keychain password.

Keychain Access

Keychain Access is a macOS application that provides a user interface for managing

the various keychains on a Mac. It allows users to view and edit the contents of their

keychains, including passwords, certificates, and secure notes. Keychain Access has

been a part of macOS since its early versions, providing a convenient way for users to

manage their sensitive information.

Historical Usage

The Keychain system and Keychain Access app have been integral components of

macOS since its inception. They have evolved over time to enhance security and

functionality:

1. Early Versions: In the initial releases of Mac OS X, Keychain Access was a basic

tool for managing passwords and encryption keys.

2. Improved Security: With each subsequent macOS release, Apple has

strengthened the security of the Keychain system, introducing features like access

control lists (ACLs) and better integration with other Apple services.

3. iCloud Keychain: With the introduction of iCloud Keychain in macOS Sierra

(2016), users could sync their passwords, credit card information, and other secure

data across their Apple devices.Present Usage

In the latest versions of macOS, Keychain and Keychain Access continue to play a

crucial role in password management and secure data storage:

1. Password Management: Keychain Access stores passwords for websites,

applications, and services, allowing users to autofill login credentials securely.

2. Secure Notes: Users can store encrypted notes, such as credit card information or

secure documents, within their keychains.

3. Certificate Management: Keychain Access manages digital certificates used for

secure communication and authentication.

4. iCloud Keychain Integration: iCloud Keychain synchronizes passwords, credit

card information, and other secure data across a user's Apple devices, ensuring

seamless access.

While the terminology and specific features have evolved, the core functionality of

Keychain and Keychain Access remains essential for macOS users to securely store

and manage their sensitive information across devices and services.

Creating a New Keychain:

When you create a new keychain using Keychain Access, it serves as an additional

secure storage location separate from the default keychains. To create a new keychain,

right-click in a blank part of the left sidebar of Keychain Access and select an option

(new or add) from the menu.

The main reasons for creating a new keychain include:

1. Separate Password: You can set a different password for the new keychain,

distinct from your user account password. This can provide an additional layer of

security if your user account password is compromised.2. Selective Access: You can control which applications or services have access to

the new keychain, allowing you to isolate sensitive information and grant access

only to specific applications.

3. Backup and Portability: New keychains can be easily backed up, copied, or

transferred to other Macs, providing a convenient way to manage and share

specific sets of credentials or secure data.

4. Organization: Creating multiple keychains can help you organize your sensitive

information based on different categories or purposes, such as separating work-

related credentials from personal ones.

While the default login and system keychains are essential for storing and managing

your day-to-day passwords and credentials, creating additional keychains can offer

more flexibility, security, and organizational benefits, depending on your specific needs.

1. Selecting "New": When you choose "New" from the "File" menu in Keychain

Access, it allows you to create a brand new keychain file. This is essentially a

separate container or database that can store passwords, certificates, and other

secure items independently from your existing keychains. You can create a different

password for each Keychain or use the same password used to log in. All Keychains

are stored in ~/Library/Keychains (where “~” is the user’s Home directory).

Creating a new keychain is useful when you want to:

• Organize your secure items into different logical groups or categories.

• Set a different password for the new keychain, separate from your login or

system keychain.

• Share or transfer a specific set of secure items with others by providing them

with the new keychain file.

2. Selecting "Add": When you choose "Add" from the menu, it allows you to add a

new secure item (like a password, secure note, certificate, or key) to an existing

keychain that is already open in Keychain Access.

Adding a new item is useful when you want to:

• Store a new password, secure note, or other sensitive information in your login

or system keychain.

• Add a new certificate or encryption key to an existing keychain for authentication

or encryption purposes.

• Organize your secure items within the same keychain by creating categories or

folders.

In summary:"New" creates a brand new keychain file, which acts as a separate container for storing

secure items.

"Add" allows you to add new secure items (like passwords, notes, certificates) to an

existing keychain that is already open and accessible in Keychain Access.

The choice between "New" and "Add" depends on whether you need to create a

separate keychain for organizational or sharing purposes, or if you simply want to add

new secure items to an existing keychain that you're already using.

The Proposed Apple Passwords App

Apple is set to introduce a new standalone app called "Passwords" that aims to

enhance and streamline the password management experience across its ecosystem of

devices and platforms.

Key Features and Functionality

Unified Password Manager:

The Passwords app will serve as a centralized hub for managing all your saved

passwords, passkeys, and verification codes across Apple devices, including Macs,

iPhones, iPads, and even the upcoming Vision Pro headset.

It will replace the current method of accessing passwords through individual app

preferences or system settings.

Cross-Platform Synchronization:

Passwords will sync seamlessly across macOS, iOS, iPadOS, and Vision Pro devices

using iCloud Keychain.

Notably, it will also sync with Windows PCs via the iCloud for Windows app, expanding

password management capabilities beyond Apple's ecosystem.

Improved Organization and Accessibility:

The app promises better methods for organizing and accessing your saved passwords,

logins, and other secure information.

It aims to provide a more user-friendly interface compared to the current iCloud

Keychain experience.

Security Alerts and Recommendations:

Passwords will likely incorporate security features like compromised password alerts

and recommendations for improving password strength and enabling two-factor

authentication.

Passkey Support:In line with Apple's push for passwordless authentication, the Passwords

app will support managing and using passkeys, which leverage public-key

cryptography for secure sign-ins.

Potential Benefits

1. Centralized Management: A dedicated app for managing passwords across

devices can streamline the user experience and make it easier to access and

update login credentials.

2. Cross-Platform Accessibility: Extending password synchronization to Windows

PCs addresses a long-standing limitation and caters to users who operate in multi-

platform environments.

3. Enhanced Security: Features like security alerts, recommendations, and passkey

support can help users maintain better password hygiene and adopt more secure

authentication methods.

While the Passwords app is still in development, it represents Apple's commitment to

improving password management and security for its users across various platforms

and devices.

-o-

Share

Celebrate World Backup Day

So, does everyone already have a backup, or will March 31st be your first??

WHAT IS A BACKUP?

A backup is a copy of all your important files — for example, your family photos, home videos, documents and emails. Instead of storing it all in one place (like your computer or smartphone), you keep a copy of everything somewhere safe. MORE

Share

Apple Wants to End Passwords for Everything.

Wall Street Journal. By Dalvin Brown Follow June 12, 2022 800 am ET

Here’s How It Would Work.

Goodbye, complex, hard-to-remember passwords. Hello, logging in with your face and fingerprints.

Your passwords keep your money, your job and your identity safe. But you hate them, and they’re flawed. Apple Inc. is trying to get rid of them entirely.

When Apple’s latest software updates for iPhones, iPads and Macs arrive this fall, they will include a way for users to log into various online accounts without entering passwords or relying on password managers to save and fill in credentials. The technology generates unique passkeys for each app or browser-based service in the place of characters. Those passkeys, a new type of identity authentication, prompt a scan of your face or fingerprints to log you in.

Share

Using Meeter to Manage Online Meetings

We’ve all been using Zoom, Google Meet, and other electronic meeting apps for months now, and many of us have figured out a way to manage the links to all these meetings. However, there are still some of us who are still fumbling without a simple way to keep track of how to get to the meetings we’re interested in. If you’re a member of PMUG, as I assume you are, you may have three or four planned meetings every month to track—more if you belong to other organizations. So I thought I’d share the process I use and along the way introduce you to a small utility I’ve found extremely useful. I will assume, like me, you’re using Apple Mail and Calendar.

Email.jpg

When a meeting announcement arrives, I select the contents of the message and use the date in the message to create a new calendar entry. 

Calendar.jpg

If that entry is like many I receive, the meeting URL is embedded somewhere within the meeting information. To make meetings easier to find, I’ve set up an email flag called Upcoming Zoom. Later, I can display just those messages with that flag in order to find the meeting information. However, if I have a lot of meetings, or if the meeting administrator sent meeting announcement out early, it still might be a search to find the right email.

Meeter to the Rescue

Meeter (https://trymeeter.com/) is a small productivity app featured on the website 9to5Mac, MacRumors, Macworld and others. It automatically pulls all my upcoming meetings into a single menu-bar icon where it sorts them by date with the next meeting at the top of the list. 

Meeter.jpg

From there I can merely click on the meeting and Meeter, recognizing the meeting platform, launches the appropriate meeting app. Boom, I’m in my meeting or I’m waiting for the meeting administrator to let me in. The software is pretty robust and allows you to change some of its behavior on the Preferences window.

Meeter works with Zoom, Webex, Teams, Facetime, GoToMeet, Hangouts, Chime BlueJeans, and Meet. You can adjust the preferences to show today’s meeting or 3, 7 or 10 days in the future. If you use multiple calendars to manage your work, you can tell Meeter which ones to pay attention to, and you can set up speed dial information for specific contacts. 

It is currently free. (I’m using version 1.8.9.)

As you would expect of Mac software Meeter (https://trymeeter.com/) just seems to work without a lot of diddling around on my part. Check it out.

Mary Ann Clark

Share

New Take Control Books

Hello from Joe Kissell of Take Control Books!

Seems like every time I turn around, there’s another news report about a big company being hacked, a gigantic list of passwords being stolen, or some other security vulnerability being exposed. Every time this happens, huge numbers of people suffer—sometimes in small ways (like having to jump through hoops to prove their identity or recover an account) but, all too often, in large ways (like identity theft that leads to major financial losses).

Most of this suffering is preventable, and the first step is handling your passwords properly. If you use the same password on a bunch of different sites, or if any of your passwords are short, easy-to-guess strings (like password1 or letmein or qwerty), I’m sorry to say you’re very likely to be a future victim of a password hack. But having unique, strong, hack-resistant passwords doesn’t mean going through a lot of hassle. You can have great passwords and convenience too!

I’m happy to announce brand new editions of two books that address different aspects of dealing with passwords: Take Control of Your Passwords and Take Control of 1Password. If you don’t already have a bulletproof password plan, I hope you’ll consider one or both of these books as a way to help you achieve password bliss. (And, you can buy both books together for a special low price.) 

For more information, see the PMUG Take Control Page

Share

Connecting to a VPN

I came across the following diagram on how a VPN (Virtual Private Network) functions, and
thought it might be of interest if you perhaps would want to use a VPN on public wifi networks:

VPN.png

You'll notice your request (message) is encrypted between you and the VPN server, and
may even be encrypted from the VPN server to the internet if you're using a "https" connection,
like with a bank or merchant where use of a credit card is required.

Where it says "VPN Client", that is the specific VPN program you are using. Since the use of
VPNs is becoming more popular, especially if one uses public wifi frequently, there are many
good ones available. Several even offer 'free' VPN programs with limited usage. The intent
here is to get you 'hooked' so you'll want to upgrade to their paid version. A Google search
will get you many results for VPNs. The Opera browser even has a free, built-in VPN. 

Since I use public wifi often when we travel, I've become a fan of using one. Is it necessary,
one might ask? My answer is to ask: 'is using an Antivirus program necessary?' Possibly not,
but both give me increased peace of mind, with little or no downside.

Jim Hamm

Share