Posts

Frequently Asked Questions Surrounding Apple’s Expanded Protections for Children

Apple’s recent announcement that it would soon be releasing two new technologies aimed at protecting children has generated a firestorm of media coverage and questions from customers. Unfortunately, much of the media coverage has been based on misconceptions about how the technology works, abetted by uncharacteristically bungled communications from Apple. It’s not inconceivable that Apple will modify or even drop these technologies in the official release of iOS 15, iPadOS 15, and macOS 12 Monterey, but in the meantime, we can provide answers to the common questions we’ve been hearing.

What exactly did Apple announce?

Two unrelated technologies:

  • Messages will gain features that warn children and their parents when sexually explicit photos are received or sent. Such content will be blurred, the child will be warned and given the option to avoid viewing the image, and parents may be alerted (depending on the age of the child and settings).
  • Photos uploaded by US users to iCloud Photos will be matched—using a complex, privacy-protecting method that Apple has developed—against known illegal photos considered Child Sexual Abuse Material, or CSAM. If a sufficient number of images match, they’re verified by a human reviewer at Apple to be CSAM and then reported to the National Center for Missing and Exploited Children (NCMEC), which works with law enforcement in the US.

Does this mean Apple is scanning all my iPhone photos?

Yes and no. Messages will use machine learning to identify sexually explicit content in received and sent images. That scanning takes place entirely on the iPhone—Apple knows nothing about it, and no data is ever transmitted to or from Apple as a result. It’s much like the kind of scanning that Photos does to identify images that contain cats so you can find them with a search. So scanning is taking place with this Messages feature, but Apple isn’t doing it.

The CSAM detection feature operates only on images uploaded to iCloud Photos. (People who don’t use iCloud Photos aren’t affected by the system at all.) On the device, an algorithm called NeuralHash creates a hash and matches it against an on-device database of hashes for known illegal CSAM. (A hash is a one-way numeric representation that identifies an image—it’s much like how a person’s fingerprint identifies them but can’t be used to re-create that person.) NeuralHash knows nothing about the content of any image—it’s just trying to match one hash against another. In this case, it’s matching against existing image hashes, not scanning for a type of content, and Apple is notified only after enough image hashes match.

It’s also important to note that this is different from how companies like Facebook, Google, and Microsoft scan your photos now. They use machine learning to scan all uploaded photos for CSAM, and if they detect it, they’re legally required to report it to the NCMEC’s CyberTipline, which received 21.7 million CSAM reports from tech companies in 2020, over 20 million from Facebook alone. Because Apple does not scan iCloud Photos in the US like other companies scan their photo services, it made only 265 reports in 2020.

What happens if the CSAM detection feature makes a mistake?

This is called a false positive, and while vanishingly improbable, it’s not mathematically impossible. Apple tested 100,000,000 images against NeuralHash and its CSAM hash database and found 3 false positives. In another test using 500,000 adult pornography images, NeuralHash found no false positives.

Even if NeuralHash does match an image hash with one in the known CSAM hash database, nothing happens. And nothing continues to happen until NeuralHash has matched 30 images. Apple says that the chances of there being 30 false positives for the same account are 1 in 1 trillion.

I have terrible luck. What if that happens with my account?

Once at least 30 images have matched, the system enables Apple to decrypt the low-resolution previews of those images so a human can review them to see if they are CSAM. Assuming they are all false positives—remember that possession of CSAM is illegal in the US—the reviewer sends them to Apple engineers to improve the NeuralHash algorithm.

Could non-CSAM images end up in Apple’s CSAM hash database?

It’s extremely unlikely. Apple is constructing its database with NCMEC and other child-safety organizations in other countries. Apple’s database contains image hashes (not the actual images; it’s illegal for Apple to possess them) for known illegal CSAM images that exist both in the NCMEC database and at least one other similar database. So multiple international organizations would have to be subverted for such image hashes to end up in Apple’s database. Each source database will have its own hash, and Apple said it would provide ways for users and independent auditors to verify that Apple’s database wasn’t tampered with after creation.

Plus, even if a non-CSAM image hash were somehow added to Apple’s database and matched by NeuralHash, nothing would happen until there were 30 such images from the same account. And if those images weren’t CSAM, Apple’s human reviewers would do nothing other than pass the images to engineering for evaluation, which would likely enable Apple to determine how the database was tampered with.

Couldn’t a government require Apple to modify the system to spy on users?

This is where much of the criticism of Apple’s CSAM detection system originates, even though Apple says the system will be active only in the US. On the one hand, Apple has said it would resist any such requests from governments, as it did when the FBI asked Apple to create a version of iOS that would enable it to break into the San Bernardino shooter’s iPhone. On the other hand, Apple has to obey local laws wherever it does business. In China, that already means that iCloud is run by a Chinese company that presumably has the right to scan iCloud Photos uploaded by Chinese users.

It’s conceivable that some country could legally require Apple to add non-CSAM images to a database, instruct its human reviewers to look for images the country finds objectionable, and report them to law enforcement in that country. But if a country could successfully require that of Apple, it could presumably force Apple to do much more, which hasn’t happened so far. Plus, the CSAM detection system identifies only known images—it’s not useful for identifying unknown images.

Is Apple heading down a slippery slope?

There’s no way to know. Apple believes this CSAM detection system protects the privacy of its users more than scanning iCloud Photos in the cloud would, as other companies do. But it’s highly unusual for a technology that runs on consumer-level devices to have the capacity to detect criminal activity.

(Featured image by iStock.com/metamorworks)


Social Media: Apple’s recently announced expanded protections for child safety have generated a firestorm of criticism and confusion. We attempt to answer some of the most common questions we’ve received.

Ever Have Trouble Printing? Try a Different Printer Driver

Some clients have reported problems with HP laser printers failing to print. Sometimes there’s an error. Other times, the print job just disappears into the ether. It’s unclear why this is happening or how widespread it is, but here’s a workaround that can help. Create a new printer configuration by clicking the + button in System Preferences > Printers & Scanners and selecting your printer in the list. Then, from the Use pop-up menu, choose something other than the default Secure AirPrint driver. We’ve had the most luck with Generic PostScript Printer. Both the old and new configurations will be available when printing, so if one doesn’t work, try again with the other one.

(Featured image by Mahrous Houses on Unsplash)

Nightstand Mode Makes Your Apple Watch a Helpful Bedroom Companion

Most Apple Watch users charge their watch every night, putting it on a charger as part of a bedtime routine. If that’s you, make sure you’re not missing one of the Apple Watch’s best features: nightstand mode. When you enable it in the iPhone’s Watch app, in General > Nightstand Mode, a charging Apple Watch displays the charging status, current time and date (in a large, easily readable font), and the time of any alarm you’ve set. It uses a green color that won’t shock your eyes in the middle of the night, and after a minute, the screen goes completely dark. To see it again, tap the watch or—even better!—the surface it’s on. The screen lights up for 10 seconds before going dark again. (And yes, we love the little classic Mac stand.)

(Featured image by Adam Engst)

The Mac’s Magic Shortcut to Trashing Files and Photos Quickly

Sure, you could select a file in the Finder and choose File > Move to Trash or drag it to the Trash in the Dock. Similarly, you can trash selected photos in Apple’s Photos app by choosing Image > Delete X Photos, or by pressing the Delete key, but both of those methods result in a dialog asking if you’re sure. The easiest way of trashing a file in the Finder or a picture in Photos is to select it and press Command-Delete. Poof, it’s in the Trash (Finder) or Recently Deleted album (Photos), with no extra effort or prompts! And if you accidentally trash the wrong thing, just press Command-Z to restore it. Keep this key combination in mind for other apps too, since they may also support it as a shortcut for “delete without prompting.”

(Featured image by iStock.com/YurolaitsAlbert)

Filter What’s Showing in Photos to Focus on Specific Types

You know you can make albums and smart albums in Photos, and do searches to find photos that contain particular objects. But what if you want to separate photos from videos, identify which images in an album have been edited, or pick out just the ones you’ve favorited? For that, use Photos’ filters. On the Mac (below left), click the Showing menu in the upper-right corner, and in iOS and iPadOS (iPhone screens below right), tap the ••• button in the upper-right corner and tap Filter. Either way, you can choose Favorites, Edited, Photos, or  Videos to limit the items showing to that type. When you’re done, turn the filter off by choosing All Items.

(Featured image by iStock.com/metamorworks)

Picking the Best Mac for a College-Bound Student

Do you have a child heading off to college soon? As you’re undoubtedly aware from high school, a computer is essential for a college student. If you haven’t been paying close attention to Apple’s Mac lineup, you might wonder which model makes the most sense.

First, don’t buy anything without first checking with the college. Many college departments have specific requirements based on the software that students have to use in their classes. Generally, these revolve around processor type, amount of RAM, and storage space. Luckily, current Macs should meet the requirements.

Colleges often specify—and students usually prefer—laptops instead of desktop machines. Although the iMac is an excellent machine with a gorgeous screen, it’s too big and unwieldy for the transient lifestyle of the typical college student. The same is true of a Mac mini and external display. A laptop is much easier to pack during moves, and it can travel to class every day. A student who’s accustomed to taking notes on an iPad with a Smart Keyboard and Apple Pencil might be able to use that along with a desktop Mac, but most people should focus on Apple’s laptops.

In the past, it was harder to decide which model was best for a given student, but with Apple’s move to the M1 chip, which significantly outperforms the Intel processors used in previous models, the decision is easier. We see three primary scenarios:

  • Most students: Buy Apple’s M1-based MacBook Air. It’s Apple’s smallest, lightest, and least expensive laptop, but thanks to its M1 processor, it has nearly identical performance to the heavier and more costly M1-based MacBook Pro. It also has the same lovely 13.3-inch Retina display. It starts at $999, and an education discount may be available.
  • Slightly better specs: If cost is of little concern, the M1-based MacBook Pro offers just a bit more performance due to fans that keep its M1 chip cool. It also has a Touch Bar (which some people like, but others don’t), somewhat longer battery life, and nominally better speakers and microphones. It starts at $1299, and again, education pricing may be available.
  • Windows compatibility: The only reason to buy an older Intel-based MacBook Pro— available in either 13.3-inch ($1799) and 16-inch ($2399) models—is if Windows compatibility is essential. All Intel-based Macs can run Windows with no problems, either by restarting in Apple’s Boot Camp or using virtualization software like VMware Fusion (free for students) or Parallels Desktop. (On M1-based Macs, it’s possible to run Parallels Desktop and Windows for ARM Insider Preview, but we can’t recommend that anyone rely on that combination yet.)

Regardless of which laptop you decide on, you’ll have to pick a processor, an amount of RAM, and storage capacity:

  • Processor: With the M1-based MacBook Air, you have a choice between two CPUs that are identical apart from one having a 7-core GPU and the other an 8-core GPU. No one is likely to notice the difference for everyday software, but the price difference is only $50 if you’re also getting at least 512 GB of storage. (The M1-based MacBook Pro offers only the 8-core GPU chip.) For Intel-based Mac laptops, there are various options based on clock speed and number of cores. They’re all fine, but you pay for performance, so buy what fits your budget and needs.
  • RAM: With the M1-based Macs, you can choose between 8 GB and 16 GB of RAM. 8 GB may be acceptable, but we recommend 16 GB. Intel-based Mac laptops start at 16 GB, which is a decent base level, and you can go up to 32 GB or 64 GB (16-inch only). Generally speaking, go beyond 16 GB only if you know you need it.
  • Storage: For the M1-based Macs, 256 GB is the lowest storage level, whereas the Intel-based Macs usually start higher. Either way, you can upgrade to a maximum of 2 TB. Choose the amount of storage based on budget and anticipated usage—video takes a lot of space, as can large numbers of photos, but most other uses don’t.

To our thinking, the most obvious choice for a Mac that’s likely to last for four years of college would be the M1-based MacBook Air with the 8-core GPU, 16 GB of RAM, and 512 GB of storage. Be sure to budget for AppleCare+, too; it’s almost guaranteed that some mishap will befall a student laptop, and AppleCare+ covers up to two incidents of accidental damage every year.

You’ll need to have some conversations with your child to find out what they think they’ll need—and be sure to double-check that against the college’s recommendations—but if you have any questions after that, don’t hesitate to contact us.

(Featured image by Apple)


Social Media: Which Mac is the best for a new college student? Short answer: the M1 MacBook Air. Read on for the longer explanation and how we recommend configuring it.

Name That Tune with Siri or Control Center

Don’t you hate it when a familiar song is playing but you can’t think of what it’s called? Or worse, when you hear a new track you really like but have no one to ask what it is? Never worry about that again, thanks to your iPhone or iPad. Back in 2018, Apple bought the music identification app Shazam and has since integrated it into iOS. You can still use Shazam, but it’s easier to ask Siri, “What’s playing?” or tap the Music Recognition button in Control Center (add it in Settings > Control Center) and then let your iPhone listen to the music for a few seconds. Siri is easiest, but the Control Center button is perfect in situations where you’d prefer to keep your question quiet. The music recognition feature recognizes only recorded music—no high school glee club versions, sorry—and while not perfect, is often helpful. Tap the notification that appears to open the song in Apple Music.

(Featured image by Laura Balbarde from Pexels)

Two Important Tips for External Storage Devices

It’s tempting to think that most external storage devices—whether simple hard drives or more complicated network-attached storage (NAS) units—are relatively similar because they all do roughly the same thing. However, a recent problem with older Western Digital My Book Live NAS devices highlighted that there can be large differences. In that case, hackers figured out how to cause a factory reset that wiped the entire drive of all files. (If you have one, note that Western Digital recommends disconnecting it from the Internet immediately.) Two tips: Although no one could have anticipated this particular problem, ask us before buying external storage because we may be able to recommend known good products or warn you away from sketchy manufacturers. Also, if you store unique data on an external drive, you must back up that drive just like your Mac’s internal drive or risk losing everything, like these My Book Live owners did. Backup, backup, backup!

(Featured image by Western Digital)

Live in the Future by Using Apple Pay on Your Apple Watch

With mask wearing over the past year rendering Face ID ineffective at cash registers, we’ve become fond of using the Apple Watch for contactless payments with Apple Pay. We recommend it highly since it’s so fast and convenient. Once you’ve set up a credit card in the Wallet app on your iPhone, switch to the Watch app, go to My Watch > Wallet & Apple Pay, and tap the Add button next to the desired card. From then on, to pay for a purchase, double-click the Apple Watch’s side button and put it very close to the reader. (We generally turn our arms so we can put the Apple Watch face flat on the reader.) It takes just seconds and tends to wow cashiers who haven’t seen it before.

(Featured image by Karolina Grabowska from Pexels)

Disable Unused Sharing Options on Your Mac If You’re Not Using Them

Many security breaches—even high-profile ones—stem from simple oversight. There’s one spot in macOS that has long been particularly susceptible to such lapse: the Sharing pane of System Preferences. In it, you can enable a wide variety of sharing services, some of which could allow another user to access your Mac remotely. They all let you limit access to particular users, but passwords can be stolen, accounts can be compromised, and server software can have bugs. For safety’s sake, if you’re not actively using a sharing service, turn it off. The most important ones to disable when not in use are Screen Sharing, File Sharing, Remote Login, Remote Management, and Remote Apple Events. We also caution against leaving Printer Sharing and Internet Sharing on unnecessarily.

(Featured image by Morgane Perraud on Unsplash)