Posts

Here’s How to Load the Desktop Version of a Web Site on an iPhone or iPad

Some Web sites have separate desktop and mobile versions, each theoretically providing the best browsing experience for its platform. Unfortunately, mobile Web sites sometimes leave out necessary features or hide content. That’s especially annoying if you’re browsing on an iPad, where the desktop site would work fine. If you run across such a site while browsing in Safari on the iPhone or iPad, you can ask for its desktop version. Press and hold the Reload button at the right side of the address bar, and then tap Request Desktop Site. If the site allows such a request, as do Wikipedia and the New York Times, the desktop version loads (to read the small text, you may need to pinch out to zoom the page).

The post Here’s How to Load the Desktop Version of a Web Site on an iPhone or iPad appeared first on TidBITS Content Network.

A Simple Technique for Decluttering Your Reminders List

Productivity experts recommend offloading things you have to remember to a task-management app like Apple’s Reminders, which syncs your to-dos among your Mac, iPhone, iPad, and Apple Watch. That’s particularly helpful for tasks you want to be reminded of in a few months or next year, but then those far-in-the-future tasks—especially repeating ones!—clutter your main Reminders list. The solution? Create a Far Future Reminders list, and move reminders to it that aren’t relevant within the next month or so. Just make sure everything in Far Future Reminders is set to alert you on the appropriate day.

The post A Simple Technique for Decluttering Your Reminders List appeared first on TidBITS Content Network.

Did You Know This Hidden Trick for Opening System Preferences Panes Directly?

The System Preferences app on the Mac contains about 30 icons, each leading to additional settings panes. Rather than opening System Preferences, scanning the collection of icons, and clicking the one you want, you can jump directly to the desired pane. Just click and hold on the System Preferences icon in the Dock, and choose a pane from the pop-up menu.

The post Did You Know This Hidden Trick for Opening System Preferences Panes Directly? appeared first on TidBITS Content Network.

Being an Apple User Means You’re Not the Product

There’s an Internet saying: “If you’re not the customer, you’re the product.” The point is that, if you’re getting a service for free, the company providing it sees you not as a customer, but as a product to sell, generally to advertisers.

This is how Google, Facebook, and Twitter operate. They provide services for free, collect data about you, and make money by showing you ads. In theory, the more that advertisers know about you, the better they can target ads to you, and the more likely you’ll be to buy. Personalized advertising can seem creepy (or clueless, when it fails), but it isn’t inherently evil, and we’re not suggesting that you stop using ad-supported services.

This ad-driven approach stands in stark contrast to how Apple does business. Apple makes most of its money by selling hardware—iPhones, Macs, and iPads, primarily. Another big chunk of Apple’s revenue comes from App Store and iTunes Store sales, iCloud subscriptions, and Apple Pay fees. Knowing more about you, what Web pages you visit, what you buy, and who you’re friends with doesn’t help Apple’s business, and on its Privacy page, Apple says bluntly, “We believe privacy is a fundamental human right.”

Of course, once your data is out there, it can be lost or stolen—in June 2018, a security researcher discovered that the online data broker Exactis was exposing a database containing 340 million records of data on hundreds of millions of American adults. Ouch!

Let’s look at a few of the ways that Apple protects your privacy.

Siri and Dictation

The longer you use Siri and Dictation, the better they work, thanks to your devices transmitting data back to Apple for analysis. However, Apple creates a random identifier for your data rather than associating the information with your Apple ID, and if you reset Siri by turning it off and back on, you’ll get a new random identifier. Whenever possible, Apple keeps Siri functionality on your device, so if you search for a photo by location or get suggestions after a search, those results come from local data only.

Touch ID and Face ID

When you register your fingerprints with Touch ID or train Face ID to recognize your face, it’s reasonable to worry about that information being stored where attackers—or some government agency—could access it and use it for nefarious purposes. Apple was concerned about that too, so these systems don’t store images of your fingerprints or face, but instead mathematical signatures based on them. Those signatures are kept only locally, in the Secure Enclave security coprocessor that’s part of the CPU of the iPhone and iPad—and on Touch ID-equipped laptops—in such a way that the images can’t be reverse engineered from the signatures.

And, of course, a major goal of Touch ID and Face ID is to prevent someone from violating your privacy by accessing your device directly.

Health and Fitness

People with medical conditions can be concerned about health information impacting health insurance bills or a potential employer’s hiring decision. To assuage that worry, Apple lets you choose what information ends up in Health app, and once it’s there, encrypts it whenever your iPhone is locked. Plus, any Health data that’s backed up to iCloud is encrypted both in transit and when it’s stored on Apple’s servers.

App Store Guidelines

A linchpin in Apple’s approach to privacy is its control over the App Store. Since developers must submit apps to Apple for approval, Apple can enforce stringent guidelines that specify how apps can ask for access to your data (location, photos, contacts, etc.). This isn’t a blanket protection—for instance, if you allow a social media app Facebook to access your contacts and location, the company behind that app will get lots of data on your whereabouts and can even cross-reference that with the locations of everyone in your contact list who also uses the service.

In the end, only you can decide how much information you want to share with the likes of Google, Facebook, and Twitter, and only you can determine if or when their use of your details feels like an invasion of privacy. But by using Apple products and services, you can be certain that the company that could know more about you than any other is actively trying to protect your privacy.


Social Media: Many of the big Internet companies make their money by assembling a dossier of information about you and then selling advertisers targeted access to you. Luckily, that’s not true of Apple—here are a few of the ways Apple protects your privacy.

The post Being an Apple User Means You’re Not the Product appeared first on TidBITS Content Network.

New MacBook Pros Provide More Speed and RAM, plus a Quieter Keyboard and Hey Siri

As students prepare to head off to college, Apple has updated the Touch Bar-equipped MacBook Pro line to provide even more powerful options for students and professionals alike. The changes are primarily under the hood, focusing on faster performance, more RAM, and larger SSD-based storage, but there are a few modest physical changes too, including a quieter keyboard and a True Tone display.

Despite these improvements, pricing remains the same as for last year’s models.

The 13-inch MacBook Pro that has function keys instead of a Touch Bar remains the same, as do the 12-inch MacBook and 13-inch MacBook Air.

Performance Boosts

The new MacBook Pros move to Intel’s 8th-generation Core i7 and Core i9 processors. Previously, the 13-inch MacBook Pro used dual-core CPUs, but they now get quad-core chips. And the 15-inch models jump from quad-core chips to processors sporting 6 cores. More cores are better because more tasks can be split up between them, preventing one processor-intensive task from bogging down others.

Processing power is just one aspect of overall performance. If your Mac doesn’t have enough RAM for the apps you’re using, it has to fall back on much slower virtual memory. For those who use memory-intensive apps, the new 15-inch MacBook can now take up to 32 GB of RAM, up from a maximum of 16 GB. RAM in the 15-inch models is also DDR4, which is faster and uses less power than the DDR3 RAM used before.

Finally, if you don’t have enough fast SSD storage in a MacBook Pro, you may be forced to store large items like your Photos library and Parallels Desktop virtual machines on a slow external hard disk. The new MacBook Pros can have a lot more built-in SSD storage, but it’s pricey. The 13-inch models max out at 2 TB, which will add $1400 to your bill, and the 15-inch models can go to 4 TB, assuming you have $3400 to spare. The 512 GB ($200) and 1 TB ($600) upgrades are more reasonably priced.

Physical Changes

Apple continues to tweak the controversial butterfly-switch keyboard. Some people haven’t liked the shallow key travel and how much noise it makes, and its keys have a tendency to stick. The new MacBook Pros feature a keyboard that’s quieter and hopefully more reliable.

You’ll also notice the new Retina displays with True Tone. First introduced with the iPad Pro and added to the iPhone in 2017, True Tone adjusts the white balance of the screen based on ambient light to make the screen more comfortable to view. It should be particularly appreciated by students working late into the night.

Other Improvements

You know how you can issue commands to Apple’s virtual assistant on your iPhone or iPad by saying “Hey Siri”? That’s possible in the new MacBook Pros also, thanks to the inclusion of Apple’s new T2 chip. The T2 also manages the Touch Bar, facilitates a secure boot feature, and encrypts files on the fly to increase security.

These MacBook Pros are the first to support Bluetooth 5.0, which is backward compatible with Bluetooth 4.2. As Bluetooth 5.0 peripherals become more widespread, they’ll be able to communicate with the MacBook Pro at higher data rates and longer ranges—think of Bluetooth working across your entire house, rather than being limited to a single room.

Price and Availability

The entry-level 13-inch MacBook Pro starts at $1799, and the 15-inch model at $2399. With both models, you can choose between silver and space gray, and they’re available now.

Our take is that, like most of Apple’s speed-bump upgrades, these new MacBook Pros are simply better than the previous models—who turns down better performance for the same price? The True Tone display is also welcome, as is the quieter keyboard. And it’s nice that we can finally talk to Siri without having to hold down a key or click a button.


Social Media: Apple has released updated versions of the Touch Bar-equipped 13-inch and 15-inch MacBook Pro. Read on to learn about their improved performance, quieter keyboards, support for Hey Siri, and more.

Tired of Skewed Lines in Your Photos? Use the Camera App’s Hidden Level.

If you’ve ever photographed a sheet of paper or some other rectangular object, the image may have come out skewed because you inadvertently tilted the camera. The iOS 11 Camera app has a level feature to help you avoid this problem, but it’s so subtle that you may not have noticed it. To use it, first go to Settings > Camera and turn on the Grid switch so thin white lines divide the viewfinder image into a grid of nine rectangles. Then, to access the level, hold the iPhone or iPad flat, so the camera points straight down toward the floor (or straight up toward the sky, if you’re photographing a ceiling). Notice that two crosshairs appear in the middle of the viewfinder, a yellow one that marks the position where the camera will be level and a white one that shows the camera’s current angle. Tilt the camera until the crosshairs merge into a single yellow image, and tap the Shutter button.

Did You Know You Can Customize the Columns in a Finder Window’s List View?

When a Mac folder contains a lot of files, the Finder’s List view often works best, since it lets you focus on a single folder and easily sort the contents by clicking the different columns: Name, Date Modified, Size, and Kind. But did you know that you can resize columns, rearrange them, and even add and remove columns? To resize a column, drag the vertical separator line to the right of its name. To move a column, click and hold on its name, and then drag it to the desired position. And to add or remove a column, Control- or right-click any column header and select or deselect the desired column. Choose from Date Modified, Date Created, Date Last Opened, Date Added, Size, Version, Kind, Comments, and Tags.

Remember That You Can Search for Nearly Anything in Your Photos Library

Apple’s Photos app on the Mac can identify thousands of different objects in your photos, so it’s easy to find photos based on their content. You can find objects (cars and trains), scenery (beaches and forests), and even some events (weddings and parades). This is both big fun and useful for those times when you can’t remember when you took a photo, but do remember what’s in it, like a cat, camera, or carousel. To carry out a search like this, type the search term into the Search field on the right side of the Photos toolbar. From the list that appears, choose the Category result. In macOS 10.13 High Sierra’s version of Photos, you can filter your results from the Showing menu at the upper right of the window. The feature isn’t perfect, so you may see some odd results or miss some photos, but it’s way faster than browsing manually!

Have Your Online Passwords Been Stolen? Here’s How to Find Out.

Data breaches have become commonplace, with online thieves constantly breaking into corporate and government servers and making off with millions—or even hundreds of millions!—of email addresses, often along with other personal information like names, physical address, and passwords.

It would be nice to think that all companies properly encrypt their password databases, but the sad reality is that many have poor data security practices. As a result, passwords gathered in a breach are often easily cracked, enabling the bad guys to log in to your accounts. That may not seem like a big deal—who cares if someone reads the local newspaper under your name? But since many people reuse passwords across multiple sites, once one password associated with an email address is known, attackers use automated software to test that combination against many other sites.

This is why we keep beating the drum for password managers like 1Password and LastPass. They make it easy to create and enter a different random password for every Web site, which protects you in two ways.

  • Because password managers can create passwords of any length, you don’t have to rely on short passwords that you can remember and type easily. The longer the password, the harder it is to crack. A password of 16–20 characters is generally considered safe; never use anything shorter than 13 characters.
  • Even if one of your passwords was compromised, having a different password for every site ensures that the attackers can’t break into any of your other accounts.

But password security hasn’t always been a big deal on the Internet, and many people reused passwords regularly in the past. Wouldn’t it be nice to know if any of your information was included in a data breach, so you’d know which passwords to change?

A free service called Have I Been Pwned does just this (“pwned” is hacker-speak for “owned” or “dominated by”—it rhymes with “owned”). Run by Troy Hunt, Have I Been Pwned gathers the email addresses associated with data breaches and lets you search to see if your address was stolen in any of the archived data breaches. Even better, you can subscribe to have the service notify you if your address shows up in any future breaches.

Needless to say, you’ll want to change your password on any site that has suffered a data breach, and if you reused that password on any other sites, give them new, unique passwords as well. That may seem like a daunting task, and we won’t pretend that it isn’t a fair amount of work, but both 1Password and LastPass offer features to help.

In 1Password, look in the sidebar for Watchtower, which provides several lists, including accounts where the password may have been compromised in a known breach, passwords that are known to have been compromised, passwords that you reused across sites, and weak passwords.

LastPass provide essentially the same information through its Security Challenge and rates your overall security in comparison with other LastPass users. It suggests a series of steps for improving your passwords; the only problem is that you need to restart the Security Challenge if you don’t have time to fix all the passwords at once.

Regardless of which password manager you use, take some time to check for and update compromised, vulnerable, and weak passwords. Start with more important sites, and, as time permits, move on to accounts that don’t contain confidential information.


Social Media: Have any of your online passwords been stolen in a breach? The answer is probably “yes,” and today’s article helps you discover and correct your most problematic passwords.

Tired of “Sent from my iPhone” as Your Email Signature?

When you use Apple’s Mail app on your iPhone to send email, the default signature is “Sent from my iPhone.” If you’d rather not advertise that fact with every email, or would prefer to change it to something more personal, don’t bother poking around in the Mail app itself. Instead, go to Settings > Mail > Signature, where you can change the signature to anything you like or delete it entirely. If you have multiple email accounts configured, such as one for work and one for home, you can also set a different signature for each.