Posts

Apple Is Driving the iPhone to eSIM: Here’s What You Need to Know

Perhaps the most surprising change in the iPhone 14 line, at least in the United States, was the shift from using removable SIM cards to eSIM.

SIM cards—SIM stands for Subscriber Identity Module—have been a fixture in the mobile phone world for many years because they provide the unique identification necessary to connect a subscriber and a plan with a phone. Because SIM cards are removable, you can use them to transfer an existing plan to a new phone, switch carriers, or enable temporary service while traveling—all by inserting the appropriate SIM card.

But SIM cards are small, fussy, and require physical interaction, so the industry came up with eSIM, or embedded SIM, where a programmable SIM is integrated into the circuitry of the phone. With eSIM, you can also activate a plan, transfer a plan to a new phone, or change carriers, typically without interacting with customer service. You also don’t have to acquire a physical SIM, figure out how to open your phone’s SIM tray, or insert the tiny SIM card in the correct orientation without dropping or damaging it. Plus, without a SIM slot and tray, iPhones have one less spot where water could get in and one less moving part that could break, and Apple doesn’t have to provide a SIM tool that you’ll likely lose (and replace with a paperclip).

Apple’s eSIM Transition

eSIM support is widespread among US carriers but less so internationally, which is why models of the iPhone 14 sold outside the US retain the SIM tray. The main place where lack of eSIM support is likely to be an issue—at least for the near future—is international travel. Historically, it was easy to purchase a pre-paid SIM card for a local carrier in the airport upon arriving, but that will no longer work for a US iPhone 14. The iPhone is sufficiently popular that international carriers are adding eSIM support, but it’s still possible to travel to a country where you can’t get local service with an iPhone 14 due to the lack of a SIM tray. Apple maintains a list of international carriers that support eSIM in various ways, including with pre-paid plans for travelers, and offers advice on how to use eSIM when traveling. (eSIM isn’t available at all in mainland China, but Apple’s list includes worldwide service providers that sell pre-paid data plans you can use when traveling in China and other countries without eSIM support.)

Apple has been moving toward eSIM for several years, starting with the iPhone XS, iPhone XS Max, and iPhone XR in 2018. Those iPhones—and every model up to the iPhone 14—had both a SIM tray and eSIM, which enabled the use of two separate cellular plans, each with its own phone number. With the iPhone 13, Apple enabled Dual SIM support with eSIM alone, and some carriers started giving customers the option to activate their primary service with eSIM, leaving the SIM tray or the second eSIM available for a second plan. Apple says you can store and switch among up to eight or more eSIMs, two of which can be active at any time, but it’s unclear how that works—an update to iOS might be necessary.

Cellular-capable iPads have had eSIM support since the seventh-generation iPad, fifth-generation iPad mini, third-generation iPad Air, first-generation 11-inch iPad Pro, and third-generation 12.9-inch iPad Pro.

How to Activate an eSIM

Precisely how you activate an account with eSIM varies by carrier and your situation, but Apple describes three basic options:

  • eSIM Carrier Activation: Some carriers can assign a new eSIM to your iPhone, making it easy to switch to a new iPhone or enable an eSIM-based plan after setup. eSIM Carrier Activation involves following a few simple onscreen instructions where you basically acknowledge that activation is happening. Make sure you can place a phone call afterward, and if you’re switching from a SIM card, remove it and restart your iPhone.
  • eSIM Quick Transfer: If you’re transferring a SIM or eSIM from an old iPhone to a new one and you have both at hand, you may be able to use eSIM Quick Transfer. It will provide instructions during setup, or you can initiate it after setup with Settings > Cellular > Add Cellular Plan and either selecting a plan from a list or tapping Transfer From Another Device. You can also convert a physical SIM to an eSIM on the same phone if your carrier supports eSIM Quick Transfer; check to see if Settings > Cellular has a Convert to eSIM option. If so, tap it and follow the instructions.
  • Scan a QR code or use a carrier app: Carriers that don’t support eSIM Carrier Activation or eSIM Quick Transfer initiate setup by providing either a QR code you can scan—during setup or afterward—or a custom app. Either way, follow the iPhone’s instructions to complete the setup.

Although we’ve become accustomed to swapping SIM cards in and out of our iPhones such that eSIM feels new and confusing, it should be a better overall solution that’s easier to set up, less error-prone, and more secure. There may be some short-term annoyance for US iPhone 14 owners who travel internationally, but we anticipate that will dissipate over time as international carriers start supporting eSIM.

(Featured image by iStock.com/fz750)


Social Media: Apple has gone all-in on eSIM, eliminating the SIM tray from iPhone 14 models sold in the US. What’s eSIM? Glad you asked—read on for the details of the technology and why it’s better than SIM cards.

When Should You Upgrade to macOS 13 Ventura, iOS 16, iPadOS 16, watchOS 9, and tvOS 16?

September is here, which means that Apple will soon start releasing major upgrades for all its operating systems. Note that we say “start.” Apple will release iOS 16 and watchOS 9 alongside new iPhones and Apple Watch models in September. However, Apple has now acknowledged that iPadOS 16 will ship later in the fall—perhaps in October—as version 16.1, likely in conjunction with iOS 16.1 and possibly alongside macOS 13 Ventura. tvOS 16 isn’t interesting enough to worry about much either way.

Apple previewed these releases at its Worldwide Developers Conference in June, and many people have been testing the public betas since. Once Apple judges each of its operating systems to be ready for public consumption, the question arises—when should you upgrade?

Note that we say when and not if. There’s no harm in delaying a major operating system upgrade until Apple has sanded off rough edges that slipped through testing. But waiting too long puts you at risk from security vulnerabilities, increases compatibility annoyances, and prevents you from taking advantage of new features. Plus, when you buy a new Mac, iPhone, or iPad after these operating systems have shipped, you’ll get the latest version, which could pose problems for your existing apps or compatibility with older hardware or workflows. It’s best to be prepared if you have to replace a device unexpectedly.

Given that we don’t know precisely when each operating system will come out, here’s our recommendation for the general upgrade order that we anticipate and how long we suggest waiting after the release appears. Remember, always make a backup before upgrading a Mac, iPhone, or iPad so you can revert if necessary.

iOS 16

It’s usually safe to upgrade iOS fairly quickly because Apple puts significant effort into ensuring that the new iOS version is a good experience for those who buy the new iPhones that come with it. However, because iPhones are so crucial to our everyday lives, it’s worth delaying the upgrade to iOS 16 for a few weeks, just in case. After that, you can install it and enjoy the new features.

You’ll likely enjoy iOS 16’s customizable Lock screen, which lets you specify the font, color, and placement of various options, all of which appear with photos that can shuffle throughout the day. Widgets can now appear on the Lock screen too, providing at-a-glance weather and other info even without unlocking your iPhone. The new dictation capabilities that let you talk, select, and type without switching modes may also be game-changing for some, and dictation will even add punctuation automatically and let you enter emojis with voice commands.

However, some features may not be fully available at the start due to Apple’s tight integration of operating systems. Messages will finally let you edit messages after sending, undo sending, and mark messages as unread—but editing and unsending won’t work for messages sent to people running anything earlier than iOS 16, iPadOS 16, and Ventura. We’re unsure if Apple will enable iCloud Shared Photo Library, which lets you automatically share an entire library of photos with family members or friends, until iPadOS 16 and Ventura are out as well. Similarly, the Continuity Camera feature of iOS 16, which lets you use your iPhone as a webcam for your Mac’s videoconferencing apps, won’t be available until Ventura ships.

watchOS 9

Once you upgrade your iPhone to iOS 16, there’s no reason to delay upgrading your Apple Watch to watchOS 9. You may not even notice the difference since none of the changes are likely to force changes in your usage patterns.

New features include new views and more metrics in the Workout app, including a display of heart rate zones and pace feedback. You can customize workout and recovery intervals, race against previous routes, get running form metrics, and see your running power. Also new is a Medications app that helps you remember to take medications and log them from reminders. And, of course, there are more watch faces.

tvOS 16

We don’t know when Apple will release tvOS 16, but the changes are so minimal that it doesn’t matter much. tvOS 16 will support more Bluetooth gaming controllers, provide full support of the Matter smart home standard, and offer more integration with your other Apple devices, such as with workouts in Apple Fitness+.

Unless something in that list encourages you to upgrade as soon as it’s out, we suggest letting your Apple TV (the fourth-generation model and later) upgrade itself when it gets around to it, assuming you have automatic updates turned on in Settings > Software Updates.

iPadOS 16

iPadOS 16 may not be available until October, but once it ships, our general advice is that it’s fine to update. For the most part, iPadOS is a superset of iOS, so if anything, Apple should have had some time to fix any early bugs that cropped up in iOS 16 before releasing iPadOS 16.

The big new feature in iPadOS 16—if you have an M1-equipped iPad like the latest iPad Air or iPad Pro—is Stage Manager, which brings a structured windowing system to the iPad and Mac. Stage Manager lets you stack up to four apps in an overlapping view, providing additional sets of apps off to the side in a sort of secondary Dock. If you connect your iPad to an external display (along with a keyboard and pointing device), it offers another separate workspace, so you can work more fluidly in multiple apps at once.

If you want to see more on screen, a new display scaling mode shrinks interface elements and content. It may make Stage Manager and Split View more helpful. You’ll also likely enjoy a better search in Mail, plus options to undo sending, schedule sending, follow up on sent messages, and add rich links. (These Mail features are shared with iOS 16 and Ventura.) Last but not least, the iPad finally gets its own Weather app.

macOS 13 Ventura

The hardest upgrade decision revolves around upgrading your Mac to macOS 13 Ventura, and that assumes you can upgrade at all, given that Apple has dropped support for all Macs released before 2017. The main new feature that you might find compelling is Stage Manager, although most longtime Mac users probably already feel comfortable with their window management skills. If you spend a lot of time in video calls, the new Continuity Camera feature that lets you use your iPhone (running iOS 16, natch) as a high-quality webcam with support for Center Stage—which enables the camera to follow you as you move around—may also be attractive. And, of course, you’ll get the new Messages, Mail, and iCloud Shared Photo Library features that Apple added to iOS 16 and iPadOS 16.

We always encourage caution when upgrading to a new version of macOS. Wait at least a few months before upgrading your primary Mac to Ventura. App compatibility isn’t usually a long-term problem with iOS and iPadOS, but many people rely on older Mac apps that may not work in the latest version of macOS. Even once you’re confident that your apps will work properly in Ventura, there may be workflow or intra-office compatibility concerns if some people upgrade and others don’t. And, of course, unanticipated bugs could crop up at inconvenient times—important work takes place on Macs! Please, do not upgrade to Ventura without checking with us first. With luck, the start of the new year will have brought both the bug fixes and app updates necessary to give the green light.

(Featured image by Apple)


Social Media: Apple is gearing up to release macOS 13 Ventura, iOS 16, iPadOS 16, watchOS 9, and tvOS 16. We take a brief look at the features worth upgrading for and suggest when to upgrade each of your Apple devices.

The Best Characters to Use When Naming Files and Folders

Back in the early 1980s, DOS filenames couldn’t be more than 8 characters long with a period and a 3-character extension. That was limiting, so when Apple developed the Mac operating system in 1984, it allowed longer names and eliminated the need for an extension, although Mac OS X’s Unix roots meant a return of the filename extension in 2001. Since then, filename restrictions have loosened to the point where it’s easy to think that they no longer exist.

If only that were true! In some ways, the situation has become even cloudier, thanks to additional limitations from file-sharing services like Dropbox, OneDrive, and Box. (Google Drive’s native Web interface reportedly has no naming limitations, but files whose names contain Windows or macOS forbidden characters may not sync via Google Drive’s desktop software.) Plus, people tend to move files between operating systems more than ever before—if you’re sending a file from your Mac to a Windows user through Dropbox, you need to make sure that all three can deal with the filename.

At least length isn’t something that you generally have to think about these days, since both macOS and Windows—and the cloud services—accept filenames up to 255 characters in length. Technically speaking, Windows limits directory paths (the enclosing folder names along with the filename) to 255 characters, but even still, that shouldn’t be difficult to avoid.

What could go wrong if you run afoul of a naming restriction? macOS and Windows may simply not let you type the character—for example, you can’t put a colon in a Mac filename. Putting a period at the start of a Mac or Unix filename will hide the file. Cloud sharing services might rename the file, or you might encounter syncing issues where files don’t appear where they should. Certain characters can also cause trouble when files are used at the command line.

Here are the characters to avoid and the operating systems and services that prohibit them:

  • : (colon): macOS, Windows, Dropbox, OneDrive, Box
  • . (period): macOS (at the start of a name), Dropbox
  • / (forward slash): macOS, Windows, Dropbox, OneDrive, Box
  • (backslash): Windows, Dropbox, OneDrive, Box
  • < (less than): Windows, Dropbox, OneDrive, Box
  • > (greater than): Windows, Dropbox, OneDrive, Box
  • ” (double quote): Windows, Dropbox, OneDrive, Box
  • | (vertical bar or pipe): Windows, Dropbox, OneDrive, Box
  • ? (question mark): Windows, Dropbox, OneDrive, Box
  • * (asterisk): Windows, Dropbox, OneDrive, Box
  • ^ (caret): Windows (using FAT-formatted drives)

In addition, avoid using special characters like the © (copyright) symbol or emoji 🤷🏽‍♂️  in filenames. They might work locally, but all bets are off if you share the files in any way.

A few other recommendations:

  • Avoid unusual punctuation; in particular, note that OneDrive renames filenames containing:
    • , (comma) to ^J
    • # (number sign) to ^N
    • & (ampersand) to ^O
    • ~ (tilde) to ^F
  • Never start or end file or folder names with a space, and avoid spaces in filenames that will be uploaded to a Web or SFTP server.
  • Avoid putting more than one period in a filename, and don’t put a period after a filename extension.
  • Never assume that names are case sensitive—always make sure that similarly named items differ by more than just case.

If all that seems like a lot to keep in mind, here’s the simple rule that will ensure your filenames will work everywhere:

Name files only with uppercase (A-Z) and lowercase (a-z) letters, digits (0-9), and the hyphen (-) and underscore (_), plus a single period (.) and extension.

(Featured image by iStock.com/cosmin4000 and smartstock)


Social Media: You might think that you can name a file or folder any way you want, but macOS and Windows have restrictions on which characters you can use, and the prevalence of cloud sharing services makes it all the more important to avoid prohibited characters.

Understanding What “Vintage” and “Obsolete” Mean for Apple Products

Macs—and Apple products in general—tend to last a long time. It’s not unusual to see someone happily using an 8-year-old MacBook Pro. As much as it’s environmentally responsible to use electronics as long as possible, doing so may reduce your productivity or leave your business in a precarious situation if a hardware failure forces an upgrade at an inconvenient time.

Another factor to consider is whether or not you can get service and parts for your older device. It’s easy to assume that Apple will fix whatever you bring in, but unfortunately, that’s not the case. Apple has policies surrounding how long it guarantees to provide service and parts, which is reasonable. No one would expect Apple to repair a 128K Mac from 1984—many repair techs hadn’t even been born then.

All Apple products fall into one of three categories: current, vintage, and obsolete. Current products, which Apple defines as those that were sold within the last 5 years, are eligible for service and parts from Apple, Apple Authorized Service Providers, and Independent Repair Providers. In other words, if you bought your Mac new within the last 5 years, you won’t have any problem getting Apple to fix it.

(Independent Repair Providers are firms that have signed up for Apple’s Independent Repair Provider Program to provide out-of-warranty iPhone and Mac repairs using Apple-provided parts, tools, service guides, and diagnostics. Other repair shops can repair Apple products but may lack Apple certifications and have to source parts from other suppliers.)

Things get trickier with the other two categories:

  • Vintage: Apple considers a product to be vintage when the company stopped selling it more than 5 and less than 7 years ago. During this 2-year window, Apple says that service and parts may be obtained, subject to parts availability.
  • Obsolete: As you’d expect, a product is considered obsolete when Apple hasn’t sold it for more than 7 years. Apple will not service obsolete products, and service providers cannot order parts for them.

There is one exception to these policies. Mac laptops may be eligible for an extended battery-only repair period for up to 10 years from when the product was last distributed for sale, subject to parts availability. That makes sense since a new battery may be all an old MacBook needs to keep working.

Apple maintains a page listing all vintage and obsolete products. To determine which Mac model you have, choose About This Mac from the Apple menu. For iPhones, iPads, and iPods, Apple provides pages explaining how to identify your model.

Apple’s policies surrounding vintage and obsolete products shouldn’t make a huge difference to most users. That’s because once a Mac hits 5 years old, it’s likely that upgrading to a new model will provide significant benefits. Many businesses prefer a 3-year replacement cycle because they’ve determined that’s the sweet spot where increasing support costs and lower performance make it worth selling the old Mac and buying a new one that’s faster and more reliable.

Of course, there’s nothing wrong with keeping a Mac longer if it meets your needs and you don’t mind spending more on support. At some point, though, products in the vintage and obsolete categories are living on borrowed time.

(Featured image by iStock.com/Soulmemoria)


Social Media: It might be easier to repair vintage jeans than a vintage Mac. Read on if you want to understand Apple’s definitions of vintage and obsolete hardware and what they mean for support and repair.

Apple Works to Improve Safety in the Wake of AirTag Stalking Reports

Over the past few months, there has been a spate of media reports about how people may have been tracked without their knowledge using AirTags, Apple’s elegant location trackers. Like many mainstream media forays into the tech world, the reports are often short on detail and sometimes unclear on the reality of how the AirTags work. Nor is it clear that there have been many successful cases of AirTag abuse, but the mere fact that people are trying to use AirTags to stalk others is concerning.

Apple put significant effort into preventing such abuses, revolving around three features:

  • Safety alerts: If you have an iPhone or iPad running iOS 14.5 or later and an unknown AirTag is traveling with you, your device will alert you to that fact. Although safety alerts aren’t available for those using Android smartphones, Android users can download Apple’s Tracker Detect app to scan manually.
  • Safety sounds: After an AirTag has been separated from its owner for several days, it will make a sound the next time it moves.
  • NFC identification: If you find an AirTag, you can hold it up to an iPhone or other NFC-capable smartphone to load a website that reveals the AirTag’s serial number and the last four digits of the owner’s phone number. The police can use this information to learn the owner’s identity from Apple.

Sadly, those precautions haven’t been sufficient either to dissuade all would-be stalkers or to educate potential stalking victims (and let’s be real—dissuading stalkers is also a matter of educating people that it’s unethical, likely dangerous, and often illegal to abuse an AirTag in this way). Apple has responded in two ways, one general, the other specific to AirTags.

Personal Safety User Guide

Apple documents its products and services quite well, but the company tends to generate many focused pages without much high-level organization. It’s all too easy to flail around within Apple’s support documentation looking for help if you don’t know what search terms are likely to work. In an effort to mitigate that problem for issues surrounding personal safety, Apple has created the Personal Safety User Guide website, also available as a downloadable 56-page PDF.

The Personal Safety User Guide brings together numerous Apple support articles in two main sections:

  • Review and take action: The first section helps you review how your devices and apps are set up, with a focus on settings that could expose you to harm. It helps you manage sharing settings, look at location sharing, control your Home accessories, and more. You’ll also learn how to block unknown sign-in attempts, document suspicious activity, delete suspicious content, and avoid fraudulent requests to share information, among much else. The main criticism here is that the section on AirTag safety doesn’t explain or link to all the features Apple provides.
  • Safety and privacy tools: The second section is a bit more generic, providing support documentation that encourages you to take advantage of the features Apple has provided to protect your safety and privacy. Among other topics, it discusses passcodes, setting up Face ID and Touch ID, using two-factor authentication, seeing which apps are accessing your data, blocking unwanted calls and messages, and using Emergency SOS.

The Personal Safety Guide ends with three checklists, each of which walks you through a series of steps. These are extremely useful because almost no one would necessarily know or remember all the places to check. The checklists help you:

  • See who has access to your device or accounts
  • Stop sharing with someone
  • Control how someone else can see your location

The Personal Safety User Guide website is best when you want an answer to a specific question, but it doesn’t lend itself to reading front to back. For that, we recommend downloading the PDF, which you can read at whatever depth you desire. But do at least scan the entire thing to get a sense of what it contains should you need that information later.

Apple AirTag Announcement

Shortly after releasing the Personal Safety Guide, Apple also posted a short but detailed statement on its website. In it, the company makes it clear that it is actively working with law enforcement on all cases involving AirTag abuse. Apple also says that it has updated its unwanted tracking documentation to explain AirTag safety features more clearly to users and to include resources for those who feel their safety is at risk.

Apple also outlined important advancements that will be coming to the AirTag and Find My network systems via software updates later this year:

  • New privacy warnings during AirTag setup: To ensure that everyone understands the utility of AirTags and the implications of abuse, people setting up an AirTag for the first time will see a message that clearly states that AirTags are meant to track their own belongings, that tracking people without their consent is a crime in many places, that AirTags are designed to alert victims to their presence, and that law enforcement can request identifying information about the owner of an AirTag.
  • Better alerts for AirPods: Instead of an “Unknown Accessory Detected” alert when your iPhone detects Find My network-compatible AirPods traveling with you, the alert will specify that AirPods are involved, not an AirTag. (There are third-party Find My network accessories that will still generate this alert, such as the Chipolo ONE Spot.)
  • Refined unwanted tracking logic: Apple will be updating its unwanted tracking alert system to notify users sooner that an unknown AirTag or Find My network accessory is traveling with them.
  • Precision Finding for unknown AirTags: Those with an iPhone 11, iPhone 12, or iPhone 13 will be able to take advantage of Find My’s Precision Finding feature to home in on the location of an unknown AirTag. Previously, this capability was limited to your own AirTags.
  • Display alerts with unknown AirTag sound: When an unknown AirTag emits a sound to alert anyone nearby to its presence, and it’s detected moving with your iPhone or iPad, an alert will also appear to help you play the sound again or use Precision Finding, if available. This should help when an unknown AirTag is in a place that blocks sound or if its speaker has been disabled.
  • More obvious AirTag alert sound: Apple will be adjusting the tone sequences to make an unknown AirTag’s alert sound easier to hear and find.

Overall, these changes are welcome, and it’s a testament to the care Apple took when designing the AirTag and Find My network systems that it can make such enhancements through software updates—no hardware changes are necessary. It’s also good to see Apple taking the problem—however small it might actually be—seriously and working to reduce it even further.

(Featured image by Apple)


Social Media: Media reports suggest that miscreants are trying to use Apple’s AirTag location trackers to stalk people. Apple has responded with personal safety advice and promised AirTag safety enhancements.

Avoid Unusual Top-Level Domains in Custom Domain Names

Remember the heady dotcom days, when businesses were desperate to get a short, memorable, easily typed .com domain? It quickly became difficult to get what you wanted—so much so that deep-pocketed companies paid exorbitant sums for just the right domain.

Before we go any further, let’s make sure we’re all on the same page. Domain names are necessary because computers on the Internet are all identified by inscrutable numeric IP addresses. You can remember and type apple.com easily; 184.31.17.21 not so much. Domain names have two or more parts: the top-level domain (read from the end, such as com) and the second-level domain (like apple), plus optional third-level domains (which could give you support.apple.com).

Since the days of speculating in .com domains, however, hundreds of additional top-level domains have been opened up, including domains from .aaa to .zone. There are now top-level domains for .doctor, .florist, .lawyer, and many more, including the general .xyz. It might be tempting to switch from the awkward dewey-cheatham-howe.com to the shorter and more memorable dch.lawyer. And even if there isn’t a profession-specific top-level domain that works for you, you may think that if abc.xyz is good enough for Google’s parent company Alphabet, surely it’s good enough for you.

Alas, much as we appreciate the creativity and flexibility offered by these alternative top-level domains, we’d like to dissuade you from using one, if possible. Problems include:

  • Email deliverability: If you’re sending email using an alternative top-level domain or including links to that domain, it’s much more likely that your email will be considered spam by receiving systems.
  • SMS deliverability: Some SMS text message providers will automatically delete messages containing URLs with alternative top-level domains in an effort to protect their customers from phishing attacks.
  • Social media spam filtering: As with SMS text messages, social media posts that include URLs with alternative top-level domains may be categorized as spam or as linking to a malicious site.
  • Firewall blocking: Abuse of alternative top-level domains has become so commonplace by scammers that some companies prevent their employees from accessing websites using certain alternative top-level domains at the firewall level.
  • User perception: Although there’s no telling how anyone will react to a particular top-level domain, people won’t think twice about .com but might think .ooo seems sketchy. (We would.)

Obviously, it may not be possible to get the domain name you want in .com. What to do? There are a few strategies:

  • Expand or abbreviate: At this time, people mostly don’t see, remember, or type domains apart from those that go with businesses that do a lot of real-world advertising. So if you need to add or subtract words (or letters) in your domain to find a unique one, that can work.
  • Use a country domain: Two-letter top-level domains are restricted for use by countries, so .us is for the United States, .ca for Canada, and .au for Australia. Every country has different rules for who can register them. For instance, it’s possible to get a domain ending in .it (Italy) as long as you work through a registrar that acts as your representative there. .io (British Indian Ocean Territory) and .ai (Anguilla) are popular top-level domains among tech companies.
  • Stick with better, pricier alternatives: Not all alternative top-level domains are equally problematic. The classic .net and .org are fine, and .biz isn’t bad. But how to determine that? When you’re checking to see if a domain name is available, compare prices. For instance, at one domain name registrar, iphonewhisperer.xyz costs only $1 per year, whereas the iphonewhisperer.biz version is $4.98 per year, iphonewhisperer.net is $9.18 per year, and iphonewhisperer.studio is $11.98 per year. The more you pay, the less likely that domain has been abused by spammers and marked for filtering.

In the end, when it comes to domain names, it’s best to be conservative and stick with a top-level domain that won’t cause people or filters to think twice. That’s probably .com, if you can make the rest of the name work for you.

(Featured image by iStock.com/BeeBright)


Social Media: Tempted to get a short, memorable domain name ending in .xyz or .shop? As we explain, that’s a bad idea if you care about user perception, email and text message deliverability, and not being blocked by social media and firewalls. Details at:

New Features to Try (Or Not) in Safari 15

Along with a new version of Safari in iOS 15 and iPadOS 15, Apple has released Safari 15 for macOS 11 Big Sur and macOS 10.15 Catalina. Why do this before macOS 12 Monterey ships? Some of the browser’s new capabilities—notably the Tab Groups feature—integrate it more deeply into your Apple device experience by syncing across devices. So, assuming you have Safari 15 on at least some of your devices, what’s new, and is it any good?

New Tab Bar Interface

For Safari 15, Apple tried to minimize the tab bar interface to occupy less screen real estate and stand out less from the content of Web pages by co-opting the color of each page. Early betas were met with a litany of complaints from testers, and Apple pulled back in the eventual releases, offering settings that let you retain the old interface. How that plays out varies between the iPhone, iPad, and Mac:

  • iPhone: Apple combined the address bar and tab bar into a single set of controls at the bottom of the screen, where they’re easier to reach with your thumb while working one-handed and where you can swipe left and right to switch tabs. Plus, the status bar area at the top of the screen takes on the color from the current site, which isn’t necessarily a visual win. This is a huge change from the controls appearing at the top, so if you don’t like it, go to Settings > Safari and switch from Tab Bar (below left) to Single Tab (below right). Turn off Allow Website Tinting (also below right) if you don’t like the colorizing.
  • iPad: Displays on the iPad are relatively small, so saving some vertical space with the new Compact Tab Bar could be helpful. However, since the tab bar automatically minimizes when you scroll down a page, reducing its size when it’s visible isn’t as much of a win as it might seem. And the colorized tab bar can be shockingly bright. In Settings > Safari, you can choose between Compact Tab Bar (below top) and Separate Tab Bar (below bottom); either way, consider disabling Show Color in Tab Bar.
  • Mac: Laptop screens aren’t huge, and Safari doesn’t minimize its tab bar when you scroll, as it does on the iPhone and iPad, so saving some vertical space might be welcome on a smaller screen. But the way the Compact layout embeds the address field inside a tab and reduces the number of buttons you can see may perturb you (below top). Once again, the colorized tab bar can be glaring. To revert to something closer to the old look, in Safari > Preferences > Tabs, select Separate for the tab layout (below bottom), and disable Show Color in Tab Bar to keep the controls gray regardless of the site color.

Voice Search

For many searches, it’s easier to speak than type, and Apple has made doing that even faster with Voice Search on the iPhone and iPad. Tap the current tab to display the address field, tap the microphone button, and speak instead of typing. As soon as you stop, Safari performs the search. You can even navigate directly to a site by speaking its URL, like “apple dot com.” Sadly, Apple didn’t extend this feature to the Mac version of Safari 15.

Tab Switcher

In iOS 14 and earlier, Safari used a card stack metaphor for its tab switcher (below left), which could make it hard to see what each tab contained. In Safari in iOS 15, Apple took a cue from the iPad and Mac versions of the app and moved to a grid interface for the tab switcher (below right). You can drag the tab thumbnails around to organize them and remove them by tapping an X button (weirdly located in the upper-right corner) or swiping them left off-screen. You can also bring up the option to close all open tabs by pressing and holding Done at the lower right corner of the screen.

Tab Groups

If you struggle under the cognitive load of dozens of unrelated tabs, the new Tab Groups feature might help. With it, you can collect tabs into as many groups as you like and switch among them. You work with tab groups in either the tab switcher interface (iPhone and iPad with the Separate Tab Bar) or the sidebar (Mac and iPad with the Compact Tab Bar).

To open the tab switcher on the iPhone, tap the tab button in the lower-right corner of the screen; on the iPad, tap the different-looking tab button in the upper-right corner. Once you have the tab switcher open, tap X Tabs to reveal the Tab Groups menu. To show the sidebar on either the iPad or the Mac, tap or click the sidebar button in the upper-left corner of the tab bar.

Once you have the Tab Groups menu or sidebar showing:

  • To create a new tab group on the iPhone’s or iPad’s Tab Groups menu, tap New Empty Tab Group, name it, and tap Save. In the sidebar on a Mac or iPad, use the New Tab Group button at the top (or choose File > New Empty Tab Group on the Mac). You can also use New Tab Group from X Tabs to create a tab group from currently open tabs.
  • To switch to a different tab group, tap it in the Tab Groups menu on an iPhone or iPad, or access it from the sidebar on a Mac or iPad.
  • To delete a tab group, swipe left on it in the Tab Groups menu or sidebar to reveal a delete icon on an iPhone or iPad; on the Mac, Control-click it and choose Delete.

Shared with You

Ever gone spelunking through Messages to find a link someone sent you? Safari 15’s new Shared with You feature should help. It automatically collects all Web pages you receive in Messages into a new Shared with You section of the Safari start page. On the iPad and Mac, there’s also a Shared with You item in the sidebar.

Customizable Start Page

Speaking of the start page, if you want to customize which headings appear and in what order, you can now do that on the iPhone and iPad. (Choosing which headings appear has long been possible on the Mac by clicking the little settings button in the lower-right corner, but reordering isn’t possible there.)

Create a new tab to view the start page, scroll to the bottom, and tap Edit. Then disable any headings you don’t want to see and drag the remaining ones into your desired order. You can also choose among several Apple-provided background images and have your start page settings sync to your other devices.

Other Stuff

Two final new features may be welcome but probably won’t rock your world:

  • Pull to refresh: If you need to reload a Web page on the iPhone or iPad, either you can tap the reload button in the address field if it’s visible with your tab bar settings, or you can now just pull down with your finger from the top of a page.
  • HTTPS upgrade: If you visit a website that supports encrypted HTTPS but is also loading insecure content over unencrypted HTTP, Safari will now ensure that you connect to it over HTTPS so your entire connection is secure.

There you have it! Check out the new features in Safari 15 and let them improve your browsing experience.

(Featured image based on an original by iStock.com/Evgenii Mitroshin)


Social Media: Safari 15 brings some welcome new features, along with tab bar interface changes that have received mixed reviews. Read on to learn about the features and how you can customize the tab bar more to your liking.

Frequently Asked Questions Surrounding Apple’s Expanded Protections for Children

Apple’s recent announcement that it would soon be releasing two new technologies aimed at protecting children has generated a firestorm of media coverage and questions from customers. Unfortunately, much of the media coverage has been based on misconceptions about how the technology works, abetted by uncharacteristically bungled communications from Apple. It’s not inconceivable that Apple will modify or even drop these technologies in the official release of iOS 15, iPadOS 15, and macOS 12 Monterey, but in the meantime, we can provide answers to the common questions we’ve been hearing.

What exactly did Apple announce?

Two unrelated technologies:

  • Messages will gain features that warn children and their parents when sexually explicit photos are received or sent. Such content will be blurred, the child will be warned and given the option to avoid viewing the image, and parents may be alerted (depending on the age of the child and settings).
  • Photos uploaded by US users to iCloud Photos will be matched—using a complex, privacy-protecting method that Apple has developed—against known illegal photos considered Child Sexual Abuse Material, or CSAM. If a sufficient number of images match, they’re verified by a human reviewer at Apple to be CSAM and then reported to the National Center for Missing and Exploited Children (NCMEC), which works with law enforcement in the US.

Does this mean Apple is scanning all my iPhone photos?

Yes and no. Messages will use machine learning to identify sexually explicit content in received and sent images. That scanning takes place entirely on the iPhone—Apple knows nothing about it, and no data is ever transmitted to or from Apple as a result. It’s much like the kind of scanning that Photos does to identify images that contain cats so you can find them with a search. So scanning is taking place with this Messages feature, but Apple isn’t doing it.

The CSAM detection feature operates only on images uploaded to iCloud Photos. (People who don’t use iCloud Photos aren’t affected by the system at all.) On the device, an algorithm called NeuralHash creates a hash and matches it against an on-device database of hashes for known illegal CSAM. (A hash is a one-way numeric representation that identifies an image—it’s much like how a person’s fingerprint identifies them but can’t be used to re-create that person.) NeuralHash knows nothing about the content of any image—it’s just trying to match one hash against another. In this case, it’s matching against existing image hashes, not scanning for a type of content, and Apple is notified only after enough image hashes match.

It’s also important to note that this is different from how companies like Facebook, Google, and Microsoft scan your photos now. They use machine learning to scan all uploaded photos for CSAM, and if they detect it, they’re legally required to report it to the NCMEC’s CyberTipline, which received 21.7 million CSAM reports from tech companies in 2020, over 20 million from Facebook alone. Because Apple does not scan iCloud Photos in the US like other companies scan their photo services, it made only 265 reports in 2020.

What happens if the CSAM detection feature makes a mistake?

This is called a false positive, and while vanishingly improbable, it’s not mathematically impossible. Apple tested 100,000,000 images against NeuralHash and its CSAM hash database and found 3 false positives. In another test using 500,000 adult pornography images, NeuralHash found no false positives.

Even if NeuralHash does match an image hash with one in the known CSAM hash database, nothing happens. And nothing continues to happen until NeuralHash has matched 30 images. Apple says that the chances of there being 30 false positives for the same account are 1 in 1 trillion.

I have terrible luck. What if that happens with my account?

Once at least 30 images have matched, the system enables Apple to decrypt the low-resolution previews of those images so a human can review them to see if they are CSAM. Assuming they are all false positives—remember that possession of CSAM is illegal in the US—the reviewer sends them to Apple engineers to improve the NeuralHash algorithm.

Could non-CSAM images end up in Apple’s CSAM hash database?

It’s extremely unlikely. Apple is constructing its database with NCMEC and other child-safety organizations in other countries. Apple’s database contains image hashes (not the actual images; it’s illegal for Apple to possess them) for known illegal CSAM images that exist both in the NCMEC database and at least one other similar database. So multiple international organizations would have to be subverted for such image hashes to end up in Apple’s database. Each source database will have its own hash, and Apple said it would provide ways for users and independent auditors to verify that Apple’s database wasn’t tampered with after creation.

Plus, even if a non-CSAM image hash were somehow added to Apple’s database and matched by NeuralHash, nothing would happen until there were 30 such images from the same account. And if those images weren’t CSAM, Apple’s human reviewers would do nothing other than pass the images to engineering for evaluation, which would likely enable Apple to determine how the database was tampered with.

Couldn’t a government require Apple to modify the system to spy on users?

This is where much of the criticism of Apple’s CSAM detection system originates, even though Apple says the system will be active only in the US. On the one hand, Apple has said it would resist any such requests from governments, as it did when the FBI asked Apple to create a version of iOS that would enable it to break into the San Bernardino shooter’s iPhone. On the other hand, Apple has to obey local laws wherever it does business. In China, that already means that iCloud is run by a Chinese company that presumably has the right to scan iCloud Photos uploaded by Chinese users.

It’s conceivable that some country could legally require Apple to add non-CSAM images to a database, instruct its human reviewers to look for images the country finds objectionable, and report them to law enforcement in that country. But if a country could successfully require that of Apple, it could presumably force Apple to do much more, which hasn’t happened so far. Plus, the CSAM detection system identifies only known images—it’s not useful for identifying unknown images.

Is Apple heading down a slippery slope?

There’s no way to know. Apple believes this CSAM detection system protects the privacy of its users more than scanning iCloud Photos in the cloud would, as other companies do. But it’s highly unusual for a technology that runs on consumer-level devices to have the capacity to detect criminal activity.

(Featured image by iStock.com/metamorworks)


Social Media: Apple’s recently announced expanded protections for child safety have generated a firestorm of criticism and confusion. We attempt to answer some of the most common questions we’ve received.

Reopening Your Office? Now’s a Great Time to Evaluate Your IT Infrastructure

As vaccination rates climb, many businesses are starting to think about reopening their offices and bringing back employees who have been working from home for the last year. That’s a big decision that will undoubtedly vary from company to company, but we’d like to suggest a few things to consider. Please contact us early in such deliberations so we can provide guidance before problems crop up.

Full Return or Hybrid Model?

Perhaps the biggest question firms will have to answer is if they’ll require all employees to return or if some can continue to work remotely. Many organizations have discovered that physical presence isn’t as important as they thought it was. In a post-pandemic world, many employees may prefer to continue working from home if they can, at least for a while.

If you decide on a hybrid model, you’ll want to put some thought into what technology you’ll need to enable hybrid meetings, with some people connecting remotely via videoconferencing software and others gathering in person. Large screens, specially mounted cameras, and dedicated speakerphone hardware may be necessary to conduct a hybrid meeting effectively.

With some workers remaining at home, it will also be important to ensure that everyone has appropriate access to on-premises servers. Obviously, that has been a problem for the last year as well, but it may be tempting to revert to old approaches upon reopening an office. That may not be effective in a new hybrid workplace, so check with us on cloud-based alternatives that could work better in the new world order.

Consider Your Physical Space

Particularly if you do decide on a hybrid model, it’s worth evaluating whether you need the same amount and type of space as you did before. There’s no single answer here. You don’t want to downsize your physical space only to discover in a few months that some of those employees who swore that they never wanted to come back feel that they’re missing out. Simultaneously, if your offices are a warren of small, poorly ventilated rooms, employees may be even more hesitant about returning.

Plus, your physical space is inherently related to your IT infrastructure, so don’t ignore the costs surrounding an office move. A new space might require pulling new Ethernet cables, testing Wi-Fi signal strength to ensure sufficient coverage, evaluating the cleanliness of the electrical power, and more.

We don’t mean to dissuade you from moving offices if that’s what makes the most sense for the future of your company, but talk to us before signing any new leases so we can help identify and head off any technical problems with the physical plant.

Finally, this isn’t related to IT, but if your existing office space has been entirely vacant for the last year, it’s worth reading the information that the Centers for Disease Control puts out to help employers create safe and healthy workplaces. Buildings don’t do well with prolonged shutdowns.

Does Network Infrastructure Need Updating?

Before you bring employees back, at least en masse, it’s also worth touching base with us about your IT infrastructure. If you’ve been limping along with sketchy Ethernet cabling, or if you have dirty power that could be damaging your Macs and peripherals, it’s a great time to consider addressing such problems. Pre-pandemic, attempting to install new electrical circuits or pull new network cabling might have been too disruptive, but with an office that’s empty or nearly so, such work can be done more quickly and cheaply.

Similarly, this could be a good time to replace aging computers, printers, or even phone systems. Such infrastructure upgrades and transitions can cause interruptions in normal times, but if you’re bringing people back, wouldn’t it be nice to have the office provide a better IT experience than it did before?

(Featured image by Shuki Harel from Pexels)


Social Media: If you’re having discussions about when and how to reopen your organization’s office, it’s worth thinking—and talking to us—about the role your IT infrastructure plays in such discussions. Learn more at:

What Is This “App Tracking Transparency” Apple Added to iOS 14.5?

You’ve likely seen mention of the dispute between Apple and Facebook. It revolves around App Tracking Transparency (ATT), a technology Apple released in iOS 14.5.

The goal of ATT is to give iPhone and iPad users more control over the extent to which app makers can track their data and activities across apps and websites owned by other companies. Before App Tracking Transparency, nothing prevented companies from sucking a vast amount of data about your everyday activities and connecting it to other data to build an insanely detailed picture of who you are and what you do. Apple has written A Day in the Life of Your Data white paper and released the Tracked TV ad to give you a sense of how apps track you. We like to think of app tracking as a fleet of tiny drones constantly hovering over your head, recording your every waking moment for their corporate masters.

Facebook is particularly perturbed by the introduction of App Tracking Transparency because the company makes billions of dollars every year by gleaning as much as it can about you and then selling advertising access to you to companies that want to target people like you. For instance, Facebook knows if you’re a New York City lawyer and divorced mother of two who loves dogs, donates to the Sierra Club, and has Crohn’s disease. Although App Tracking Transparency won’t prevent Facebook from tracking your behavior across its own apps, at least it won’t be able to track you across other companies’ apps and websites.

Once you upgrade to the latest version of iOS and iPadOS, App Tracking Transparency requires that apps ask for permission to track you. However, depending on your current privacy settings, you may never see those requests. In Settings > Privacy > Tracking, if Allow Apps to Request to Track is turned off, you won’t receive any permission requests, and apps won’t be able to track you. Turn that setting on, and you’ll start getting alerts that ask for permission.

Put bluntly, there is absolutely no reason to allow any app to track you. Apple explicitly says that apps may not withhold features from those who opt out of tracking. So if you turn on the Allow Apps to Request to Track setting, tap Ask App Not to Track whenever you’re prompted. If you accidentally tap Allow, you can always go back to Settings > Privacy > Tracking and turn off the switch to rescind permission.

You might want to enable Allow Apps to Request to Track to see which apps were likely violating your privacy before and are still willing to do so even after App Tracking Transparency has exposed their sleazy business practices. Frankly, we’d encourage you to think about whether you want to use apps from such companies—perhaps the best reason to allow the requests is to identify privacy-abusing apps that you’ll then delete.

Early statistics from analytics company Flurry suggest that 94%–96% of users in the United States have opted out of app tracking, either by tapping Ask App Not to Track or by disabling the Allow Apps to Request to Track. We’re surprised the number is so low.

(Featured image by Glen Carrie on Unsplash)


Social Media: New in iOS 14.5 is a privacy-protecting feature called App Tracking Transparency, which forces apps to ask you for permission to track your activities across other apps and websites. Learn more about why you should never allow tracking here: