Posts

Keep Sensitive Data Private by Disabling AI Training Options

Most AI chatbots, including ChatGPT, Claude, and Google’s Gemini, let you control whether your conversations will be used to train future models. While allowing this could improve the AI, it also means that sensitive business information and intellectual property could become part of the chatbot’s training data. Once data is incorporated into AI training, it likely can’t be removed. Even with training disabled, you should be cautious about sharing sensitive business details, trade secrets, or proprietary code with any AI system. To reduce risks, disable these training options:

  • ChatGPT: Go to Settings > Data Controls and turn off “Improve the model for everyone.”
  • Claude: Navigate to Settings > Privacy and disable “Help improve Claude.”
  • Gemini: Visit the Your Gemini Apps Activity page and turn off Gemini Apps Activity.
  • Meta AI: Avoid it entirely, as it doesn’t allow you to opt out of training.

(Featured image by iStock.com/wildpixel)


Social Media: Don’t let sensitive business data become part of AI training sets. Here’s how to turn off training options in popular AI chatbots to protect your company’s information.

Watch What You Say in AI-Recorded Meetings

You’re in a meeting with colleagues, and after everyone else has trickled out, you talk about a sensitive topic with a trusted friend. That would typically be no problem with an in-person meeting, but with a modern virtual meeting, where an AI records a transcript, summarizes what was said, and automatically emails it to all participants, you might not want everyone to know about your coworker conflicts, job search, health issues, relationship troubles, or countless other confidential matters.

This issue affects all major videoconferencing platforms—Zoom, Microsoft Teams, Google Meet, and others. Many organizations also use standalone AI recording tools that can join meetings as participants, such as Otter.ai, Fireflies.ai, and tl;dv.

No one should feel ashamed of using AI-generated meeting summaries, nor should these tools be categorically avoided. They’re undeniably helpful, allowing people to focus on the discussion instead of taking notes or worrying about forgetting action items. We know people who consider them life-changing.

However, the fact remains: unlike a person tasked with taking notes, these tools record everything, including pre-meeting chatter, small talk, and personal asides that a person would know not to include. Making matters worse, AI notetakers are often configured to distribute transcripts and summaries automatically to all attendees—including those who were invited but didn’t attend. While this helps people catch up on missed meetings, it can cause problems if the absent individuals were themselves the topics of discussion. And we won’t even get into the potential legal and HR implications of certain conversations being made public.

Practical Solutions

Given the utility of AI-generated meeting summaries, what can you do to reduce the chances of potentially embarrassing or problematic conversations being shared inappropriately?

  • Warn attendees: Although most videoconferencing tools alert users that recording is happening, everyone is used to these notifications. For a more explicit warning, the meeting host can remind everyone that summaries will be shared with all attendees.
  • Pause/resume recording: While not all videoconferencing and AI recording tools offer the option to pause and resume, it can be useful. The meeting host can wait to start recording until everyone has arrived and the pre-meeting chatter has died down, and then stop it once the last agenda item has been discussed. The challenge is that this requires the host to remember to start and stop at the right times, and any valuable conversation before or after these points will be lost.
  • Restrict distribution: Another option is to configure the system so meeting summaries are sent only to the host, who can then review and edit them if needed before sharing with the rest of the attendees. The drawbacks here are the extra work for the host and the delay in participants receiving the notes, which can hold them back from starting on action items.
  • Watch what you say: Just as with social media posts, it’s important to think before you say something you might regret. If you assume that everything you say could be shared with your entire organization—including HR and your boss—you’ll be much less likely to get into trouble. Of course, this requires everyone to be sufficiently self-aware to avoid problematic topics.
  • Use private channels: If you anticipate needing to discuss sensitive information with a remote colleague—the kind of thing you’d shut your office door to keep passersby from overhearing—use a private channel like a personal meeting room, direct message, or phone call. And if someone starts to say something problematic in a group meeting, gently suggest moving it to a private channel.

Although having AI-generated summaries of conversations you thought were private circulated to others may feel like a modern problem, variants have been around for a long time: the romantic message misaddressed to the company-wide email list, the list of layoffs left in the copy machine, or even a conversation that continues across stalls in the bathroom without realizing someone else has come in. Ultimately, all we can do is be mindful of what we say and who might hear it.

(Featured image by iStock.com/ArnoMassee)


Social Media: In virtual meetings, AI recording tools often capture and share everything—even those casual chats that occur after most attendees have left. Learn how to avoid having sensitive conversations broadcast to your whole team.

Audit How You Appear in Google Search

Google has created a free service that lets you see what of your personal and professional information has been published on the Web. Once you provide your name, address, phone numbers, and email addresses to Google’s Results About You website, Google will inform you if that info appears in search results. (Don’t worry, you’re not telling Google anything it doesn’t already know.) It may take a few days or weeks for the initial results to come back, and Google will keep adding more results over time. You can review each page with your information and, if it’s data you would prefer to keep private and it meets Google’s policy requirements, request its removal from the search results. This only removes your data from Google’s search results; to remove it from the Web entirely, you’ll need to contact the website hosting the information.

(Featured image by Google)


Social Media: Curious about how your personal information shows up in Google searches? Google’s Results About You service helps you monitor and manage your digital footprint.

Combat Smart TV Privacy Abuses with an Apple TV

If you own a smart TV or are shopping for a new one, you should be aware of a troubling trend: modern TVs have evolved from simple screens into sophisticated surveillance devices. You can protect your privacy by using an Apple TV as your streaming device rather than relying on built-in smart TV features.

If you have an older non-smart TV that meets your needs, you’re in luck—an Apple TV provides streaming capabilities while avoiding the privacy concerns that plague modern TVs. For everyone else, here’s what you need to know about how TV manufacturers are monetizing your viewing habits and how an Apple TV protects you.

Data Mining: How TV Makers Profit from Your Viewing Habits

Arguably, the longevity of large-screen TVs has contributed to this trend. In the past, TV manufacturers focused on selling as many TVs as possible. Consumers see less need to upgrade when a modern 55-inch TV offers little beyond what a 15-year-old TV of the same size can provide. Sure, it might be a bit brighter, have better color accuracy, or provide higher refresh rates, but for most people watching streaming video in a dark room, such changes aren’t very noticeable.

In response, TV manufacturers have lowered prices to boost sales and turned to alternative revenue streams, including collecting and selling viewer data and displaying ads. Data can be sold to companies like Nielsen, a data and marketing measurement firm, and leveraged to provide advertisers with targeted audiences. Smart TV ad revenue is estimated to reach $46 billion worldwide this year, up 20% after another 20% increase in 2024. These ads appear on the smart TV’s home screen and in free, ad-supported streaming channels.

TV manufacturers track viewing habits using a technology called automatic content recognition (ACR). Software loaded on the smart TV captures frame-by-frame screenshots of content, creates a fingerprint for each frame, and then matches the fingerprint against an online database to determine what you’re watching. It works with all types of viewing, from standard TV to gaming. Since that data is tied to your specific household, companies can create audience segments and either use it for their own advertising or sell it to third parties. One analyst suggests you’re worth about $20 per year.

Wait, it gets worse! Many smart TVs feature microphones to enable voice commands, and some also include cameras to support video calling capabilities. Manufacturers can use captured audio and video to monitor viewer engagement—are you actually watching the show, or is it just playing in the background? That data also feeds into the profile that the TV manufacturers maintain about you.

If all this feels creepy to you, you’re not alone. Most annoyingly, apart from the opportunity to buy a cheap TV, there’s essentially no ongoing benefit to you in having your viewing habits packaged and resold. At most, you might get to ignore slightly more targeted ads.

Protect Your Viewing Privacy with an Apple TV

If you currently have a smart TV or are looking to replace an older TV, there’s an easy solution: use an Apple TV instead of the smart TV’s built-in apps or a similarly problematic media streaming box from the likes of Amazon, Google, and Roku. Although Apple isn’t perfect when it comes to privacy, the Apple TV provides a complete streaming solution that doesn’t share your viewing data with advertisers and data brokers. Here’s how:

  • No ACR tracking: Apple has confirmed that the Apple TV doesn’t use ACR at all.
  • No built-in advertising: Unlike Roku OS and Samsung’s webOS, the Apple TV doesn’t display ads on the home screen or in the screensaver.
  • Privacy-first setup process: During setup, you’re given the opportunity to disable Siri, location services, and analytics.
  • Limited data collection: Even when you do allow Apple to collect data, it’s done in ways that guarantee anonymity and used only in aggregate. No personal information is ever shared with Apple.
  • Strong third-party app tracking controls: tvOS apps must ask for permission to track you, just like iOS apps. You can (and should) always reject such requests or prevent them from asking at all by going to Settings > Privacy > Tracking > Allow Apps to Request to Track.

Even with an Apple TV, you’ll need to take a few additional steps to protect your privacy since smart TVs can still track content playing through HDMI connections:

  • Disable ACR tracking: Turn off ACR in your TV’s settings to prevent it from analyzing what you’re watching. This setting can be tricky to find since TV manufacturers deliberately make it difficult and use different names. Consumer Reports provides instructions for many TV models and streaming media devices.
  • Consider blocking Internet access: For maximum privacy, you can prevent your TV from connecting to your Wi-Fi network and accessing the Internet, though this comes with trade-offs. While it ensures that no data leaves your TV, you’ll miss out on bug fixes, security updates, and certain features like picture calibration. You may also encounter connection error messages, and some TVs require occasional Internet connectivity for validation purposes. You may have to connect periodically to keep it working.

By turning off ACR, disconnecting the smart TV from the Internet, and using an Apple TV instead of a smart TV’s built-in apps or other streaming devices, you can enjoy your favorite shows without feeling like you’re being watched.

(Featured image by Apple)


Social Media: While you’re watching TV, your smart TV is watching you. Find out how manufacturers track your viewing habits and learn simple steps to protect your privacy with an Apple TV.

Don’t Assume That Top Google Search Results Are Guaranteed Safe

We hate to encourage paranoia, but all is not well with Google Search. Recently, we’ve heard of multiple instances where people were nearly taken advantage of due to relying on the top result in a Google search. In one case, a user called a purported HP support phone number directly from the search results but ended up speaking with a scammer. In another, a user thought they were downloading the latest version of Dropbox but got malware instead. In neither case could we reproduce the error, but they may have resulted from “SEO poisoning,” a malicious technique in which cybercriminals manipulate search engine optimization (SEO) strategies to elevate harmful websites in search results. In short, don’t assume that a site at the top of Google search results is guaranteed safe when downloading software or contacting a company. It’s best to navigate directly to a company’s official website before trusting that corporate information and software downloads are legitimate.

(Featured image based on an original by iStock.com/Armastas)


Social Media: You know that the phrase “I read it on the Internet, so it must be true” is absurd, but you should extend that skepticism to Google search results. We’ve seen two recent instances of malicious content bubbling to the top of searches. Trust but verify.

With iOS 18.2 and Later, You Can Share the Location of Lost Items in Find My

In iOS 18.2, Apple enhanced the Find My app, enabling you to create a temporary Web page that shares the location of a lost AirTag or other Find My-tracked item. You don’t need to know the person’s email address or share any other information, and the link automatically expires after a week. It’s a great way to enlist others in the search for a lost item, but the big win is sharing with an airline to help them track the location of misdirected luggage. It’s easy: open the Find My app, tap Items, select the desired AirTag or other item, tap Share Item Location, and then share the provided link via text message, email, or any other method. The item’s location automatically stops being shared if it’s reunited with you, or you can end sharing manually.

(Featured image by iStock.com/yacobchuk)


Social Media: The new Share Item Location feature in Find My enables you to share the location of a lost AirTag or another item tracked by Find My with anyone, including airline reps who can use it to locate lost luggage for you.

Security Precautions to Take While Traveling

When we think about digital and device security, we mostly think about the fixed locations where people spend most of their time—home, school, and work. But what about when you’re traveling? Some security concerns remain the same when you’re on the road, but new ones crop up.

We’ll assume that you already keep your devices up to date, use FileVault on Macs, have at least a six-digit iOS passcode, have strong password habits, and use multi-factor authentication wherever possible. Other options are more specific to travel.

As with our more general article about increasing security last month, we’ve divided our list of suggestions into two parts: things that everyone should do and measures that only people who worry about being specifically targeted should employ.

Sensible Travel Security Precautions for Everyone

These suggestions are appropriate for everyone who travels, and they’re aimed primarily at avoiding relatively common problems: loss, theft, data loss, and generalized snooping:

  • Focus on physical security: As a tourist, you may be targeted by thieves, so it’s important to keep your iPhone in a secure pocket whenever you’re not using it. Carry an iPad or laptop in a bag that can’t be snatched, or leave them locked or at least concealed in your hotel room.
  • Enable Find My for all your devices: You should have already done this, but if not, enable Find My to improve your chances of finding a device you lose or accidentally leave behind. It might help if the device is stolen, but local police cooperation for recovering stolen items can vary widely. Don’t attempt to recover a stolen device yourself.
  • Put AirTags in your luggage and laptop bags: AirTags can help you track down lost luggage—you can now share their locations with airlines—and prevent you from accidentally leaving bags behind. An AirTag may also help with locating a stolen item, but always work with local law enforcement.
  • Enable biometric authentication and Stolen Device Protection: Using Face ID or Touch ID wherever possible and having Stolen Device Protection enabled on your iPhone in Settings > Face/Touch ID & Passcode is even more important when traveling.
  • Use a VPN or iCloud Private Relay: Because you may be using Wi-Fi networks whose security you know nothing about, it’s best to use a VPN like Mullvad VPN, NordVPN, or ProtonVPN to encrypt all your traffic. At a minimum, use iCloud Private Relay, which requires an iCloud+ subscription and won’t encrypt traffic from most non-Apple apps.
  • Use iCloud Photos or another backup option: To ensure you don’t lose precious vacation photos, use iCloud Photos so all your photos are uploaded to the cloud whenever you have access. This will almost certainly require an iCloud+ subscription for sufficient storage space. If Wi-Fi and cellular are too slow or unavailable, consider an external SSD to which you can manually export photos and videos for backup. To speed up the process, you could create a shortcut that automatically copies all photos taken that day.
  • Use iCloud Backup: It’s best to use iCloud Backup to back up your entire iPhone every night. That way, if your iPhone is lost or destroyed, you may be able to buy a replacement and restore from backup in relatively little time. You will probably need an iCloud+ subscription to have enough backup space.
  • Practice dealing with a lost or stolen device: If the worst happens and you lose one of your devices while traveling, you need to know what to do. Immediately go to Find My on another device or iCloud.com and mark the device as lost. If there’s a chance of getting it back, stop there. However, if you believe the device was stolen, your data is at risk, and tracking it is no longer useful, use Erase This Device in Find My to wipe it. Activation Lock will remain enabled to prevent anyone from reusing the device.

Increasing Travel Security for People Who May Be Targeted

Not all travel is fondue and gamelans. If you’re a journalist, activist, government employee, or corporate executive with access to sensitive data, you could be a target while traveling. This is particularly true if you are headed to countries like China, Russia, or others with authoritarian governments and powerful intelligence agencies. Along with the suggestions above, we recommend:

  • Be aware of local laws and government practices: It’s important to read up on regional laws regarding data access and potential government capabilities at your destination. Knowing what to expect can help you reduce your risks and take appropriate precautions.
  • Use caution with cellular access: Even if your carrier allows roaming, consider using a dedicated eSIM for international travel, separate from your personal one. That way, you can use local cellular networks without revealing your home number. Be aware that your traffic may be monitored.
  • Enable Lockdown Mode: If you’re concerned about your iPhone or iPad being targeted by local law enforcement or government intelligence agencies, turn on Lockdown Mode in Settings > Privacy & Security > Lockdown Mode. To increase security, it blocks most attachment types in Messages, complex Web technologies, incoming FaceTime calls from unknown callers, non-secure Wi-Fi network connections, and incoming invitations to Apple services. Plus, it excludes location information from shared photos, requires approval to connect accessories, and more.
  • Reduce and protect your use of cloud services: While using a VPN is essential, you should still avoid using cloud services much if government entities might have access to stored files. If you need to upload files, encrypt them first using the free and open-source Cryptomator.
  • Know how to disable Face ID and Touch ID: If you find yourself in a situation where you believe you may be compelled to unlock your iPhone or iPad with your face or fingerprint, press and hold the side or top button and either volume button to display the power off slider. This temporarily disables biometric authentication, requiring your passcode for the next unlock.
  • Use dedicated travel devices and accounts: If you’re traveling to a potentially hostile part of the world, we strongly recommend carrying only devices—preferably iPhones or iPads, which are more secure than Macs—configured to contain none of your personal data or regular accounts. Keep them with you at all times, assume they could be confiscated, and be aware you might be compelled to share passcodes or other account information. Create a separate Apple Account for such devices.

Best of luck in your travels! With just a little preparation, you can reduce the chances that something bad will happen during a vacation. If you’re traveling on business to somewhere more concerning, putting in additional effort could prevent truly problematic things from happening.

(Featured image by iStock.com/metamorworks)


Social Media: Security at home is one thing, but what about when you’re on the road? Many of the same precautions apply, but depending on your level of concern and where you’re going, additional techniques can help keep you and your data safe.

Use Guided Access for Securely Allowing Others to Use an App on Your iPhone or iPad

iPhones and iPads are highly personal devices, but you might want to let someone else use a particular app on yours without letting them poke through Messages, Mail, and Photos. For example, a child could play a game, a volunteer could check in attendees, or a friend could take photos. To allow this, Apple created Guided Access, which you turn on in Settings > Accessibility—give it an easily remembered passcode and decide if you want to let the display auto-lock. Then, to turn on Guided Access, open the app you want to share and triple-click the side or top button. Options let you control buttons, the accelerometer, software keyboards, touch input, and a time limit. To end a Guided Access session, triple-click the side or top button, enter the Guided Access passcode, and tap End.

(Featured image by iStock.com/Userba011d64_201)


Social Media: If you’d like to allow a child, friend, or colleague to enjoy a specific app on your iPhone or iPad while keeping them focused and preventing access to everything else on the device, check out Apple’s Guided Access feature.

Beware Fake “Sextortion” Scams

All those data breaches are coming back to haunt us. Once our phone numbers and addresses began to be leaked, it was only a matter of time before scammers would personalize their attacks to make them seem more real. The latest “sextortion” scams purport to have compromising video of you taken from your computer’s webcam, backing it up with your phone number and a Google Street View-like image that matches your leaked address. They make a lot of claims and dire-sounding threats, but talk is cheap, and there’s nothing behind them. Do not pay the scammers!

(Featured image by iStock.com/Thapana Onphalai)


Social Media: Scams are starting to incorporate personal information stolen in data breaches, so you may get “sextortion” threats that purport to know your phone number, address, and more.

Restrict Access to Sensitive Apps in iOS 18 and iPadOS 18

Do you worry about family members with whom you’re otherwise happy to share your iPhone passcode reading your private diary in a journaling app? Or perhaps you want to keep your child out of apps where they could cause mischief. A new feature in iOS 18 and iPadOS 18 lets you use Face ID or Touch ID to restrict access to specific apps, optionally hiding them in the process. Touch and hold the app’s icon on the Home Screen, and tap Require Face/Touch ID. When prompted, either tap Require Face/Touch ID to leave the app’s icon visible on the Home Screen but restrict access or tap Hide and Require Face/Touch ID to restrict access and hide the icon. Protected apps only open after you authenticate with Face ID or Touch ID; hidden apps can be accessed only from the Hidden folder in the App Library after authenticating. (To reach the App Library, swipe left repeatedly on your Home Screen, then scroll to the bottom to find the Hidden folder.)

(Featured image by iStock.com/SasinParaksa)


Social Media: Keep prying eyes—or mischievous children—out of sensitive or important apps by requiring Face ID or Touch ID access before the app opens. You can also hide such apps so they appear only after you authenticate.