Manage iCloud Security and Privacy

Throughout this book I’ve mentioned security and privacy issues connected to iCloud. But because of recent high-profile incidents involving data theft from iCloud users, I want to end the book with some advice about protecting your data.

In the digital world, the words security and privacy are often used interchangeably, but even though they’re related, they’re not the same. Security is freedom from danger or harm, whereas privacy is freedom from observation or attention. Someone can harm you by impersonating you, taking over your account, stealing or deleting data, and so on; security makes such harm less likely to occur. On the other hand, if someone reads your email messages, sees your photos, or learns your location without your permission, you’ve lost your privacy.

It’s possible to have security without privacy and vice versa. But when it comes to a service like iCloud, it turns out that all the steps you might take to improve your security also protect your privacy. For example, choosing an excellent password reduces the likelihood that a stranger might log in to your account and thereby obtain access to your private data.

Start by enhancing your security with a good password and two-factor authentication, discussed just ahead. Before buying a used iOS device, you should also Check Activation Lock to decrease the risk of using a stolen device. And you can take additional steps to Protect Your Privacy, such as turning off syncing for sensitive data and using a passcode on your iOS devices.

Choose a Good Password

The password associated with the Apple ID you use for iCloud is incredibly valuable. With your username and that password, someone can see all your email, contacts, calendar events, backed up photos, and even your current location. And, as I mentioned in Does Find My Device Increase Hacking Risks?, using Find My Device, anyone with your password can remotely lock or wipe your Macs and iOS devices!

So, choosing a good password is a big deal. You don’t want a password that any other person can guess, or that an automated cracking tool could uncover by brute force. For complete details on what makes one password stronger than another, how an attacker might go about guessing your password, and techniques for increasing password strength while not overtaxing your memory, read my book Take Control of Your Passwords. If you don’t have time to read that whole book, at least follow these tips:

  • Make your iCloud password unique. Don’t use your iCloud password for any other site or service, because if your password for one site is compromised, every account that uses the same password is at risk.

  • Choose a long, random password. Your iCloud password should be at least 12 characters long. It should include uppercase and lowercase letters, at least one digit, and at least one punctuation character. And it should be random—any sort of pattern weakens your password. (If you don’t already have a random password generator, a quick web search should turn up many options.)

  • Use a password manager. Apps such as 1Password, Dashlane, and LastPass can create random passwords for you, store them, sync them across your devices, and fill them in automatically. That takes most of the effort and pain out of using good passwords.

If you want to change your password now, go to appleid.apple.com, click Manage Your Apple ID, and follow the instructions.

Use Enhanced Security Features

Even the longest, strongest, most random password provides no security if someone else finds out what it is. Perhaps someone watches over your shoulder as you type your password at your local coffee shop. Or maybe a spam email message persuades you to enter your password on a phishing site that looks almost exactly like the Apple site. Or an as-yet-undiscovered security bug or exploit exposes your password to an attacker.

In fact, it gets worse—an attacker may not need your password at all! When you set up your Apple ID, you were likely prompted to choose a few security questions and enter their answers. These questions (like “What was the name of your first pet?” or “What is the name of your oldest niece?”) are supposed to be easy for you to remember but hard for an attacker to guess—so that if you forget your password, Apple can ask you these questions as a secondary means of verifying your identity. Answer correctly, and you can reset your password.

Trouble is, someone pretending to be you can claim to have forgotten your password—and if that person calls Apple and correctly answers your security questions, your account will be compromised. And (assuming you answer the security questions truthfully) it’s surprisingly easy for a skilled attacker to find or guess the answers.

Apple, like many other companies (including Dropbox, Facebook, and Google) offers an optional method to bolster your security by adding another authentication element—a dynamic code tied to a device you own. The idea is that you’ll need both your password and this special code to perform certain critical activities with your Apple ID, so that even if someone knew your password, that alone wouldn’t grant access.

Apple offers not one, but two versions of this enhanced security:

  • Two-factor authentication: The modern version of the process, two-factor authentication, prompts you to allow login attempts and then requires you to enter a code; any trusted Apple device can display both the prompt and the code. Two-factor authentication requires 10.11 El Capitan or later, iOS 9 or later, or watchOS 2 or later—and is the only method available on 10.13 High Sierra or later and iOS 11 or later. See Use Two-Factor Authentication, just ahead.

  • Two-step verification: Apple’s earlier implementation of this system, called two-step verification, supplies the secondary login code via the Find My iPhone app or SMS. It’s available only for those using 10.12 Sierra or earlier, or iOS 10 or earlier. See Use Two-Step Verification, later.

Two-factor authentication and two-step verification are optional, but apart from the enhanced security they offer, there are additional reasons to consider using one of them:

  • Setting up either two-step verification or two-factor authentication system eliminates the security questions from your Apple ID—an attacker can no longer use them to break in to your account. So that’s a lovely bonus.

  • You’ll need to have one of these systems activated in order to Use App-Specific Passwords, and as of mid-2017, Apple requires app-specific passwords for third-party apps (such as Outlook and BusyCal) that connect to your iCloud account.

Use Two-Factor Authentication

Two-factor authentication for your Apple ID is both simpler and more secure than the older two-step verification I describe later. It’s available to all iCloud subscribers who have at least one device running iOS 9 or later or 10.11 El Capitan or later (although you’ll have better results if all your devices are running compatible operating systems).

With this feature enabled, here’s what you’ll see:

  • The device you use initially to enable two-factor authentication becomes a trusted device. That means you’ll use this device (along with your password) to authenticate on your next device, which then also becomes trusted. You can have several trusted devices.

  • When you sign in on a device that isn’t yet trusted, you enter your username and password as usual, but then two things happen:

    • You must click or tap an Allow button that appears automatically on all your existing trusted devices and shows the area from which the new device is trying to sign in. (Once you click or tap it on one device, the alert disappears on the rest.)

    • On the new device, you must enter a 6-digit verification code that’s displayed automatically on all your existing trusted devices. (If you don’t have access to a trusted device, you can receive your verification code via SMS or a phone call instead.)

  • Apps that access your iCloud account must Use App-Specific Passwords, just as with two-step verification.

  • If you try to sign in to your iCloud account using an older device that isn’t running at least iOS 9 or 10.11 El Capitan, or an older Apple TV model, you must get a verification code from a trusted device (or via SMS or phone call) and then append that to your password when you enter it. For example, if your ordinary iCloud password is x?u3[iFirHKL6XTG and your verification code is 295634, you would enter x?u3[iFirHKL6XTG295634 as your password.

In practice, I find Apple’s two-factor authentication to be smoother and less cumbersome to use than two-step verification, but the setup process is not necessarily intuitive—and it’s especially weird for people already using the older system and switching manually, because if you had previously turned on two-step verification, you must first turn it off and jump through the additional hoop of setting up security questions (which will become irrelevant a few minutes later, once you turn on two-factor authentication).

To turn off two-step verification, if it was previously enabled:

  1. Go to appleid.apple.com in a browser, sign in, and in the Security section (where it should say “Two-Step Verification On”), click Edit.

  2. Click Turn Off Two-Step Verification and follow the prompts; note that you must select and answer three new security questions (all of which must have different answers) and supply your date of birth.

To enable two-factor authentication, which works on a Mac running El Capitan or later or an iOS device running iOS 9 or later:

  1. On a Mac, go to System Preferences > iCloud > Account Details. Click Security, enter your password, and click Continue. (In some cases, you may have to repeat some or all of this process twice.) Then click Set Up Two-Factor Authentication.

    Or, on an iOS device, go to Settings > Your Name > Password & Security. Then tap Set Up Two-Factor Authentication.

  2. Follow the prompts. These may include answering two of your three security questions and supplying your date of birth and a phone number; you can select either “Text message” (for SMS) or “Phone call” (for a voice call).

Once you complete these steps, two-factor authentication is on, which means that you may be prompted for your password and verification code (or, in some cases, an app-specific password) on devices already signed in to your iCloud account.

When you sign in on a new device (or in a browser—for example, if you later visit appleid.apple.com again), the process is as follows:

  1. Enter your Apple ID and password as usual when prompted.

  2. An alert (Figure 31) appears on every already-trusted device. If the presence and location of the sign-in attempt (which is based on the device’s IP address) is what you were expecting, click or tap Allow.

    Figure 31: If the area shown on this Mac corresponds to the location where your new device is trying to sign in, click Allow.
    Figure 31: If the area shown on this Mac corresponds to the location where your new device is trying to sign in, click Allow.

    A 6-digit verification code (Figure 32) appears on the device on which you clicked or tapped Allow.

    Figure 32: After you click or tap Allow, you see the verification code that you can enter on the device on which you’re signing in.
    Figure 32: After you click or tap Allow, you see the verification code that you can enter on the device on which you’re signing in.
  3. On the device you’re using to sign in, enter the code (Figure 33).

Figure 33: Enter the code from one of your other devices here. In most cases, you won’t even need to click Continue.
Figure 33: Enter the code from one of your other devices here. In most cases, you won’t even need to click Continue.

After you complete this step, your new device becomes trusted and is signed in to your iCloud account.

To learn more about Apple’s two-factor authentication system, read:

Use Two-Step Verification

Two-step verification—intended for devices running operating systems older than iOS 9 or 10.11 El Capitan—works like this: After you enable it, when you try to perform certain tasks (such as logging in to the iCloud website, changing your password, or making a purchase on a new device), you enter your username and password. Then you’re prompted to supply a numeric code that’s sent to an iOS device or via SMS to an ordinary cell phone. Only after you enter this code are you granted access.

You won’t have to go through these steps very often. Just ahead, in Sign In with Two-Step Verification, I list the situations that call for the extra verification step.

Set Up Two-Step Verification

In order to use two-step verification, you must have at least one device capable of receiving SMS messages. With the necessary device(s) in hand, do this:

  1. In your browser, go to appleid.apple.com.

  2. Sign in with the username and password you normally use for iCloud.

  3. In the Security section, under Two-Step Verification, click Get Started and follow the prompts. In the process, you’ll receive a 14-character Recovery Key. Be sure to keep this in a safe place, such as your password manager.

  4. While you’re signed in to appleid.apple.com, you can authorize additional devices to receive verification codes. Any iOS device can do so as long as it has the free Find My iPhone app installed and it uses the same primary iCloud account. To authorize another device, click Verify next to a device’s name and follow the prompts.

From now on, you must have at least two of the following items to access iCloud:

  • Your username and password

  • A device you’ve authorized to receive verification codes

  • Your Recovery Key

With any two of these, you can use your account, change your password, and access all your data. If you lose more than one, you’re completely out of luck—your account will be inaccessible and not even Apple can unlock it for you.

Sign In with Two-Step Verification

With two-step verification enabled, you won’t need to use both steps every single time you access iCloud, but you will need them in the following situations:

  • Signing in to appleid.apple.com to manage your account

  • Signing in to iCloud for the first time on a new Mac or iOS device

  • Signing in to your account on the iCloud website (although you can check Remember This Browser to avoid being prompted for verification in the future when using the same browser on the same device, and you can use Find My Device without verifying your identity)

  • Making a purchase from iTunes, iBooks, or the App Store for the first time on a new Mac or iOS device

  • Contacting Apple for support with your Apple ID

In any of these situations, the process goes as follows:

  1. Enter your username and password as usual.

  2. From the list provided, choose a device to verify your identity:

    • If you choose an iOS device, the Find My iPhone app displays the code in an alert. (That is, you don’t have to manually open Find My iPhone.) If your device is locked, you must unlock it to see the code.

    • If you choose a phone number, the code is sent to that number by SMS.

  3. Click Send, and wait for your code to appear on the selected device.

  4. Enter the number you received in step 3. Apple sends you a confirmation message by email to let you know someone (presumably you) used your two-step verification process.

From then on, you can use the app, site, or service as usual.

Use App-Specific Passwords

Enabling two-factor authentication or two-step verification also activates another security feature: app-specific passwords. This feature applies to all third-party apps (such as Outlook, Thunderbird, BusyCal, and BusyContacts) that access your iCloud account. It does not apply to Apple apps (such as Mail, Safari, and Find My Friends), although previously it applied to FaceTime, Game Center, and iMessage accounts in Messages.

With app-specific passwords, Apple generates a special, unique password for each of the affected apps—your ordinary iCloud password no longer works for these apps when two-step verification or two-factor authentication is active. You can create app-specific passwords only after going through the two-factor authentication or two-step verification process, so you’re still protected by both steps—but once you’ve done this for a given app on a given device, you’re never prompted to do so again (for that app on that device), unless you change your security settings.

To generate an app-specific password:

  1. Open a third-party app that connects to your iCloud account. (If you’re doing this for the first time after enabling two-step verification or two-factor authentication, you may see an error message stating that your password wasn’t accepted.)

  2. Locate the app’s settings for username and password (often in the Preferences window). Leave the window open.

  3. Visit appleid.apple.com in your browser, sign in, and verify your identity.

  4. In the Security section, under “App-Specific Passwords,” click or tap Generate Password.

  5. Type a name for the app (such as BusyCal iMac) and click Create.

  6. The new password appears on screen. Copy it and paste it (or type it) into the window you opened in step 2.

If a device is lost or stolen, you may later want to revoke an app’s password. Doing so prevents that app, on that device, from accessing your iCloud account. Follow the same steps, but when you get to step 4, instead click Edit and then click View History. You can then click the X icon to revoke a single password or Revoke All to revoke them all.

Check Activation Lock

If an iOS device has Find My Device turned on (see Activate Find My Device), it also has Activation Lock enabled. That means no one can turn off Find My iPhone, erase the device, or reactivate it under a different account without the owner’s iCloud username and password. The intention of Activation Lock is to make iOS devices unattractive to thieves by preventing anyone but the rightful owner from setting it up for their own use.

If you’re thinking of selling or donating an iOS device, be sure to turn off Find My Device (in Settings > Your Name > iCloud > Find My Device) first in order to disable activation lock. If you’re thinking of buying a used iOS device, follow the instructions on Apple’s Find My iPhone Activation Lock page (see the heading “Check for Activation Lock before you buy a device from someone else”).

Protect Your Privacy

At the risk of stating the obvious, any data you sync or share via iCloud travels over the internet and (with a few exceptions) is stored on Apple’s servers. All your data is encrypted while in transit, and most of it is also encrypted while on Apple’s servers. (For complete details, read Apple’s article iCloud security overview.) However, that encryption is irrelevant if:

  • Someone guesses or discovers your password, and you don’t have two-step verification or two-factor authentication enabled

  • Your Mac or iOS device is stolen and you haven’t enabled FileVault (Mac) or a passcode (iOS)

  • Apple is legally obligated to provide your data to law enforcement or a government agency

You can and should take steps to avoid the first two problems, as I explain in a moment. But if you want to eliminate the possibility that your personal data might be handed over to the government, you should not use iCloud at all. I can’t make it any clearer than that.

If you read Apple’s Privacy page, and in particular the Transparency Report that’s linked from that article, you’ll see that the company is taking every possible measure to protect your privacy while complying with the law. Even so, in rare and exceptional circumstances, Apple could be forced to divulge your personal data to law enforcement or a government agency. If that’s a concern for you, you’ll have to give up all the benefits of iCloud to avoid this risk.

Obviously, I use iCloud myself, and I think the average person’s risk of having personal information disclosed to the government is vanishingly small—but if you want an ironclad guarantee of privacy in every situation, iCloud can’t possibly provide that.

That disclaimer out of the way, you can take several concrete steps to protect the privacy of your iCloud data from everyone else—including hackers, thieves, and snoops. Here’s what I recommend:

  • Use a good password. I already counseled you to Choose a Good Password as a security measure, but I wanted to reiterate that point for the benefit of anyone not reading linearly.

  • Enable two-factor authentication or two-step verification. Likewise, if you Use Two-Factor Authentication or Use Two-Step Verification, you’ll make it much harder for anyone to obtain your private data.

  • Disable syncing of sensitive data. If you have extremely sensitive data that you want to keep entirely out of iCloud, turn off the relevant feature(s) in System Preferences > iCloud on a Mac, in the iCloud app in Windows, and in Settings > Your Name > iCloud on an iOS device. In particular, you might want to disable:

    • iCloud Drive: Data in this category includes documents (including automatically saved new documents in iCloud-enabled apps), Mail settings (signatures, flag names, rules, smart mailboxes, VIPs, and previous recipients), and text abbreviations (see Use In-App Data Syncing).

    • iCloud Keychain: Sensitive data stored under this heading includes scanned or written signatures from Preview or the Markup feature of Mail in Yosemite and later.

    • Photos: This includes iCloud Photo Library and My Photo Stream, as well as any shared albums.

  • Consider local backups for iOS devices. Although iCloud Backup is handy (see Back Up and Restore iOS Data), the downside is that if someone obtains your iCloud username and password, that person can restore your backed-up data to another device and thus obtain all your photos, email, contacts, and so on. (The risk is greatly decreased, of course, if you use two-factor authentication or two-step verification.)

    Especially if you use your iOS device to take racy or otherwise incriminating photos, also keep in mind that even though you may have turned off iCloud Photo Library and My Photo Stream, your backups will still have copies of photos you might prefer to keep out of the cloud. Anyone who needs to protect the privacy of their photos at all costs should consider turning off iCloud Backup and instead backing up to a Mac or PC using iTunes. See How to back up your iPhone, iPad, and iPod touch for details.

  • Use a passcode on iOS devices. If your iOS device is locked with a passcode, anyone who steals or finds the device won’t be able to access its contents. You can even configure your iOS device to erase its contents after ten unsuccessful passcode attempts. Turn on a passcode in Settings > Passcode, or in Settings > Touch ID & Passcode (or Face ID & Passcode).

  • Use FileVault on your Mac. The Mac’s built-in FileVault feature encrypts everything on your Mac’s hard disk or SSD to make it inaccessible without your password.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.58.33