mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-20 21:34:34 -05:00
4bd9c6ca20
Signed-off-by: blacklight447 <niek@privacyguides.org> Signed-off-by: kimg45 <138676274+kimg45@users.noreply.github.com> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
205 lines
15 KiB
Markdown
205 lines
15 KiB
Markdown
---
|
|
date:
|
|
created: 2022-10-22
|
|
categories:
|
|
- Tutorials
|
|
authors:
|
|
- mfwmyfacewhen
|
|
- jonah
|
|
- contributors
|
|
tags:
|
|
- iOS
|
|
license: BY-SA
|
|
description: There are a number of privacy and security-related settings you should consider changing in the Settings app on iOS 16.
|
|
schema_type: AnalysisNewsArticle
|
|
---
|
|
# iOS 16 Privacy Configuration Guide
|
|
|
|
There are a number of privacy and security-related settings you should consider changing in the **Settings** app on iOS.<!-- more -->
|
|
|
|
## iCloud
|
|
|
|
Apple uses **iCloud** to sync your settings, photos, documents, apps, etc. to your other devices. Some things synced to iCloud are end-to-end encrypted, while others are merely encrypted in transit. You can check [Apple's documentation](https://support.apple.com/en-us/HT202303) for information on which services are E2EE; anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. You should disable anything you don't want backed up to iCloud.
|
|
|
|
!!! warning
|
|
|
|
Despite "Messages in iCloud" being E2EE, enabling iCloud Backup stores a key to unlock iMessage in your device backup, which is **not** E2EE. If you don't want to store a copy of your iMessage keys, disable iCloud Backup.
|
|
|
|
At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to iCloud. Select that, then **iCloud**, and turn off the switches for any services you don't want to sync to iCloud. You may see third-party apps listed under **Show All** if they sync to iCloud, which you can disable here. For the purposes of this guide, we will only be covering first-party Apple iCloud services:
|
|
|
|
**iCloud Backup** backs up your phone and app data to Apple's servers. Unfortunately, these backups are not E2EE,[^1] and having them enabled even removes E2EE from some other iCloud services (like iMessage). Instead of iCloud Backup, we recommend making an encrypted backup to your computer using iTunes (Windows) or Finder (macOS).
|
|
|
|
[^1]: [Reuters - Exclusive: Apple dropped plan for encrypting backups after FBI complained](https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT)
|
|
|
|
Select **iCloud Backup**
|
|
|
|
- [ ] Turn off **Back Up This iPhone**
|
|
|
|
**Private Relay** is a paid ([**iCloud+**](https://support.apple.com/en-us/HT201318)) proxy service which relays your Safari traffic through two servers: one owned by Apple and one owned by Cloudflare. Because Private Relay is still in beta and it only covers the Safari browser, we recommend you choose a proper [VPN](https://www.privacyguides.org/vpn/) instead.
|
|
|
|
Select **Private Relay**
|
|
|
|
- [ ] Turn off **Private Relay (Beta)**
|
|
|
|
If you already use iCloud Mail, **Hide My Email** is Apple's first-party email aliasing feature. You can use email aliases with Sign In With Apple, for free, or generate unlimited aliases with a paid iCloud+ plan. Hide My Email may be good for iCloud Mail users because it only requires trusting one party (Apple) with your emails, but if you use any other email provider, we recommend [a standalone email aliasing service](https://www.privacyguides.org/email#email-aliasing-services) instead.
|
|
|
|
### Media & Purchases
|
|
|
|
At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**.
|
|
|
|
- [ ] Turn off **Personalized Recommendations**
|
|
|
|
### Find My
|
|
|
|
**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when:
|
|
|
|
- Your location is shared with a family member or friend, and you both use iOS 15 or greater.
|
|
- Your device is offline and is located by the Find My Network.
|
|
|
|
Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock.
|
|
|
|
At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features.
|
|
|
|
## Airplane Mode
|
|
|
|
Enabling **Airplane Mode** stops your phone from contacting cell towers. You will still be able to connect to Wi-Fi and Bluetooth, so whenever you are connected to Wi-Fi you can turn this setting on.
|
|
|
|
## Wi-Fi
|
|
|
|
You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button:
|
|
|
|
- [x] Turn on **Private Wi-Fi Address**
|
|
|
|
You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off.
|
|
|
|
## Bluetooth
|
|
|
|
**Bluetooth** should be disabled when you aren't using it as it increases your attack surface. Disabling Bluetooth (or Wi-Fi) via the Control Center only disables it temporarily: you must switch it off in Settings for disabling it to remain effective.
|
|
|
|
- [ ] Turn off **Bluetooth**
|
|
|
|
## General
|
|
|
|
Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer.
|
|
|
|
It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**:
|
|
|
|
- [x] Turn on **Download iOS Updates**
|
|
- [x] Turn on **Install iOS Updates**
|
|
- [x] Turn on **Security Responses & System Files**
|
|
|
|
**AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want.
|
|
|
|
- [x] Select **AirDrop** > **Receiving Off**
|
|
|
|
**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**:
|
|
|
|
- [x] Select **Never** or **Ask**
|
|
|
|
**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps.
|
|
|
|
Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**.
|
|
|
|
## Siri & Search
|
|
|
|
If you don't want anyone to be able to control your phone with Siri when it is locked, you can turn that off here.
|
|
|
|
- [ ] Turn off **Allow Siri When Locked**
|
|
|
|
## Face ID or Touch ID & Passcode
|
|
|
|
Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security.
|
|
|
|
Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/).
|
|
|
|
If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode.
|
|
|
|
If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts.
|
|
|
|
On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device.
|
|
|
|
**Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone.
|
|
|
|
- [ ] Turn off **Today View and Search**
|
|
- [ ] Turn off **Notification Center**
|
|
- [ ] Turn off **Control Center**
|
|
- [ ] Turn off **Lock Screen Widgets**
|
|
- [ ] Turn off **Siri**
|
|
- [ ] Turn off **Reply with Message**
|
|
- [ ] Turn off **Home Control**
|
|
- [ ] Turn off **Wallet**
|
|
- [ ] Turn off **Return Missed Calls**
|
|
- [ ] Turn off **USB Accessories**
|
|
|
|
iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
|
|
|
|
!!! warning
|
|
|
|
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it.
|
|
|
|
- [x] Turn on **Erase Data**
|
|
|
|
## Privacy
|
|
|
|
**Location Services** allows you to use features like Find My and Maps. If you don't need these features, you can disable Location Services. Alternatively, you can review and pick which apps can use your location here. Select **Location Services**:
|
|
|
|
- [ ] Turn off **Location Services**
|
|
|
|
You can decide to allow apps to request to **track** you here. Disabling this disallows all apps from tracking you with your phone's advertising ID. Select **Tracking**:
|
|
|
|
- [ ] Turn off **Allow Apps to Request to Track**
|
|
|
|
You should turn off **Research Sensor & Usage Data** if you don't wish to participate in studies. Select **Research Sensor & Usage Data**:
|
|
|
|
- [ ] Turn off **Sensor & Usage Data Collection**
|
|
|
|
**Safety Check** allows you to quickly view and revoke certain people and apps that might have permission to access your data. Here you can perform an **Emergency Reset**, immediately resetting permissions for all people and apps which might have access to device resources, and you can **Manage Sharing & Access** which allows you to go through and customize who and what has access to your device and account resources.
|
|
|
|
You should disable analytics if you don't wish to send Apple usage data. Select **Analytics & Improvements**:
|
|
|
|
- [ ] Turn off **Share iPhone Analytics** or **Share iPhone & Watch Analytics**
|
|
- [ ] Turn off **Share iCloud Analytics**
|
|
- [ ] Turn off **Improve Fitness+**
|
|
- [ ] Turn off **Improve Safety**
|
|
- [ ] Turn off **Improve Siri & Dictation**
|
|
|
|
Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**
|
|
|
|
- [ ] Turn off **Personalized Ads**
|
|
|
|
**App Privacy Report** is a built-in tool that allows you to see which permissions your apps are using. Select **App Privacy Report**:
|
|
|
|
- [x] Select **Turn On App Privacy Report**
|
|
|
|
**Lockdown Mode** is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally.
|
|
|
|
- [x] Select **Turn On Lockdown Mode**
|
|
|
|
## Privacy/Security Tips
|
|
|
|
### E2EE Calls
|
|
|
|
Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](https://www.privacyguides.org/real-time-communication/) like Signal.
|
|
|
|
### Avoid Jailbreaking
|
|
|
|
Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware.
|
|
|
|
### Encrypted iMessage
|
|
|
|
The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates they're using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices.
|
|
|
|
If either you or your messaging partner have iCloud Backup enabled, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications.
|
|
|
|
### Blacking Out Faces/Information
|
|
|
|
If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit at the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%.
|
|
|
|
### Installing Beta Versions of iOS
|
|
|
|
Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities.
|
|
|
|
### Before First Unlock
|
|
|
|
If your threat model includes forensic tools and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation.
|