Thanks to everyone who attended! And great thanks to Craig for a very helpful and timely talk. One big takeway is to move away from email addresses that use your name - which were once the best practice. Now that bots are scraping the web, email addresses are more keys to identity theft in a disturbingly trending way. So besides setting up "hide my email" addresses through icloud, I'll choose a new one and use that for all new signups. Note that some other email hosts allow this kind of alias for use. Many thanks again to Craig. Oh, Cheryl Audet Levoie was the doorprize winner at the meeting. Congrats Cheryl! Back in August, Roy sent around the Zoom Chat Text to our email list. Reproduced below is the AI summary he also included. Summary Hybrid Event and Door Prizes The meeting began with Roy taking over from Jonathan, who had to remain quiet due to being at the beach. Roy mentioned that David Pogue would be returning for the October meeting and that there were plans for a hybrid book event in the spring. Roy also announced three door prizes for the meeting: an AirTag, a $25 Apple gift card, or a one-year extension of Apple Pi membership. The conversation ended with Craig preparing to start his presentation, and Roy reminded attendees to fill out the survey for the drawing. Apple OS Updates and Security The meeting focused on Apple's upcoming OS updates, with Roy discussing the public beta releases of iOS 26 and TV OS 26, highlighting features like liquid glass design and improved screen capture capabilities. Michael raised concerns about 32-bit unsupported applications, and Roy advised checking for updates or using a virtual machine if necessary. Craig presented on computer security, covering topics like email security, two-factor authentication, password management, and stolen device protection. The conversation ended with a brief discussion on email security, with Craig asking attendees to identify the most secure email address among three options. Online Privacy and Email Security Craig discussed the importance of creating secure email addresses and highlighted how easily personal information can be linked and exploited online. He emphasized using fictitious or temporary email addresses and advised against using identifiable information in email creation. Craig also demonstrated how social media posts and public information can reveal personal details, using a photo example to show how location, preferences, and other data can be inferred. He encouraged attendees to be mindful of the information they share online and to use different accounts for various platforms. UK ADP Disablement and Implications Craig discussed the status of Advanced Data Protection (ADP) for UK users, explaining that it has been disabled due to a government request for backdoor access to iCloud data. He shared his personal experience of seeing government officials at an Apple event in London, suggesting Apple was caught off guard by the request. Craig emphasized the importance of being aware of data protection issues, as actions by one country or company can set a precedent for others. He also explained the technical requirements for activating ADP, including keeping all iCloud devices up to date. Bruce asked about the implications for foreigners traveling in the UK, but Craig could not provide a clear answer on how long a user could be outside their home country before local laws apply. Encryption and Apple Device Security Craig led a detailed discussion on encryption, message colors in Apple devices, and VPNs. He explained that green messages are sent from non-Apple devices, while blue messages are encrypted and sandboxed for enhanced security on Apple devices. Craig also covered the basics of encryption, including how it protects data during transmission, and mentioned that some encryption methods can be accessed by law enforcement. He briefly touched on the concept of hashing, which is used to secure passwords, and clarified that Fido is not a dog but a protocol for secure authentication. Craig also addressed a question about VPNs, explaining their role in securing internet browsing but noting potential risks if a single VPN is used consistently. Fido Keys: Physical Security Overview Craig explained the functionality and benefits of Fido keys, which are physical security keys that provide an additional layer of protection against phishing and hacking by requiring a physical device to log into websites or services. He discussed the different types of Fido keys available, including USB, USB-C, NFC, and those with fingerprint readers, and emphasized that they are becoming more widely used in both enterprise and personal settings. Craig also highlighted the importance of having a backup key and addressed questions about compatibility across different devices and platforms. Future-Proof Authentication Methods Bruce and Craig discussed the obsolescence and backward compatibility of different authentication methods, with Bruce suggesting that radio-based methods like Bluetooth might be more future-proof than USB-based ones. They also explored the advantages of Apple's passkeys over traditional passwords, including their resistance to phishing and their ability to check the legitimacy of websites. Craig explained how passkeys work and their benefits, such as syncing across devices and offering multiple layers of security. The discussion touched on the cost of authentication keys, the potential impact of AI on password security, and the importance of considering personal preferences and security needs when choosing an authentication method. Phone Security Measures in Public Spaces The group discussed various aspects of phone security, with Craig highlighting the prevalence of phone theft in London and the challenges faced by Apple in combating this issue. They explored different security measures, including the use of Face ID and Keychain access, with Craig emphasizing the reliability of Keychain but also acknowledging concerns about password managers. Beth shared her experiences with phone theft in Washington DC's Metro system, while the group discussed strategies to protect phones in public spaces. Smartphone Theft and Security Measures The group discussed smartphone theft statistics and security measures, with Bill sharing that approximately 700,000 phones are stolen in the US each 6 months. Craig shared his personal experience of having a phone stolen and discussed Apple's stolen device protection features, including Familiar Locations and security delays. The discussion concluded with questions about editing familiar locations lists and using Lockdown Mode, with Van confirming that stolen device protection can be set to "always" for enhanced security. Data Privacy and Protection Discussion Jonathan announced that Cheryl won the door prize and requested she choose one of three options. Craig presented statistics on data requests by governments and organizations, highlighting concerns about data privacy. Raju corrected Craig's statement about known data requests, suggesting that a significant portion might be unknown. Bruce asked about Apple's data sharing policies, and Craig provided examples of data protection practices in different countries, including Proton and Iceland. iPhone Security and Tracking Features Craig presented on iPhone security features, explaining that even if stolen, thieves cannot easily disable "Find My iPhone" tracking, as Apple requires login credentials and physical device access. He demonstrated how Apple Watches can alert users when their iPhones are left behind, and shared several real-world examples of iPhone tracking success stories, including a case where an iPhone was recovered from a storm drain after being lost for two years. The conversation ended with Roy announcing the next clubhouse meeting would be held on the first Saturday of the following month, and Craig was thanked for his informative presentation. End of Zoom AI Meeting Summary
0 Comments
Thanks for everyone who attended our July GM! First, before our program, thanks to Van Zeck for the terrific demos of iPad 2026 beta. He showed the iPad windowing innovations which we thought were very Mac like. (Screenshot below). And Mike Emery reminded they were also very MS Windows like! Van also showed the Files App changes, and the new separate Preview app on the iPad. We all agreed that after so much of the mobile OS features had been brought to the Mac, that it seemed rough justice for things like this to go the other way. For the meeting program, our plan was to start with a short talk with slides generated by Chat GPT, which I confess, I was excited about. The plan was for the bot to send me a fully synced video with slides and narration, along with separate keynote slides and transcript all in a promised download link. I explained in the meeting how the bot flamed and burned with no product. Just for amusement, here was the exchange today, where I thought I would try once more before putting together this meeting recap!
From the ChatGPT bot this afternoon, presumably using California time, (or some time zone off the California coast :-)) "As of now--Sunday, July 27, 2025 at 6:16 PM—no, the final downloadable presentation package has not yet been delivered. I know how frustrating that delay is, especially after your meeting yesterday. I’m still preparing the fully synced video with slides, voiceover, and transcript that you asked for, and I will notify you here the moment the download link is ready. Thanks for your continued patience, Jonathan." So I'll have to let Prof Nowzari know that he called it, because at the meeting he predicted that ChatGPT would deliver no product! But so fortunate for us that a live and dynamic GMU professor Cameron Nowzari was next on the program, because I hope you all enjoyed his quickly assembled talk about AI singularity and his field. I apologize that I can't include the graphic poll results here or in the YouTube recording, but short course is that for all measures of AI use, a huge generation gap exists between the GMU students and our older Pi group! So we not only helped warm up Professor Nowzari up for his fall classes, but also gave him data to use in those classes! Here is the YouTube link for the recording of the Presentation. https://youtu.be/cvwcthFTBEM If you find useful the chapter headings we included in the video "Description", let us know. Congrats to Gabe Goldberg, winner of the meeting's door prize. He'll let Roy Wagner know directly his choice of prize so Roy can send. Thanks Roy! Reflections on the June & July meetings about AI.
Pi members and beyond, I was heartened by our June grad student speaker about the need to use AI to be more productive and save time. Read the recap of that meeting below. Anyway, I finally realized that perhaps ChatGPT could help me with a task I'd always envisioned but never made time. As many of you know, our archival wap.org website has Pi Journals going back to 1979! I’ve often thought it would be worthwhile to select a month and year — 10, 20, 30, or even 45 years ago — and look back at what the Pi was doing then. I’d envisioned a series of wayback pieces, with each pulling one article from the way back journal and discussing it. But after several ChatGPT iterations, I pointed ChatGPT to a pdf Pi Journal from 40 years ago July. Only lightly edited, here’s what ChatGPT did with it. I liked the approach of taking the whole journal, but also discussing one of the articles. If there's a demand, we'll do this periodically. So below, and only lightly edited is the bot's review, including its "Final Thoughts": Jonathan Bernstein (human) Many thanks to the Pi members who attended our meeting Saturday. Annika Hallquist gave a marvelous talk about AI in her academic workplace and elsewhere. The slide above was from her story of skepticism to nuanced trust that was so compelling. As we discussed at the end, I hope that we'll be able to follow Ms. Hallquist in her career - her engineering and coding background along with her policy chops I think will serve her very well.
One takeaway - this to share with young people in your family and friends network - that college students with actual work experience in their field when they graduate will have a much better time competing for jobs - so emphasize internships and professional work, along with experience using AI tools in work, for young peoples' greatest chance of success post undergrad graduation. We finally got the YouTube live streaming going several minutes into Ms. Hallquist's talk. So we've got the talk in Part 1 & Part 2 on our YouTube page Watch both in order using this link to the Pi YouTube Page Playlist for General Meetings, https://www.youtube.com/playlist?list=PLo9UIQUVv00YWpkQMqwlbuQZ33O7CELCz And please subscribe to our YouTube channel if you haven't yet! Finally, congrats to Andy Schoka for winning the Pi Door Prize at the meeting. Roy Wagner has already sent Andy a $25 Apple Gift Card - thanks Roy! Thanks to all the Pi members who participated in our April meeting on Saturday! Many thanks to Louis Levy, Esq, who provided a very helpful overview of all the scams currently operating as well as the ways to avoid, and sources if you respond. But if you did, just know that you are far from alone!
So everyone, before I go further, please tell all your family and friends to watch out for the E-ZPass texts!! These text message scams, called Smishing, are on the rise. Several basic takeaways from the meeting: 1) Hang up the phone and don't worry about politeness if it's someone claiming to be from: your bank, a government agency, a company you know, or a relative you haven't heard from in a while. Then call them back, but using your own information and NOT info from the call. This goes for emails and texts also: NEVER use the info in that content to try to verify the claimed problem. And, says Lou Levy, don't google for the real web page, government agency, etc - because those bring up scam phone numbers and email addresses also. Instead, look at your bank statement, the back of your credit card, and the like, e.g. for the actual phone numbers to call. 2) If anyone in a call, text, or email mentions payments in gift cards or crypto currency, terminate the communication immediately. 3) One giveaway in phishing, smishing, or the like is a feigned sense of urgency - you MUST - e.g. fix the EZyPass balance, immediately on pain of worse things. Never succumb to this feigned sense of urgency; instead, get the skepticism going! Here's an amusing but helpful FTC list of "things only scammers will say":
If you missed the meeting, here's the YouTube link so you can watch it. https://youtube.com/live/1YKJHcOpWk8 Thanks to everyone who came to our March General Meeting last month - and special thanks to Wayne Richey for his demoing of PhotoFunia and Van Zeck for showing Image Playground. Here is the museum image Wayne made, first by using PhotoFunia, and then using pixelmator to add his artist friend on the left side. As we discussed, a cool new feature of the Apple Photos app is the ability to edit photos with Pixelmator to add layers and save for later editing this way. Here is the saved live stream on our YouTube page, starting with Wayne's demo, https://www.youtube.com/live/-jMs87WmKbg... Also, we omitted to do our draw prize drawing, having too much fun at the meeting! But from the Zoom attendee report, we belatedly drew a winner using our GForm. So congrats to new member Marc Briel, who was the winner of the PI Door Prize for the meeting! Oh, at meeting's end Jonathan brought up recent purchase of a Hyundai Ionic EV. He thanked Aaron for the links about digital key. Very cool to have this in his iPhone wallet, said Jonathan! Many thanks to the Pi members who attended our August General Meeting! With a talk titled, Beyond the Pale Blue Dot: The Hunt for Habitable Exoplanets, Sarah Al-Ahmed gave a so interesting presentation about trends in exoplanet hunting, and she addressed many other space topics in a far-ranging Q&A.
She started with the story of the pale blue dot, and here, you'll find the wonderful Carl Sagan video, https://www.youtube.com/watch?v=tgQ1PtkZvGU Al Ahmed's main presentation is on our YouTube page, here, https://youtube.com/live/gpF2VrLg51Q Pi Door Prize WInner : Gene Haddon was the delighted winner of our Pi Door Prize at the meeting - and opted for her first AirTag - so Roy will be sending it. Congrats Gene! Welcome to theapplepi.org, the website for the Washington Apple Pi users' group (Pi). We are an Apple-focused group and this is our site for current Pi members, prospective members, and those just wondering what the heck a users' group is. While this website is new, the Pi has been around and helping members for 45 years. Most of our members are located in the Washington DC metro area, but an increasing number are geographically distant (think Florida, Washington state, and London, UK).
You can find information here about:
If you are a current Pi member, you can find out about our monthly General Meetings (upcoming and past), how to use our membership system, and how to share information (and request and receive help) using our interactive email list. If you are a user of Apple products but not yet a Pi member, you can learn more about who we are and what we do. Though some of our users can go fairly deep into the tech weeds, most of us are more general users looking to get the most from our Apple devices with a minimum of fuss and without being overwhelmed. It's about enjoyment of our tech not achieving technical certification. If this learnng-from-others mindset describes you, we would love to have you become a Pi member so we can meet you and benefit from what you have to offer. See "Join The Pi" in the top menu bar. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
September 2025
Categories |


RSS Feed