The Pi
  • Home
  • Join the Pi
  • Meet With Us
    • General Meetings
    • Clubhouse Saturday
    • Thursday Learners
    • Special Interest Groups
    • RUMP Saturdays
  • For Members
    • Using Join It
    • Using groups.io
    • Outreach/Partners
    • Volunteer
    • Resist/Reuse/Recycle
    • Members only!
  • Contact
  • Blog
  • Home
  • Join the Pi
  • Meet With Us
    • General Meetings
    • Clubhouse Saturday
    • Thursday Learners
    • Special Interest Groups
    • RUMP Saturdays
  • For Members
    • Using Join It
    • Using groups.io
    • Outreach/Partners
    • Volunteer
    • Resist/Reuse/Recycle
    • Members only!
  • Contact
  • Blog

Recap of the August 23, 2025 Pi General Meeting

9/14/2025

0 Comments

 
Picture
Thanks to everyone who attended!  And great thanks to Craig for a very helpful and timely talk.  

One big takeway is to move away from email addresses that use your name - which were once the best practice.  Now that bots are scraping the web, email addresses are more keys to identity theft in a disturbingly trending way.  So besides setting up "hide my email" addresses through icloud, I'll choose a new one and use that for all new signups.  Note that some other email hosts allow this kind of alias for use.  

Many thanks again to Craig.  

Oh, Cheryl Audet Levoie was the doorprize winner at the meeting.  Congrats Cheryl!


Back in August, Roy sent around the Zoom Chat Text to our email list.  Reproduced below is the AI summary he also included.  

Summary

Hybrid Event and Door Prizes
The meeting began with Roy taking over from Jonathan, who had to remain quiet due to being at the beach. Roy mentioned that David Pogue would be returning for the October meeting and that there were plans for a hybrid book event in the spring. Roy also announced three door prizes for the meeting: an AirTag, a $25 Apple gift card, or a one-year extension of Apple Pi membership. The conversation ended with Craig preparing to start his presentation, and Roy reminded attendees to fill out the survey for the drawing.
Apple OS Updates and Security
The meeting focused on Apple's upcoming OS updates, with Roy discussing the public beta releases of iOS 26 and TV OS 26, highlighting features like liquid glass design and improved screen capture capabilities. Michael raised concerns about 32-bit unsupported applications, and Roy advised checking for updates or using a virtual machine if necessary. Craig presented on computer security, covering topics like email security, two-factor authentication, password management, and stolen device protection. The conversation ended with a brief discussion on email security, with Craig asking attendees to identify the most secure email address among three options.
Online Privacy and Email Security
Craig discussed the importance of creating secure email addresses and highlighted how easily personal information can be linked and exploited online. He emphasized using fictitious or temporary email addresses and advised against using identifiable information in email creation. Craig also demonstrated how social media posts and public information can reveal personal details, using a photo example to show how location, preferences, and other data can be inferred. He encouraged attendees to be mindful of the information they share online and to use different accounts for various platforms.
UK ADP Disablement and Implications
Craig discussed the status of Advanced Data Protection (ADP) for UK users, explaining that it has been disabled due to a government request for backdoor access to iCloud data. He shared his personal experience of seeing government officials at an Apple event in London, suggesting Apple was caught off guard by the request. Craig emphasized the importance of being aware of data protection issues, as actions by one country or company can set a precedent for others. He also explained the technical requirements for activating ADP, including keeping all iCloud devices up to date. Bruce asked about the implications for foreigners traveling in the UK, but Craig could not provide a clear answer on how long a user could be outside their home country before local laws apply.
Encryption and Apple Device Security
Craig led a detailed discussion on encryption, message colors in Apple devices, and VPNs. He explained that green messages are sent from non-Apple devices, while blue messages are encrypted and sandboxed for enhanced security on Apple devices. Craig also covered the basics of encryption, including how it protects data during transmission, and mentioned that some encryption methods can be accessed by law enforcement. He briefly touched on the concept of hashing, which is used to secure passwords, and clarified that Fido is not a dog but a protocol for secure authentication. Craig also addressed a question about VPNs, explaining their role in securing internet browsing but noting potential risks if a single VPN is used consistently.
Fido Keys: Physical Security Overview
Craig explained the functionality and benefits of Fido keys, which are physical security keys that provide an additional layer of protection against phishing and hacking by requiring a physical device to log into websites or services. He discussed the different types of Fido keys available, including USB, USB-C, NFC, and those with fingerprint readers, and emphasized that they are becoming more widely used in both enterprise and personal settings. Craig also highlighted the importance of having a backup key and addressed questions about compatibility across different devices and platforms.
Future-Proof Authentication Methods
Bruce and Craig discussed the obsolescence and backward compatibility of different authentication methods, with Bruce suggesting that radio-based methods like Bluetooth might be more future-proof than USB-based ones. They also explored the advantages of Apple's passkeys over traditional passwords, including their resistance to phishing and their ability to check the legitimacy of websites. Craig explained how passkeys work and their benefits, such as syncing across devices and offering multiple layers of security. The discussion touched on the cost of authentication keys, the potential impact of AI on password security, and the importance of considering personal preferences and security needs when choosing an authentication method.
Phone Security Measures in Public Spaces
The group discussed various aspects of phone security, with Craig highlighting the prevalence of phone theft in London and the challenges faced by Apple in combating this issue. They explored different security measures, including the use of Face ID and Keychain access, with Craig emphasizing the reliability of Keychain but also acknowledging concerns about password managers. Beth shared her experiences with phone theft in Washington DC's Metro system, while the group discussed strategies to protect phones in public spaces.
Smartphone Theft and Security Measures
The group discussed smartphone theft statistics and security measures, with Bill sharing that approximately 700,000 phones are stolen in the US each 6 months. Craig shared his personal experience of having a phone stolen and discussed Apple's stolen device protection features, including Familiar Locations and security delays. The discussion concluded with questions about editing familiar locations lists and using Lockdown Mode, with Van confirming that stolen device protection can be set to "always" for enhanced security.
Data Privacy and Protection Discussion
Jonathan announced that Cheryl won the door prize and requested she choose one of three options. Craig presented statistics on data requests by governments and organizations, highlighting concerns about data privacy. Raju corrected Craig's statement about known data requests, suggesting that a significant portion might be unknown. Bruce asked about Apple's data sharing policies, and Craig provided examples of data protection practices in different countries, including Proton and Iceland.
iPhone Security and Tracking Features
Craig presented on iPhone security features, explaining that even if stolen, thieves cannot easily disable "Find My iPhone" tracking, as Apple requires login credentials and physical device access. He demonstrated how Apple Watches can alert users when their iPhones are left behind, and shared several real-world examples of iPhone tracking success stories, including a case where an iPhone was recovered from a storm drain after being lost for two years. The conversation ended with Roy announcing the next clubhouse meeting would be held on the first Saturday of the following month, and Craig was thanked for his informative presentation.
End of Zoom AI Meeting Summary

0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    September 2025
    July 2025
    June 2025
    April 2025
    August 2024
    July 2024

    Categories

    All

    RSS Feed

Follow us on:
To message us about membership or with other questions, contact us here:
​www.theapplep​i.org/contact.html

Click here for information on Pi Governance.