< img src = "/uploads/blogs/30/56/ib-f-f-f-fcq8nef68_2a6bbbb1cb.jpg" Alt = "top 5 ways to prevent iPhone to keep track of you"/> ~ ~ < p > Although Apple loudly states that cares about the privacy < p > Fortunately, all this is easy to fix.
< P > In addition to the well -known confidentiality settings, there are some less known that can additionally protect your personal information.
< p > on & nbsp; that to take all these actions in & nbsp; you will take no more than a few minutes.
< p > Make sure in & nbsp; this yourself.
< H2 ID = "H2_PART1" > turn off & nbsp; & laquo; extended visual search & raquo; in & nbsp; photographs
< p >From & nbsp; output iOS 18 Apple presented a feature & nbsp; & & laquo; improved visual search & raquo;, designed to improve search for & nbsp; photos by comparing them with & Apple.
< P > Although it is & nbsp; nbsp; it can make images, nbsp; nbsp; also means that & nbsp; your photos and & nbsp; spo & rsquo; rsquo; < P > Privacy defenders express concern with & nbsp; a reason for the possible disclosure of confidential information for & nbsp; help. It is difficult to imagine that Apple to transmit your photos to someone, but the company, for example, can teach artificial intelligence on them.
< p > possibly you & nbsp; not & nbsp; but many such idea is not & nbsp; nbsp; nbsp; nbsp; nbsp.
~ < p > to disable & nbsp; & laquo; extended visual search & raquo;, perform the following steps:
~ ~ < Ul > < li >Open the app & nbsp; & laquo; settings & raquo; on & nbsp; iPhone. < li > scroll down and click on & nbsp; & laquo; photo & raquo;. ~ < li > Find item & nbsp; & laquo; extended visual search & raquo; and turn it off.
< p > Disable it & nbsp; settings, you & nbsp; nbsp; retain control of data of your photos so they are not & nbsp; analyzed automatically and not & nbsp; transmitted without your consent.
~ < H2 ID = "H2_PART1" > Turn on the lock mode to increase safety
< p > Lock mode that with & Rsquo; appeared a few years ago in & nbsp; iOS 16, offers an extreme level of safety for users who can be complex cyberattacks.
< p >During its activation, some functions are limited to reduce potential vulnerability, such as most of the messages are blocked, sophisticated web technologies are switched off, incoming invitations and & nbsp; nbsp; nbsp; nbsp; service.
are restricted < P > To enable lock mode, perform the following steps:
< Ul > < li > go to & nbsp; partition & nbsp; & laquo; settings & raquo; & gt; & laquo; confidentiality and safety & raquo;. < li > Scroll page in & nbsp; very bottom and click on & nbsp; lock mode. < Li > Click Enable lock mode and & nbsp; then click on and & nbsp; restart.
< P > Although this mode limits some of the device capabilities, it greatly enhances protection against potential-spy programs and hacking attempts.
< p > Of course, use it constantly, most likely, pointless and not & nbsp; very convenient. But in & nbsp; certain moments he will be able to reassure your nerves.
< H2 ID = "H2_PART1" >Use the feature & nbsp; & laquo; hide my mail & raquo; To protect your personality
< P > After all you & nbsp; often encountered with & nbsp; by the fact that when registering on & nbsp; some service, you require email address. And the danger is not even & nbsp; in & nbsp; nbsp; nbsp; then on & nbsp; this & nbsp; address; you.
< p > Many users specifically start & nbsp; & laquo; garbage & raquo; boxes for registration on different services. But Apple in & nbsp; peculiar manner offers a more convenient solution.
< p > Function Apple & nbsp; & laquo; hide my mail & raquo; allows you to create unique, random email addresses that are forwarded in & nbsp; your personal mailbox.
< p >This & nbsp; allows you to subscribe to & nbsp; services or mailing, not & nbsp; revealing your real email address, in & nbsp; this way reducing the risk of spam and maintaining privacy.
~ < p > to use the feature & nbsp; & laquo; hide my e-mail & raquo;, perform the following steps:< Ul > < li > go to & nbsp; partition & nbsp; & laquo; settings & raquo; & gt; [Your name] & gt; iCloud.
< li > click on & nbsp; item & nbsp; & laquo; hide my email & raquo;. < li > Click Create a new address and & nbsp; follow the prompts to generate a random email address.
< p > this & nbsp; function is especially useful when working with & nbsp; unfamiliar websites or services, ensuring the confidentiality of your personal email.
~ < H2 ID = "H2_PART1" > Review the reports on the confidentiality of apps
< p >A & nbsp; here is & nbsp; already more serious item.
< P > iOS provides a report on the privacy of applications, in & nbsp; nbsp; which you can learn how & nbsp; nbsp; often access to & nbsp; nbsp; confidential information, such as your location, photos, cameras, microphone and contacts. < P > Regular viewing of this report will help you identify applications that may exceed your authority. After all, you & nbsp; often install new applications, not & nbsp; reading in & nbsp; what permissions they ask for ?
~ > 62 > 62 < p > A later with & Rsquo; clear that & nbsp; some innocent game or cinema application has access to & nbsp; your location & nbsp; etc.
< P > To access to & nbsp; an application privacy report, follow the following steps:
< Ul > < li > Open the settings & gt; Privacy and Security.
< li >Scroll down and click on & nbsp; app privacy report. < li > If this item is still & nbsp; not & nbsp; enabled, click Enable Application Report.
< p > by tracking this report, you & nbsp; nbsp; be able to make reasonable decisions on which applications to trust and appropriately configure their permissions.
~ < H2 ID = "H2_PART1" > Control Bluetooth permits and Wi-Fi < P > Some applications may ask access to & nbsp; Bluetooth or Wi-Fi networks that can be used to determine your location or tracking your actions without your obvious consent. The scheme looks very scripted as if from spy films, but let's not & nbsp; we will dump this & nbsp; danger from & nbsp; accounts.
~ ~ ~ > < P > Restricting app permits on & nbsp; access to & nbsp; Bluetooth and Wi-Fi can increase privacy level.
~ < p > To manage these permits, perform the following steps:
< Ul > < li > go to & nbsp; partition & nbsp; & laquo; settings & raquo; & gt; & laquo; confidentiality and safety & raquo;. < li > Click on & nbsp; Bluetooth and see a list of apps with access. < li > Turn off access for all applications that not & nbsp; Bluetooth is required. < li > return to & nbsp; nbsp; privacy and safety and & nbsp; click on & nbsp; nbsp; item LAN < Li > Review and & nbsp; configure permissions for applications requiring access to & nbsp; local network. ~