< img src = "/uploads/blogs/30/56/ib-f-f-f-fcq8nef68_2a6bbbb1cb.jpg" Alt = "top 5 ways to prevent iPhone to keep track of you"/> ~ ~ < p > Although Apple loudly states that cares about the privacy < p > Fortunately, all this is easy to fix.

< P > In addition to the well -known confidentiality settings, there are some less known that can additionally protect your personal information.

< p > on & nbsp; that to take all these actions in & nbsp; you will take no more than a few minutes.

< p > Make sure in & nbsp; this yourself.

< H2 ID = "H2_PART1" > turn off & nbsp; & laquo; extended visual search & raquo; in & nbsp; photographs

< p >From & nbsp; output iOS 18 Apple presented a feature & nbsp; & & laquo; improved visual search & raquo;, designed to improve search for & nbsp; photos by comparing them with & Apple.

< P > Although it is & nbsp; nbsp; it can make images, nbsp; nbsp; also means that & nbsp; your photos and & nbsp; spo & rsquo; rsquo; < P > Privacy defenders express concern with & nbsp; a reason for the possible disclosure of confidential information for & nbsp; help. It is difficult to imagine that Apple to transmit your photos to someone, but the company, for example, can teach artificial intelligence on them.

< p > possibly you & nbsp; not & nbsp; but many such idea is not & nbsp; nbsp; nbsp; nbsp; nbsp.

~ < p > to disable & nbsp; & laquo; extended visual search & raquo;, perform the following steps:

~ ~ < Ul > < li >Open the app & nbsp; & laquo; settings & raquo; on & nbsp; iPhone. < li > scroll down and click on & nbsp; & laquo; photo & raquo;. ~ < li > Find item & nbsp; & laquo; extended visual search & raquo; and turn it off.

< p > Disable it & nbsp; settings, you & nbsp; nbsp; retain control of data of your photos so they are not & nbsp; analyzed automatically and not & nbsp; transmitted without your consent.

~ < H2 ID = "H2_PART1" > Turn on the lock mode to increase safety

< p > Lock mode that with & Rsquo; appeared a few years ago in & nbsp; iOS 16, offers an extreme level of safety for users who can be complex cyberattacks.

< p >During its activation, some functions are limited to reduce potential vulnerability, such as most of the messages are blocked, sophisticated web technologies are switched off, incoming invitations and & nbsp; nbsp; nbsp; nbsp; service.

are restricted < P > To enable lock mode, perform the following steps:

< Ul > < li > go to & nbsp; partition & nbsp; & laquo; settings & raquo; & gt; & laquo; confidentiality and safety & raquo;. < li > Scroll page in & nbsp; very bottom and click on & nbsp; lock mode. < Li > Click Enable lock mode and & nbsp; then click on and & nbsp; restart.

< P > Although this mode limits some of the device capabilities, it greatly enhances protection against potential-spy programs and hacking attempts.

< p > Of course, use it constantly, most likely, pointless and not & nbsp; very convenient. But in & nbsp; certain moments he will be able to reassure your nerves.

< H2 ID = "H2_PART1" >Use the feature & nbsp; & laquo; hide my mail & raquo; To protect your personality

< P > After all you & nbsp; often encountered with & nbsp; by the fact that when registering on & nbsp; some service, you require email address. And the danger is not even & nbsp; in & nbsp; nbsp; nbsp; then on & nbsp; this & nbsp; address; you.

< p > Many users specifically start & nbsp; & laquo; garbage & raquo; boxes for registration on different services. But Apple in & nbsp; peculiar manner offers a more convenient solution.

< p > Function Apple & nbsp; & laquo; hide my mail & raquo; allows you to create unique, random email addresses that are forwarded in & nbsp; your personal mailbox.

< p >This & nbsp; allows you to subscribe to & nbsp; services or mailing, not & nbsp; revealing your real email address, in & nbsp; this way reducing the risk of spam and maintaining privacy.

~ < p > to use the feature & nbsp; & laquo; hide my e-mail & raquo;, perform the following steps:

< Ul > < li > go to & nbsp; partition & nbsp; & laquo; settings & raquo; & gt; [Your name] & gt; iCloud.

< li > click on & nbsp; item & nbsp; & laquo; hide my email & raquo;. < li > Click Create a new address and & nbsp; follow the prompts to generate a random email address.

< p > this & nbsp; function is especially useful when working with & nbsp; unfamiliar websites or services, ensuring the confidentiality of your personal email.

~ < H2 ID = "H2_PART1" > Review the reports on the confidentiality of apps

< p >A & nbsp; here is & nbsp; already more serious item.

< P > iOS provides a report on the privacy of applications, in & nbsp; nbsp; which you can learn how & nbsp; nbsp; often access to & nbsp; nbsp; confidential information, such as your location, photos, cameras, microphone and contacts. < P > Regular viewing of this report will help you identify applications that may exceed your authority. After all, you & nbsp; often install new applications, not & nbsp; reading in & nbsp; what permissions they ask for ?

~ > 62 > 62 < p > A later with & Rsquo; clear that & nbsp; some innocent game or cinema application has access to & nbsp; your location & nbsp; etc.

< P > To access to & nbsp; an application privacy report, follow the following steps:

< Ul > < li > Open the settings & gt; Privacy and Security.

< li >Scroll down and click on & nbsp; app privacy report. < li > If this item is still & nbsp; not & nbsp; enabled, click Enable Application Report.

< p > by tracking this report, you & nbsp; nbsp; be able to make reasonable decisions on which applications to trust and appropriately configure their permissions.

~ < H2 ID = "H2_PART1" > Control Bluetooth permits and Wi-Fi < P > Some applications may ask access to & nbsp; Bluetooth or Wi-Fi networks that can be used to determine your location or tracking your actions without your obvious consent. The scheme looks very scripted as if from spy films, but let's not & nbsp; we will dump this & nbsp; danger from & nbsp; accounts.

~ ~ ~ > < P > Restricting app permits on & nbsp; access to & nbsp; Bluetooth and Wi-Fi can increase privacy level.

~ < p > To manage these permits, perform the following steps:

< Ul > < li > go to & nbsp; partition & nbsp; & laquo; settings & raquo; & gt; & laquo; confidentiality and safety & raquo;. < li > Click on & nbsp; Bluetooth and see a list of apps with access. < li > Turn off access for all applications that not & nbsp; Bluetooth is required. < li > return to & nbsp; nbsp; privacy and safety and & nbsp; click on & nbsp; nbsp; item LAN < Li > Review and & nbsp; configure permissions for applications requiring access to & nbsp; local network. ~

Natasha Kumar

By Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116