Convinced by the adage “To live happily, let's live hidden”? Let's see how to put it into practice.
When we talk about the security/confidentiality of our “mobiles”, we're really talking about the operating system that runs them. 75% run on Android (based on Google-sponsored Linux under open-source license), the remaining 25% mainly on iOS (based on Unix under Apple's proprietary license). While it is often preferable to turn to open-source solutions, as this guarantees that the code is audited and that there are no “backdoors”, the following points should be borne in mind when it comes to operating systems:
For these reasons, iOS is more secure than Android and less prone to attack. It is also more respectful of privacy (up to a point of course). A study by Douglas C. Schmidt, professor of computer science at Vanderbilt University in the USA, shows, for example, that an idle Android smartphone communicates with Google 10 times more than an iPhone communicates with Apple servers, or that an Android smartphone running Chrome sends 50 times more data collection requests than an iOS smartphone running Safari. Although already more discreet than Android, iOS allows you to go one step further by further restricting the amount of data collected and transmitted.
=> Below are some suggested settings to limit iOS data collection and make it more secure. But be aware that the “wow” factor, the practicality generated by your smartphone's features, is often in direct opposition to the concepts of privacy and security.
Settings/Face ID and Passcode/Change Passcode/Code options
Settings/Face Id and Passcode/Allow access when locked
Settings/Face ID and code/Erase data
Settings/iCloud/ICloud Backup
Settings/General/Software Updates/Automatic Updates
Settings/Apps/Passwords/View AutoFill Settings/Autofill Passwords and Passkeys & AutoFill From
Since iOS 16 (early 2023), Apple finally offers to make virtually all your iCloud data confidential.
Settings/iCloud/Advanced Data Protection
.
This is also essential if you want your iCloud private keys to be stored on your device and not at Apple.Main types of data. | STANDARD Protection | ADVANCED Data Protection E2EE |
---|---|---|
iCloud Mail | [No] | [No] |
Contacts | [No] | [No] |
Calendars | [No] | [No] |
iCloud Backup | [No] | [Yes] |
iCloud Drive | [No] | [Yes] |
Photos | [No] | [Yes] |
Wallet passes | [No] | [Yes] |
Passwords and keychain | [Yes] | [Yes] |
Messages in iCloud | [Yes] | [Yes] |
Apple Card transactions | [Yes] | [Yes] |
Health/Home | [Yes] | [Yes] |
Settings/iCloud/Access iCloud data on the Web
.Settings/iCloud/Private relay
otherwise use a VPN (Proton VPN).Settings/iCloud/Hide my email address
.Settings/Siri/Detect “Dis Siri
(But if you deactivate it entirely, you'll no longer have access to the CarPlay feature, which is so handy in the car).Now go to Settings/Privacy and Security.
“Suggestions & Search”
- “Significant locations”
- “PRODUCT IMPROVEMENT”
in the “System services”
.“Allow Apps to Request to Track”
in “Tracking”
.“INCLUDE SUGGESTIONS FROM”
in “Journaling Suggestions”
.“Safety Check”
.`Analytics and improvements"
.TRANSPARENCY LOGS “App Privacy Report”
to find out more, and find that many apps send data to ... Google!With all these changes, we've already taken a big step in restricting Apple's intrusion into our digital lives. (Sorry, let me rephrase: in the degradation of the user experience 😊). But if these settings have to do with the general operation of the iPhone, we now have to deal with the behavior of the main apps we use on a daily basis, and which also know a lot about us. If only they would record and transmit data without warning...
To give you an idea of the confidentiality of some of the best-known applications on the market, you'll find below a fine example of the data collected by Gmail compared with Tuta Mail. It's only declarative on the Apple app store, but it gives a small idea of the subject (for more exhaustiveness consult the famous “App Privacy Report”
mentioned above).
SAFARI Browser
This browser is historically the one supplied by default with iOS. However, since the DMA (Digital Markets Act) imposed by the European Community, things have changed a little. Apple has been forced to open up its system since March 2024 on versions after iOS 17.3 in order to comply. So you can now set a default browser other than Safari. To do so => Settings/Desired browser app/Default browser app
.
Except on iOS startup after a system update, when a dozen browsers are offered, you'll need to have the chosen browser already installed to be able to set it as default. If you want to switch to Tor, DuckDuckGo or Startpage, that's fine, because you'll be taking a big step towards privacy. If you want to switch to another browser, think twice...
Note that Safari is not necessarily the worst choice:
There are, however, a number of adjustments you can make to limit potential risks:
Settings/Apps/Safari/General
.Settings/Apps/Safari/Privacy & Security
.Settings/Apps/Safari/Privacy & Security
menuSettings/Apps/Safari/Confidentiality & Security
.Generally speaking, disabling “Suggest app” and “Learn from this app” restricts systematic data collection.
Search engine It is set up in 'Settings/Apps/Safari/Search engine' and iOS only natively offers 5 of them:
In this field, Google remains for many a benchmark in terms of search efficiency. However, when you consider its indirect price (see data collection above), it's clear that it should be avoided. If you've made this choice, which has unfortunate consequences for your personal data, I'll leave you to find out how to deactivate all the associated trackers... If you'd like to use more respectful trackers that collect neither your IP address nor your personal data:
DuckDuckGo was founded in 2008 by Gabriel Weinberg. This American search engine uses the search results of Bing, does not collect any personally identifiable data or IP addresses.
Startpage was launched on July 7, 2009 and was previously known as Ixquick. This Dutch engine, which uses search results from Google behind a proxy (Anonymous Mode), deletes IP addresses, various tracking cookies and personal data.
Important note: although these engines don't collect data when you search, they can't prevent your data from being collected when you click on the sites in question. To compensate for this weakness, Startpage goes one step further and offers to connect to sites in “Anonymous View”. The connection is established behind a proxy.
MAIL application
As we saw above, E2EE encryption is not available for SMTP/IMAP e-mail applications, nor for the Contacts/Calendars associated with them. You should therefore avoid using MAIL, preferring a third-party application (e.g. Tuta Mail).
If you still resist, there's a setting to hide your IP address and load remote content in the background (to avoid spy pixels) => Settings/Apps/Mail/Privacy Protection
.
Spy pixels are trackers that enable advertisers to draw up marketing profiles based on information gathered when you open their e-mail: this lets them know that you've opened it, for how long, from what type of hardware and software platform, etc...
There's also the option of using the DuckDuckGo Email service, which will forward emails received on the address created as “@duck.com” to your regular email after cleaning them of any trackers present in the images or links included. It is also possible to reply to an email received from this @duck.com email address. There's also a “Generate a private Duck address” feature in their application, which, like Apple's “Hide my e-mail address”, lets you create random addresses to be used when filling in forms on the net.
With regard to the general use of e-mail applications, it's worth remembering that it's strictly forbidden to click on a link received by e-mail, as this is the main vector for Phishing attacks. If you need to connect to a site and identify yourself, use the password manager to make sure you land on the genuine site.
Other applications Confidentiality means prohibiting (or at least limiting) the data collected that can be used to link our browsing to our real identity. We've seen that the right privacy settings, coupled with the use of iCloud+ “Private Relay”, can achieve this objective when browsing the Web with Safari (or by using Startpage in Proxy mode). But this is not the case at this stage when using your many applications! For this there is only one way to prevent you from being tracked using your IP adress => use a VPN (Virtual Private Network)..
Basically, for us private individuals, each of our connected terminals is identified by an IP address for Internet Protocol. This IP address is of the type “---.---.---.---”. All connected terminals have an IP address. It's local and private, like 192.168.1.0/254 up to your router (the famous “Box”). The router itself has a public IP address, which may look like xx9.7.105.24 in IPv4 format (4 integers separated by a dot) or “xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx” in IPv6 format. The IPv4 format is destined to disappear, as its format (32 bits) only allows the allocation of 232 or 4,294,967,296 IP addresses. The last address was allocated in Europe in 2019. Since 2017, it has been replaced by 128-bit IPv6 addresses such as “20xx:db8:0:85a3:0:0:ac1f:8001”, which allows 2128 or billions of billions of billions of billions of possibilities (340 sextillons), so we can rest easy...
Connecting to a site means creating a link, a route, between your terminal, identified by its IP, and the site you're visiting. Fortunately, you don't need to know the IP of every site on the Net. A directory of this type does exist, but to use it as it is would take us back to the bygone days of postal directories... This directory, this database, is called DNS for Domain Name Service, and is responsible for translating each domain name into an IP address.
When you visit a website, your request is handled by your ISP (Internet Service Provider), which routes it to the Internet, i.e. to the servers that will connect you to the site you're looking for.
The problem is that traffic between your terminal and the router is not encrypted: encryption only takes place beyond the router, by activating TLS (Transport Layer Security) => so your ISP is able to track all your activity.
This is where the VPN provider comes in, like Zorro. It places a server between your terminal and the router. This server will retrieve your request, encrypt it and transmit it to the router with a new IP address.
Result:
1- => your ISP only sees encrypted traffic.
2- => the site you are visiting is no longer able to identify you since it is a new IP assigned by the VPN that is now displayed.
If surfing the Web without a firewall exposes us to the curiosity of computer servers in our path, let's not forget that the applications we download and often use instead of our browsers are (for many) guilty of the same indiscretions...
Consequences to be drawn:
But by the way, are you aware of the type of data that your IP reveals about you? Discover below some of the elements that an IP data provider is able to provide from this identifier. And everything goes...
{
"ip": "185.195.71.215",
"hostname": "185.195.71.215",
"continent_code": "EU",
"continent_name": "Europe",
"country_code2": "CH",
"country_code3": "CHE",
"country_name": "Switzerland",
"country_name_official": "Swiss Confederation",
"country_capital": "Bern",
"state_prov": "Zurich",
"state_code": "CH-ZH",
"district": "Zurich",
"city": "Zurich",
"zipcode": "8001",
"latitude": "47.37700",
"longitude": "8.53977",
"is_eu": false,
"calling_code": "+41",
"country_tld": ".ch",
"languages": "de-CH,fr-CH,it-CH,rm",
"country_flag": "https://ipgeolocation.io/static/flags/ch_64.png",
"geoname_id": "6530239",
"isp": "Datasource AG",
"connection_type": "",
"organization": "Datasource AG",
"country_emoji": "🇨🇭",
"asn": "AS56803",
"currency": {
"code": "CHF",
"name": "Swiss Franc",
"symbol": "CHF"<
},
"time_zone": {
"name": "Europe/Zurich",
"offset": 1,
"offset_with_dst": 1,
"current_time": "2024-11-24 10:13:10.928+0100",
"current_time_unix": 1732439590.928,
"is_dst": false,
"dst_savings": 0,
"dst_exists": true,
"dst_start": {
"utc_time": "2024-03-31 TIME 01",
"duration": "+1H",
"gap": true,
"dateTimeAfter": "2024-03-31 TIME 03",
"dateTimeBefore": "2024-03-31 TIME 02",
"overlap": false<
},
"dst_end": {
"utc_time": "2024-10-27 TIME 01",
"duration": "-1H",
"gap": false,
"dateTimeAfter": "2024-10-27 TIME 02",
"dateTimeBefore": "2024-10-27 TIME 03",
"overlap": true<
}
"security": {
"threat_score": 75,
"is_tor": false,
"is_proxy": true,
"proxy_type": "VPN",
"is_anonymous": true,
"is_known_attacker": true,
"is_spam": false,
"is_bot": false,
"is_cloud_provider": false
},
"user_agent": {
"userAgentString": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/18.1 Safari/605.1.15",
"name": "Safari",
"type": "Browser",
"version": "18.1",
"versionMajor": "18",
"build": "Unknown",
"device": {
"name": "Apple Macintosh",
"type": "Desktop",
"brand": "Apple",
"cpu": "Intel"
},
"engine": {
"name": "AppleWebKit",
"type": "Browser",
"version": "605.1.15",
"versionMajor": "605",
"build": "Unknown"
},
"operatingSystem": {
"name": "Mac OS",
"type": "Desktop",
"version": ">=10.15.7",
"versionMajor": ">=10.15",
"build": "??"
}
The information you reveal with this IP address allows internet players to know a lot about you without telling you:
The use made of it can be: