{"id":32959,"date":"2014-10-22T13:19:54","date_gmt":"2014-10-22T20:19:54","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=32959"},"modified":"2015-03-16T09:24:23","modified_gmt":"2015-03-16T16:24:23","slug":"spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/","title":{"rendered":"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33016\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-600x300.jpeg\" alt=\"spotlight-600x300\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\nThe simple truth is, if you put the words &#8220;Apple&#8221; and &#8220;privacy&#8221; together, you&#8217;re going to make headlines.<\/p>\n<p>So it was no surprise to me when an enormous kerfuffle kicked off over the weekend about concerns that the latest version of Apple&#8217;s OS X operating system, Yosemite, was sending precise details of users&#8217; locations and their search terms back to Apple.<\/p>\n<blockquote class=\"twitter-tweet\" width=\"500\">\n<p>Yosemite Spotlight&#39;s default sending of precise location and search terms is probably the worst example of &#39;privacy by design&#39; I&#39;ve seen yet<\/p>\n<p>&mdash; ashkan soltani (@ashk4n) <a href=\"https:\/\/twitter.com\/ashk4n\/status\/524188154941931520\">October 20, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Although OS X Yosemite <a title=\"OS X Yosemite 10.10 Patches POODLE, Shellshock Vulnerabilities\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-10-10-patches-poodle-shellshock-vulnerabilities\/\" target=\"_blank\">patches numerous security holes<\/a> (including the Shellshock and POODLE vulnerabilities), could this be the sting in the tale?<\/p>\n<p>What has happened here is that Yosemite has a revamped version of Spotlight, which now can serve up suggestions from the Internet.<\/p>\n<p>Of course, to do that, it has to share information with the internet first. And that information may not just be shared with Apple itself, but also third party providers such as Microsoft&#8217;s search engine Bing.<\/p>\n<p>Apple was clearly aware that this might concern some users, and created a <a title=\"Link to Apple webpage\" href=\"http:\/\/www.apple.com\/privacy\/privacy-built-in\/\" target=\"_blank\" rel=\"nofollow\">&#8220;privacy-built-in&#8221; webpage<\/a> where it describes how different features in OS X Yosemite work in regards to securing sensitive information:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32968\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy.jpeg\" alt=\"Apple talks Spotlight privacy\" width=\"600\" height=\"368\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy-150x92.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy-300x184.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<blockquote><p><strong>Spotlight Suggestions<\/strong><\/p>\n<p>With iOS 8 and OS X Yosemite, searching with Spotlight now goes beyond your device to give you suggestions from sources like Wikipedia, the iTunes Store, and Maps. Before it answers, Spotlight considers things like context and location while protecting your privacy by using an anonymous identifier that refreshes every 15 minutes. You can always opt out of Suggestions and continue to use Spotlight solely for local search on your device. You are also free to opt out of having Spotlight use Location Services any time you want. If you opt out, Spotlight will still use your IP address to determine a general location to make your searches more relevant. Unlike our competitors, we don\u2019t use a persistent personal identifier to tie your searches to you in order to build a profile based on your search history. We also place restrictions on our partners so they don\u2019t create a long-term trail of identifiable searches by you or from your device.<\/p><\/blockquote>\n<p>Although some might have preferred if Apple hadn&#8217;t enabled these potentially privacy-eroding features by default in the first place, it&#8217;s clear what message the company is pushing: If you don&#8217;t like the feature &#8211; turn it off.<\/p>\n<p>Here&#8217;s how to disable the functionality in OS X Yosemite.<\/p>\n<p>Open <strong>System Preferences<\/strong> and choose <strong>Spotlight<\/strong>. Now untick <strong>Spotlight Suggestions<\/strong>, <strong>Bing web searches<\/strong> and anything else that doesn&#8217;t suit you. In the example below I have also disabled searching of <strong>Mail &amp; Messages<\/strong> &#8211; but that&#8217;s just a personal preference.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32962\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-yosemite.jpeg\" alt=\"Spotlight preferences\" width=\"600\" height=\"537\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-yosemite.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-yosemite-150x134.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-yosemite-300x268.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>To its credit, Apple can hardly be accused of hiding sweeping details of what it is doing under the carpet.<\/p>\n<p>On that very dialog above there&#8217;s a link, called &#8220;About Spotlight Suggestions and Privacy.&#8221; Clicking it returns the following advisory:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32974\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy-statement.jpeg\" alt=\"Spotlight privacy statement\" width=\"600\" height=\"534\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy-statement.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy-statement-150x133.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-privacy-statement-300x267.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<blockquote><p>When you use Spotlight, your search queries, the Spotlight Suggestions you select, and related usage data will be sent to Apple. Search results found on your Mac will not be sent. If you have Location Services on your Mac turned on, when you make a search query to Spotlight the location of your Mac at that time will be sent to Apple. Searches for common words and phrases will be forwarded from Apple to Microsoft&#8217;s Bing search engine. These searches are not stored by Microsoft. Location, search queries, and usage information sent to Apple will be used by Apple only to make Spotlight Suggestions more relevant and to improve other Apple products and services.<\/p>\n<p>If you do not want your Spotlight search queries and Spotlight Suggestions usage data sent to Apple, you can turn off Spotlight Suggestions. Simply deselect the checkboxes for both Spotlight Suggestions and Bing Web Searches in the Search Results tab in the Spotlight preference pane found within System Preferences on your Mac. If you turn off Spotlight Suggestions and Bing Web Searches, Spotlight will search the contents of only your Mac.<\/p><\/blockquote>\n<p>Now, before you relax and pat yourself on the back, you&#8217;re not quite done.<\/p>\n<p>You have stopped Spotlight from sharing your search queries, but you haven&#8217;t stopped OS X&#8217;s default browser from doing the same trick.<\/p>\n<p>To stop Safari sharing the same information, you have to go to *another* place: <strong>Safari &gt; Preferences &gt; Search<\/strong> and disable <strong>Include Spotlight Suggestions<\/strong>.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32989\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/safari-settings.jpeg\" alt=\"Safari settings\" width=\"600\" height=\"231\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/safari-settings.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/safari-settings-150x57.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/safari-settings-300x115.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>So, what if you are an iPhone or iPad owner?<\/p>\n<p>Well, it&#8217;s a similar process. Simply go to <strong>Settings &gt; General &gt; Spotlight Search<\/strong> and disable <strong>Spotlight Suggestions<\/strong>, <strong>Bing Web Results<\/strong>, or anything else that you don&#8217;t want or need.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32965\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-ios.jpeg\" alt=\"Spotlight preferences on iOS\" width=\"250\" height=\"444\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-ios.jpeg 250w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-ios-84x150.jpeg 84w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><\/p>\n<p>Think you&#8217;re all done? Well, maybe you&#8217;re not.<\/p>\n<p>Although what you type into Spotlight may no longer be leaving your computer, there might be other information which is leaking out.<\/p>\n<p>For instance, how comfortable are you with sharing your physical location with different apps? Do you even know which apps are receiving details of where you are?<\/p>\n<p>A quick visit into OS X Yosemite&#8217;s <strong>System Preferences<\/strong> can reveal all. This time, instead of changing Spotlight&#8217;s preferences, you need to click on <strong>Security &amp; Privacy<\/strong> and choose the <strong>Privacy<\/strong> tab.<\/p>\n<p>Once there you can choose <strong>Location Services<\/strong> and view whether they are enabled and, if so, which apps can access your location.<\/p>\n<p>In the example below, you can see that the Weather and Maps applications are allowed to know my location, but I have declined to share such details with Evernote or the Reminders app.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32971\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/location-yosemite.jpeg\" alt=\"Location privacy on Yosemite\" width=\"600\" height=\"489\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/location-yosemite.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/location-yosemite-150x122.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/location-yosemite-300x244.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>To make changes to these settings, you may need to unlock the padlock by entering an administrator password.<\/p>\n<p>By the way, you will find the iOS-equivalent to these settings under <strong>Settings &gt; Privacy &gt; Location Services<\/strong>. It&#8217;s well worth checking out which iPhone and iPad apps you are running that are accessing your location, as it&#8217;s much more common for mobile apps to request such information.<\/p>\n<p><strong>Would you have preferred Apple to have not turned on these features in Spotlight by default? Would it have been better if Apple had sold you the benefits of enabling the features, and invited you to turn them on, rather than leave it to you to retrospectively turn them off?<\/strong><\/p>\n<p>Leave a comment below and have your say.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The simple truth is, if you put the words &#8220;Apple&#8221; and &#8220;privacy&#8221; together, you&#8217;re going to make headlines. So it was no surprise to me when an enormous kerfuffle kicked off over the weekend about concerns that the latest version of Apple&#8217;s OS X operating system, Yosemite, was sending precise details of users&#8217; locations and [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":33013,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,151,13],"tags":[69,168,1435,1561,106,285,1570],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The simple truth is, if you put the words &quot;Apple&quot; and &quot;privacy&quot; together, you&#039;re going to make headlines. So it was no surprise to me when an enormous\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The simple truth is, if you put the words &quot;Apple&quot; and &quot;privacy&quot; together, you&#039;re going to make headlines. So it was no surprise to me when an enormous\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-22T20:19:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-16T16:24:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/\",\"name\":\"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#primaryimage\"},\"datePublished\":\"2014-10-22T20:19:54+00:00\",\"dateModified\":\"2015-03-16T16:24:23+00:00\",\"description\":\"The simple truth is, if you put the words \\\"Apple\\\" and \\\"privacy\\\" together, you're going to make headlines. So it was no surprise to me when an enormous\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?\",\"datePublished\":\"2014-10-22T20:19:54+00:00\",\"dateModified\":\"2015-03-16T16:24:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#webpage\"},\"wordCount\":1033,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg\",\"keywords\":[\"iOS\",\"OS X\",\"OS X Yosemite\",\"OS X Yosemite\",\"Privacy\",\"Spotlight\",\"Spotlight Suggestions\"],\"articleSection\":[\"Apple\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The simple truth is, if you put the words \"Apple\" and \"privacy\" together, you're going to make headlines. So it was no surprise to me when an enormous","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/","og_locale":"en_US","og_type":"article","og_title":"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private? - The Mac Security Blog","og_description":"The simple truth is, if you put the words \"Apple\" and \"privacy\" together, you're going to make headlines. So it was no surprise to me when an enormous","og_url":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-10-22T20:19:54+00:00","article_modified_time":"2015-03-16T16:24:23+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/","name":"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#primaryimage"},"datePublished":"2014-10-22T20:19:54+00:00","dateModified":"2015-03-16T16:24:23+00:00","description":"The simple truth is, if you put the words \"Apple\" and \"privacy\" together, you're going to make headlines. So it was no surprise to me when an enormous","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?","datePublished":"2014-10-22T20:19:54+00:00","dateModified":"2015-03-16T16:24:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#webpage"},"wordCount":1033,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg","keywords":["iOS","OS X","OS X Yosemite","OS X Yosemite","Privacy","Spotlight","Spotlight Suggestions"],"articleSection":["Apple","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/spotlight-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8zB","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32959"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=32959"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32959\/revisions"}],"predecessor-version":[{"id":33097,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32959\/revisions\/33097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/33013"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=32959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=32959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=32959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}