{"id":73684,"date":"2018-01-10T10:53:52","date_gmt":"2018-01-10T18:53:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=73684"},"modified":"2025-03-14T12:22:56","modified_gmt":"2025-03-14T19:22:56","slug":"apple-watch-security-and-privacy-tips","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/","title":{"rendered":"Apple Watch Security and Privacy Tips"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46447\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch-Security.jpg\" alt=\"Apple Watch security\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch-Security.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch-Security-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch-Security-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>If you use an Apple Watch, you know that it&#8217;s linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that&#8217;s on your iPhone \u2014 your contacts, calendars, emails, messages, and more. While the way the Apple Watch connects to the iPhone over the air is clever, there is still a possibility that if your watch is lost or stolen someone could access some of your personal data.<\/p>\n<p>In this article, we&#8217;ll cover\u00a0the security and privacy settings that affect the Apple Watch, and also explain how to make sure your data on it stays safe.<\/p>\n<h3 id=\"applewatchandiphonelinkedtogether\">Apple Watch and iPhone, Linked Together<\/h3>\n<p>The Apple Watch requires an iPhone and, until the release of the Series 3 (<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-third-times-the-charm\/\">read our review<\/a>), only worked if connected to the phone. (You could use the Series 2 Apple Watch for some activities, such as workouts, on its own, and you have more functionality as long as it is connected to Wi-Fi.) As such, the two devices are linked, and most security and privacy settings are shared.<\/p>\n<p>With the cellular Apple Watch 3, however, you can use the wrist computer entirely on its own. You can make and receive calls, send and receive text messages, get emails and more. This means that you need to be more careful about protecting your Apple Watch in case it&#8217;s lost or stolen.<\/p>\n<p>The Watch app on the iPhone lets you adjust many of the device&#8217;s settings, and you can access some of these via the Settings app on the watch itself.<\/p>\n<p>One key setting is allowing the iPhone to unlock the Apple Watch; if this is active, unlocking your iPhone makes the Apple Watch available as\u00a0long as it&#8217;s on your wrist. You can adjust this setting in the Passcode settings of the Watch app. If you turn off Unlock with iPhone, you&#8217;ll have to enter a passcode each time you put the watch on.<\/p>\n<p><img class=\"aligncenter size-full wp-image-73690\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app.png\" alt=\"\" width=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app.png 1242w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app-84x150.png 84w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app-169x300.png 169w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app-768x1365.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app-576x1024.png 576w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/watch-app-657x1168.png 657w\" sizes=\"(max-width: 1242px) 100vw, 1242px\" \/><\/p>\n<p>However, you can override this (not\u00a0a good idea) by toggling off Wrist Detection. This setting tells the Apple Watch to lock itself once it detects that it&#8217;s no longer on your wrist. You may want to be able to use your watch on your desk, for example, but this is a bad idea since anyone could access your data.<\/p>\n<p>Note that if you turn off Wrist Detection, you can manually lock the Apple Watch. Swipe up to display Control Center, then scroll until you see the padlock button. Tap it to lock the watch.<\/p>\n<p><img class=\"aligncenter size-full wp-image-73687\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/control-center.png\" alt=\"\" width=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/control-center.png 312w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/control-center-120x150.png 120w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/control-center-240x300.png 240w\" sizes=\"(max-width: 312px) 100vw, 312px\" \/><\/p>\n<h3 id=\"applewatchpasscode\">Apple Watch Passcode<\/h3>\n<p>By default, the Apple Watch asks you to set up a four-digit passcode. In the Passcode settings, you can turn off the Simple Passcode option, and then enter a passcode as long as you want. If you generally use your iPhone to unlock your Apple Watch, you could have a very long passcode to protect the watch. (This means you need a good passcode on the iPhone, of course; you can learn about passcode strategy in episode 6 of the Intego Mac Podcast, <a href=\"https:\/\/podcast.intego.com\/6\" target=\"_blank\" rel=\"noopener\">Passwords are Hard<\/a>.) You could turn off the passcode entirely, but that&#8217;s a very bad idea because\u00a0it would also prevent you from using ApplePay.<\/p>\n<p>As with the iPhone, there&#8217;s a self-destruct setting that tells the Apple Watch to erase its data after ten\u00a0failed passcode attempts \u2014 it&#8217;s a good idea to turn this on. Anyone who finds the watch,\u00a0but\u00a0fails to guess the passcode after ten tries, will never get at your data. If you leave this off, they could keep trying until they break in.<\/p>\n<p>While your Apple Watch contains less data than your iPhone, it still could allow people to get some sensitive information. These few settings help ensure that your watch is secure, and that no one can get at your data.<\/p>\n<p><strong><em>Have something to say about this story? Share your comments below!<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you use an Apple Watch, you know that it&#8217;s linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that&#8217;s on your iPhone \u2014 your contacts, calendars, emails, messages, and more. While the way the Apple Watch connects to the iPhone over the air is clever, there [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":46450,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[2197],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If you use an Apple Watch, you know that it&#039;s linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that&#039;s on your iPhone \u2014\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Watch Security and Privacy Tips - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If you use an Apple Watch, you know that it&#039;s linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that&#039;s on your iPhone \u2014\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-10T18:53:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-14T19:22:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Watch Security Tips\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/\",\"name\":\"Apple Watch Security and Privacy Tips - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#primaryimage\"},\"datePublished\":\"2018-01-10T18:53:52+00:00\",\"dateModified\":\"2025-03-14T19:22:56+00:00\",\"description\":\"If you use an Apple Watch, you know that it's linked to your iPhone\\u00a0(at least most of the time). It has access to much of the data that's on your iPhone \\u2014\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Watch Security and Privacy Tips\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Apple Watch Security and Privacy Tips\",\"datePublished\":\"2018-01-10T18:53:52+00:00\",\"dateModified\":\"2025-03-14T19:22:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#webpage\"},\"wordCount\":644,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg\",\"keywords\":[\"Apple Watch\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If you use an Apple Watch, you know that it's linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that's on your iPhone \u2014","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/","og_locale":"en_US","og_type":"article","og_title":"Apple Watch Security and Privacy Tips - The Mac Security Blog","og_description":"If you use an Apple Watch, you know that it's linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that's on your iPhone \u2014","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-01-10T18:53:52+00:00","article_modified_time":"2025-03-14T19:22:56+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg","width":400,"height":260,"caption":"Apple Watch Security Tips"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/","name":"Apple Watch Security and Privacy Tips - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#primaryimage"},"datePublished":"2018-01-10T18:53:52+00:00","dateModified":"2025-03-14T19:22:56+00:00","description":"If you use an Apple Watch, you know that it's linked to your iPhone\u00a0(at least most of the time). It has access to much of the data that's on your iPhone \u2014","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Watch Security and Privacy Tips"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Apple Watch Security and Privacy Tips","datePublished":"2018-01-10T18:53:52+00:00","dateModified":"2025-03-14T19:22:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#webpage"},"wordCount":644,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg","keywords":["Apple Watch"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-watch-security-and-privacy-tips\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/Apple-Watch2-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jas","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73684"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=73684"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73684\/revisions"}],"predecessor-version":[{"id":103483,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73684\/revisions\/103483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/46450"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=73684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=73684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=73684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}