{"id":92002,"date":"2020-08-14T07:49:04","date_gmt":"2020-08-14T14:49:04","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92002"},"modified":"2020-08-26T13:38:30","modified_gmt":"2020-08-26T20:38:30","slug":"an-amazon-alexa-abomination-intego-mac-podcast-episode-148","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/","title":{"rendered":"An Amazon Alexa Abomination &#8211; Intego Mac Podcast Episode 148"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+XmDP18Md?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn&#8217;t as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure, if done properly.<\/p>\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT210393#1361\" target=\"_blank\" rel=\"noopener noreferrer\">Apple releases iOS 13.6.1<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/DL2049\" target=\"_blank\" rel=\"noopener noreferrer\">Apple releases macOS Catalina 10.15.6 Supplemental Update<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2009\/09\/accounting-rules-change-could-end-ipod-touch-update-fee\/\" target=\"_blank\" rel=\"noopener noreferrer\">Accounting rules change could end iPod touch update fee<\/a><\/li>\n<li><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-08-13\/apple-readies-apple-one-subscription-bundles-to-boost-services\" target=\"_blank\" rel=\"noopener noreferrer\">Apple Readies \u2018Apple One\u2019 Subscription Bundles to Boost Services<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2020\/8\/7\/21359191\/password-breach-have-i-been-pwned-open-source-troy-hunt\" target=\"_blank\" rel=\"noopener noreferrer\">Have I Been Pwned is going open source (eventually)<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malicious party hijacks 24% of Tor network<\/a><\/li>\n<li><a href=\"https:\/\/research.checkpoint.com\/2020\/amazons-alexa-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon\u2019s Alexa<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-send-files-securely\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Send Files Securely<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts, or wherever you listen.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn&#8217;t as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[4009,4000,3715,3313],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn&#039;t as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Amazon Alexa Abomination - Intego Mac Podcast Episode 148 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn&#039;t as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-14T14:49:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-26T20:38:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/\",\"name\":\"An Amazon Alexa Abomination - Intego Mac Podcast Episode 148 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#primaryimage\"},\"datePublished\":\"2020-08-14T14:49:04+00:00\",\"dateModified\":\"2020-08-26T20:38:30+00:00\",\"description\":\"Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn't as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An Amazon Alexa Abomination &#8211; Intego Mac Podcast Episode 148\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"An Amazon Alexa Abomination &#8211; Intego Mac Podcast Episode 148\",\"datePublished\":\"2020-08-14T14:49:04+00:00\",\"dateModified\":\"2020-08-26T20:38:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#webpage\"},\"wordCount\":217,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Alexa\",\"Amazon Echo\",\"Intego Mac Podcast\",\"Internet of Things (IoT)\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn't as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/","og_locale":"en_US","og_type":"article","og_title":"An Amazon Alexa Abomination - Intego Mac Podcast Episode 148 - The Mac Security Blog","og_description":"Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn't as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-08-14T14:49:04+00:00","article_modified_time":"2020-08-26T20:38:30+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/","name":"An Amazon Alexa Abomination - Intego Mac Podcast Episode 148 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#primaryimage"},"datePublished":"2020-08-14T14:49:04+00:00","dateModified":"2020-08-26T20:38:30+00:00","description":"Apple is planning on offering a bundle of services called Apple One, and we discuss how useful it might be. We mention new iOS and macOS updates, talk about the Have I Been Pwned website going open source, look into an Amazon Alexa abomination, and explain why Tor isn't as safe as you might have thought. We then take a look at the many ways you can send files securely to someone; and explain how sending files by email can be secure.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"An Amazon Alexa Abomination &#8211; Intego Mac Podcast Episode 148"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"An Amazon Alexa Abomination &#8211; Intego Mac Podcast Episode 148","datePublished":"2020-08-14T14:49:04+00:00","dateModified":"2020-08-26T20:38:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#webpage"},"wordCount":217,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Alexa","Amazon Echo","Intego Mac Podcast","Internet of Things (IoT)"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/an-amazon-alexa-abomination-intego-mac-podcast-episode-148\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nVU","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92002"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92002"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92002\/revisions"}],"predecessor-version":[{"id":92009,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92002\/revisions\/92009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}