	{"id":93884,"date":"2021-05-20T02:20:53","date_gmt":"2021-05-20T09:20:53","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=93884"},"modified":"2021-05-20T02:20:53","modified_gmt":"2021-05-20T09:20:53","slug":"how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/","title":{"rendered":"How Much Abuse Can Apple&#8217;s AirTags Take? &#8211; Intego Mac Podcast Episode 188"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+rmU8Hm7f?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there&#8217;s news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit. <\/p>\n<ul>\n<li><a href=\"https:\/\/www.apple.com\/newsroom\/2021\/05\/app-store-stopped-over-1-5-billion-in-suspect-transactions-in-2020\/\" target=\"_blank\" rel=\"noopener\">App Store stopped over $1.5 billion in suspect transactions in 2020<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/xcodeghost-malware-infected-100-million-ios-users-and-apple-said-nothing\/\" target=\"_blank\" rel=\"noopener\">XcodeGhost Malware Infected 100+ Million iOS Users and Apple Said Nothing<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/apple-prevented-1-million-risky-or-vulnerable-apps-from-entering-app-store-in-2020\/\" target=\"_blank\" rel=\"noopener\">Apple prevented 1 million risky\/vulnerable apps from entering App Store in 2020<\/a><\/li>\n<li><a href=\"https:\/\/www.nytimes.com\/2021\/05\/17\/technology\/apple-china-censorship-data.html\" target=\"_blank\" rel=\"noopener\">Inside Apple\u2019s Compromises in China: A Times Investigation<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/05\/12\/find-my-network-exploited-to-send-messages\/\" target=\"_blank\" rel=\"noopener\">Find My Network Exploited to Send Messages<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/05\/18\/apple-tv-color-balance-quality-colors-worse\/\" target=\"_blank\" rel=\"noopener\">Apple TV Color Balance Feature May Make Image Quality and Colors Worse<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/money\/2021\/may\/18\/delivery-text-scams-the-nasty-new-wave-sweeping-the-uk\" target=\"_blank\" rel=\"noopener\">Delivery text scams: the nasty new fraud wave sweeping the UK<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/commentisfree\/2021\/may\/18\/amazon-ring-largest-civilian-surveillance-network-us\" target=\"_blank\" rel=\"noopener\">Amazon\u2019s Ring is the largest civilian surveillance network the US has ever seen<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-tough-are-airtags-we-froze-washed-and-dried-ran-over-and-put-them-in-the-hot-sun\/\" target=\"_blank\" rel=\"noopener\">How Tough are AirTags? We Froze, Washed and Dried, Ran Over, and Put Them in the Hot Sun<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-airtags-can-enable-stalkers-and-abusers\/\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s AirTags Can Enable Stalkers and Abusers<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there&#8217;s news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there&#039;s news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Much Abuse Can Apple&#039;s AirTags Take? - Intego Mac Podcast Episode 188 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there&#039;s news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T09:20:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/\",\"name\":\"How Much Abuse Can Apple's AirTags Take? - Intego Mac Podcast Episode 188 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#primaryimage\"},\"datePublished\":\"2021-05-20T09:20:53+00:00\",\"dateModified\":\"2021-05-20T09:20:53+00:00\",\"description\":\"We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there's news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Much Abuse Can Apple&#8217;s AirTags Take? &#8211; Intego Mac Podcast Episode 188\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How Much Abuse Can Apple&#8217;s AirTags Take? &#8211; Intego Mac Podcast Episode 188\",\"datePublished\":\"2021-05-20T09:20:53+00:00\",\"dateModified\":\"2021-05-20T09:20:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#webpage\"},\"wordCount\":215,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there's news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/","og_locale":"en_US","og_type":"article","og_title":"How Much Abuse Can Apple's AirTags Take? - Intego Mac Podcast Episode 188 - The Mac Security Blog","og_description":"We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there's news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-05-20T09:20:53+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/","name":"How Much Abuse Can Apple's AirTags Take? - Intego Mac Podcast Episode 188 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#primaryimage"},"datePublished":"2021-05-20T09:20:53+00:00","dateModified":"2021-05-20T09:20:53+00:00","description":"We stress tested Apple AirTags and discuss how tough they are, but we also look at how AirTags can enable stalkers. And there's news about Apple touting its App Store enforcement, the accommodations the company makes with China, and a Find My app exploit.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Much Abuse Can Apple&#8217;s AirTags Take? &#8211; Intego Mac Podcast Episode 188"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How Much Abuse Can Apple&#8217;s AirTags Take? &#8211; Intego Mac Podcast Episode 188","datePublished":"2021-05-20T09:20:53+00:00","dateModified":"2021-05-20T09:20:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#webpage"},"wordCount":215,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-much-abuse-can-apples-airtags-take-intego-mac-podcast-episode-188\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oqg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/93884"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=93884"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/93884\/revisions"}],"predecessor-version":[{"id":93885,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/93884\/revisions\/93885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=93884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=93884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=93884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}