{"id":96550,"date":"2022-11-10T01:56:45","date_gmt":"2022-11-10T09:56:45","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96550"},"modified":"2022-11-10T09:23:58","modified_gmt":"2022-11-10T17:23:58","slug":"extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/","title":{"rendered":"Extreme Security and Privacy on the iPhone &#8211; Intego Mac Podcast Episode 265"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+FYM4kUk1?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Apple&#8217;s new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok&#8217;s new privacy policy states that staff can access user data, how Zoom mandates new client updates every 90 days, and how the U.S. is planning &#8220;nutrition labels&#8221; for IoT devices.<\/p>\n<ul>\n<li><a href=\"https:\/\/thehackernews.com\/2022\/11\/new-tiktok-privacy-policy-confirms.html\" target=\"_blank\" rel=\"noopener\">New TikTok privacy policy allows staff to access user data<\/a><\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/emilybaker-white\/2022\/10\/20\/tiktok-bytedance-surveillance-american-user-data\/\" target=\"_blank\" rel=\"noopener\">TikTok Parent ByteDance Planned To Monitor Locations of Specific U.S. Citizens<\/a><\/li>\n<li><a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/31-arrested-for-stealing-cars-hacking-keyless-tech\" target=\"_blank\" rel=\"noopener\">31 arrested in EU for stealing cars by hacking keyless tech<\/a><\/li>\n<li><a href=\"https:\/\/www.theregister.com\/2022\/10\/31\/zoom_minimum_client_update\/\" target=\"_blank\" rel=\"noopener\">Zoom now mandates client updates every ninety days<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2022\/10\/everything-we-know-about-the-white-houses-iot-security-labeling-effort\/\" target=\"_blank\" rel=\"noopener\">U.S. Planning on IoT \u201cNutrition Labels\u201d for Spring 2023<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/en-gb\/HT212650\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s Lockdown Mode<\/a><\/li>\n<li><a href=\"https:\/\/grapheneos.org\" target=\"_blank\" rel=\"noopener\">GrapheneOS &#8211; Android, but designed for security first<\/a><\/li>\n<\/ul>\n<p>If you like the Intego Mac Podcast podcast, be sure to rate and review it on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple&#8217;s new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok&#8217;s new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning &#8220;nutrition labels&#8221; for IoT devices.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[21,4652,3715,3313,106,4619,4581],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple&#039;s new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok&#039;s new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning &quot;nutrition labels&quot; for IoT devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extreme Security and Privacy on the iPhone - Intego Mac Podcast Episode 265 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple&#039;s new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok&#039;s new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning &quot;nutrition labels&quot; for IoT devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-10T09:56:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-10T17:23:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/\",\"name\":\"Extreme Security and Privacy on the iPhone - Intego Mac Podcast Episode 265 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#primaryimage\"},\"datePublished\":\"2022-11-10T09:56:45+00:00\",\"dateModified\":\"2022-11-10T17:23:58+00:00\",\"description\":\"Apple's new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok's new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning \\\"nutrition labels\\\" for IoT devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extreme Security and Privacy on the iPhone &#8211; Intego Mac Podcast Episode 265\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Extreme Security and Privacy on the iPhone &#8211; Intego Mac Podcast Episode 265\",\"datePublished\":\"2022-11-10T09:56:45+00:00\",\"dateModified\":\"2022-11-10T17:23:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#webpage\"},\"wordCount\":187,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Android\",\"Car Security\",\"Intego Mac Podcast\",\"Internet of Things (IoT)\",\"Privacy\",\"TikTok\",\"Zoom\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple's new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok's new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning \"nutrition labels\" for IoT devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/","og_locale":"en_US","og_type":"article","og_title":"Extreme Security and Privacy on the iPhone - Intego Mac Podcast Episode 265 - The Mac Security Blog","og_description":"Apple's new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok's new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning \"nutrition labels\" for IoT devices.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-11-10T09:56:45+00:00","article_modified_time":"2022-11-10T17:23:58+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/","name":"Extreme Security and Privacy on the iPhone - Intego Mac Podcast Episode 265 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#primaryimage"},"datePublished":"2022-11-10T09:56:45+00:00","dateModified":"2022-11-10T17:23:58+00:00","description":"Apple's new Lockdown Mode provides extreme security and privacy on the iPhone, iPad, and Mac. We discuss how it works, and what the downsides are of using this feature. We also talk about how TikTok's new privacy policy states that staff can access user data, how Zoom mandates new client updates every 30 days, and how the US is planning \"nutrition labels\" for IoT devices.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Extreme Security and Privacy on the iPhone &#8211; Intego Mac Podcast Episode 265"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Extreme Security and Privacy on the iPhone &#8211; Intego Mac Podcast Episode 265","datePublished":"2022-11-10T09:56:45+00:00","dateModified":"2022-11-10T17:23:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#webpage"},"wordCount":187,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Android","Car Security","Intego Mac Podcast","Internet of Things (IoT)","Privacy","TikTok","Zoom"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/extreme-security-and-privacy-on-the-iphone-intego-mac-podcast-episode-265\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p7g","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96550"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96550"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96550\/revisions"}],"predecessor-version":[{"id":96574,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96550\/revisions\/96574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}