	{"id":96626,"date":"2022-11-24T06:05:44","date_gmt":"2022-11-24T14:05:44","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96626"},"modified":"2022-11-24T06:05:44","modified_gmt":"2022-11-24T14:05:44","slug":"airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/","title":{"rendered":"AirPods as Trackers, Hacking Hackers, and Apple Tracking &#8211; Intego Mac Podcast Episode 267"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+WAvgR92K?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>In this week&#8217;s security news, a stalker used AirPods to track a woman, since they don&#8217;t sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cyberghostvpn.com\/en_US\/privacyhub\/apple-privacy-violations\/\" target=\"_blank\" rel=\"noopener\">Apple Tracks Alarming Amount of Data Even When Device Analytics is Turned Off<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/22\/11\/21\/apples-app-store-analytics-may-be-able-to-identify-users\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s App Store analytics may be able to identify users<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/22\/11\/22\/apples-icloud-private-relay-being-abused-in-65m-ad-fraud\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s iCloud Private Relay being abused in $65M ad fraud<\/a><\/li>\n<li><a href=\"https:\/\/nypost.com\/2022\/11\/17\/my-creepy-date-slipped-his-airpods-into-my-bag-heres-the-scary-reason-why\/\" target=\"_blank\" rel=\"noopener\">My creepy date slipped his AirPods into my bag \u2014 here&#8217;s the scary reason why<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2022\/11\/23\/is-5g-worth-it\/\" target=\"_blank\" rel=\"noopener\">Is 5G worth it? Consumer hype is over, and carriers worried, says report<\/a><\/li>\n<li><a href=\"https:\/\/www.washingtonpost.com\/technology\/interactive\/2022\/amazon-shopping-ads\/\" target=\"_blank\" rel=\"noopener\">It\u2019s not your imagination: Shopping on Amazon has gotten worse<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/11\/half-of-computer-repairs-result-in-snooping-of-sensitive-data-study-finds\/\" target=\"_blank\" rel=\"noopener\">Thinking about taking your computer to the repair shop? Be very afraid<\/a><\/li>\n<li><a href=\"https:\/\/riskybiznews.substack.com\/p\/risky-biz-news-australia-to-hack\" target=\"_blank\" rel=\"noopener\">Australia to hack the hackers<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/science\/2022\/11\/network-crashing-leap-seconds-to-be-abandoned-by-2035-for-at-least-a-century\/\" target=\"_blank\" rel=\"noopener\">Network-crashing leap seconds to be abandoned by 2035, for at least a century<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-rip-dvds-and-add-them-to-your-itunes-library\/\" target=\"_blank\" rel=\"noopener\">How to Rip DVDs or Blu-rays and Add Them to Your Apple TV Library<\/a><\/li>\n<\/ul>\n<p>If you like the Intego Mac Podcast podcast, be sure to rate and review it on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this week&#8217;s security news, a stalker used AirPods to track a woman, since they don&#8217;t sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In this week&#039;s security news, a stalker used AirPods to track a woman, since they don&#039;t sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AirPods as Trackers, Hacking Hackers, and Apple Tracking - Intego Mac Podcast Episode 267 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In this week&#039;s security news, a stalker used AirPods to track a woman, since they don&#039;t sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-24T14:05:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/\",\"name\":\"AirPods as Trackers, Hacking Hackers, and Apple Tracking - Intego Mac Podcast Episode 267 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#primaryimage\"},\"datePublished\":\"2022-11-24T14:05:44+00:00\",\"dateModified\":\"2022-11-24T14:05:44+00:00\",\"description\":\"In this week's security news, a stalker used AirPods to track a woman, since they don't sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AirPods as Trackers, Hacking Hackers, and Apple Tracking &#8211; Intego Mac Podcast Episode 267\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"AirPods as Trackers, Hacking Hackers, and Apple Tracking &#8211; Intego Mac Podcast Episode 267\",\"datePublished\":\"2022-11-24T14:05:44+00:00\",\"dateModified\":\"2022-11-24T14:05:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#webpage\"},\"wordCount\":219,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In this week's security news, a stalker used AirPods to track a woman, since they don't sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/","og_locale":"en_US","og_type":"article","og_title":"AirPods as Trackers, Hacking Hackers, and Apple Tracking - Intego Mac Podcast Episode 267 - The Mac Security Blog","og_description":"In this week's security news, a stalker used AirPods to track a woman, since they don't sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-11-24T14:05:44+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/","name":"AirPods as Trackers, Hacking Hackers, and Apple Tracking - Intego Mac Podcast Episode 267 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#primaryimage"},"datePublished":"2022-11-24T14:05:44+00:00","dateModified":"2022-11-24T14:05:44+00:00","description":"In this week's security news, a stalker used AirPods to track a woman, since they don't sent alerts like AirTags; Australia is hacking hackers in a sort of precrime operation; and we give a few tips for the annual Black Friday shopathon.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"AirPods as Trackers, Hacking Hackers, and Apple Tracking &#8211; Intego Mac Podcast Episode 267"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"AirPods as Trackers, Hacking Hackers, and Apple Tracking &#8211; Intego Mac Podcast Episode 267","datePublished":"2022-11-24T14:05:44+00:00","dateModified":"2022-11-24T14:05:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#webpage"},"wordCount":219,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/airpods-as-trackers-hacking-hackers-and-apple-tracking-intego-mac-podcast-episode-267\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p8u","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96626"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96626"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96626\/revisions"}],"predecessor-version":[{"id":96627,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96626\/revisions\/96627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}