How to install the iOS 13 public beta on your iPhone

Good set of instructions from Chance Miller, 9to5Mac. At this point, my advice would be to limit yourself to a spare device, one that does not depend on a specific app running perfectly. Or at least make sure the apps you need are said to run well on the beta.

And, obviously, make a backup before you dive in.

Catalyst can rescue the Mac and grow the iPad

John Voorhees, MacStories:

The message from WWDC was clear: SwiftUI is the future, a unified approach to UI development designed to simplify the process of targeting multiple hardware platforms. It’s a bold, sprawling goal that will take years to refine, even if it’s eagerly adopted by developers.

And:

However, SwiftUI also raises an interesting question: what does it mean for Catalyst? If SwiftUI is the future and spans every hardware platform, why bother bringing iPad apps to the Mac with Catalyst in the first place? It’s a fair question, but the answer is readily apparent from the very different goals of the two technologies.

For non-developers, think of Catalyst (previously called Marzipan) as a development kit to make it easier for developers to port their iOS apps to macOS. But think of SwiftUI as more of a starting point to lay out apps that will run on all your Apple platforms.

John does an excellent job digging into the value of both Catalyst and SwiftUI, explaining each one’s place in the Apple universe. Both are important.

If I had to boil this all down to a single talking point, I’d say that Catalyst is the hero we need now, letting developers bring their iOS apps to the Mac, refreshing and enriching the Mac experience while we wait for SwiftUI to evolve and mature and for SwiftUI apps to become the norm on all platforms.

In a way, this model is similar to the early days of Mac OS X, when Carbon made it possible for classic Mac apps to run on OS X while we waited for developers to build and ship modern OS X apps.

A great read.

Here there be monsters

[VIDEO] NOAA:

Then on Wednesday, Nathan started looking at the downloaded videos. He found the usual shrimp and other small animals that we had been seeing on the first four deployments. And then he saw it, a large tubular animal off on the corner of the screen, looking as if it was hunting the e-jelly. The next short video showed the same thing. Then, in the third video, the tubular animal revealed an enormous set of arms and tentacles coming in to attack the e-jelly.

Watch the video (embedded in the main Loop post). Fantastic. I hope we can turn things around before the giant squid becomes just a scientific memory.

David Gilmour sells his iconic “Black Strat”, 125 other guitars, for $21 million, donates money to fight climate change

This was a pretty amazing auction. The centerpiece was Gilmour’s “Black Strat”:

“The Black Strat,” a 1969 Fender Stratocaster which Gilmour used to record Pink Floyd albums “The Dark Side of the Moon,” “Wish You Were Here” and “The Wall,” sold for $3,975,000.

The winning bidder?

https://twitter.com/jimirsay/status/1141827314268954629

Jim Irsay is the owner of the NFL’s Indianapolis Colts. What do you do with a guitar like that? Do you hang it on a wall? Will it ever be played again?

Amazon and counterfeit products

The New York Times:

“The Sanford Guide to Antimicrobial Therapy” is a medical handbook that recommends the right amount of the right drug for treating ailments from bacterial pneumonia to infected wounds. Lives depend on it.

And:

Antimicrobial Therapy, which publishes “The Sanford Guide to Antimicrobial Therapy,” bought 34 of its handbooks from Amazon and Amazon’s third-party sellers. At least 30 were counterfeits.

And:

Amazon takes a hands-off approach to what goes on in its bookstore, never checking the authenticity, much less the quality, of what it sells. It does not oversee the sellers who have flocked to its site in any organized way.

That has resulted in a kind of lawlessness. Publishers, writers and groups such as the Authors Guild said counterfeiting of books on Amazon had surged. The company has been reactive rather than proactive in dealing with the issue, they said, often taking action only when a buyer complains.

I’ve written a bunch of books over the years and had a front row seat as counterfeiting grew from a clumsy, back-room business using hacksaws (to cut book spines) and copiers into a sophisticated factory, sucking in books and spitting out copies in mere minutes.

It has become harder and harder to make a living writing books, and nigh impossible to stop counterfeiting. Amazon selling counterfeit books and relying on customer complaints to spot counterfeits, in my opinion, is like a fence selling stolen goods. Just as an art patron might not know that their Picasso is a fake, the book buyer might never know that the forged book they just bought is fake.

The two terrible sides to fakes on Amazon? The original author/maker doesn’t see a penny for their hard work and, as called out above, real harm can be done where faulty information is sent out from a supposedly reliable source.

From Amazon’s response to this story (H/T Christopher Lloyd) on their blog:

A recent New York Times article claims that Amazon doesn’t care about counterfeits and takes a hands-off approach to what is sold in our stores. Nothing could be further from the truth. We invest substantial amounts of time and resources to protect our customers from counterfeit products, including books. We also stand behind every product sold in our stores with our A-to-z Guarantee.

Amazon strictly prohibits the sale of counterfeit products. We invest heavily in prevention and take proactive steps to drive counterfeits in our stores to zero. In 2018 alone, we invested over $400 million in personnel and tools built on machine learning and data science to protect our customers from fraud and abuse in our stores.

And:

One of the examples prominently featured by the Times, was the Sanford Guide. We’ve worked closely with Sanford Publishing and took additional action in November 2018 to address their concerns. Since these measures were put in place, the publisher has not submitted any further notices of infringement.

I’d love to see followup from the New York Times on this, both in continued investigation and in direct response to Amazon’s rebuttal.

What to do if you get SIM-swapped

MyCrypto and CipherBlade, via Medium:

MyCrypto and CipherBlade have collaborated on this article to help you understand the dangers of a SIM-jacking attack, and how best to defend yourself against and attack, and how to recover from such an event. This article aims to be a “one-stop” article to read, reference, and share with your friends and colleagues. It’s not short, but it’s thorough.

If you’ve been following our stories on SIM-swapping, this should be in your reading queue. Full of detail. I’ve gotten a lot of response to the posts, both warning me how many people are vulnerable to having their lives turned upside down by this hack, and weighing in with their take on best practices.

I’m far from an expert here, but this seems a solid resource, worth bookmarking and passing along. If you have an opinion on the linked post, either pro or con, please do ping me.

[H/T Ricky de Laveaga]

This page is a truly naked, brutalist html quine

Love this on two counts:

  • The page is HTML rendered as HTML, all tags visible like one of those visible person models, with all the organs and bones showing through invisible skin.

  • Quine. From the Wikipedia page:

A quine is a computer program which takes no input and produces a copy of its own source code as its only output. The standard terms for these programs in the computability theory and computer science literature are “self-replicating programs”, “self-reproducing programs”, and “self-copying programs”.

My nerd light shining through. No apologies.

AT&T takes crown as fastest US mobile network, after long reign by Verizon

PC Magazine:

All four major wireless carriers in the US are constantly flinging claims at you—they’re the fastest, the largest, the friendliest, the best. So 10 years ago, we decided to put those claims to the test. Every year since then, with the carriers’ cooperation, we strap phones into a set of cars and send them across the country with our staff members behind the wheels, scooping up data for several weeks to see who has the fastest and most reliable smartphone data network.

And:

Verizon had a good run for the past five years with its nationwide LTE network, but AT&T has rocketed into the top spot this year. What the carrier calls 5G Evolution may not be 5G, but it’s definitely a stride toward it. The big push to improve its 4G LTE network in preparation for 5G pays off big time for AT&T; it’s America’s fastest mobile network in 2019.

I hate the 5Ge tag. It’s misleading and not at all representative of 5G. As far as I’m concerned, it soiled the AT&T brand, a dark mark that takes away from this accomplishment.

Everybody is getting tragically SIM swapped and you will too

Been reading a lot about folks getting SIM swapped lately. We posted this SIM-swap horror story a few days ago, and followed up with this story on the strategy that other countries are using but that the US is not.

Came across the headline linked post from Tony Sheng. An interesting read, wondering if it’s simply alarmist or insightful.

In a nutshell, Tony got SIM-swapped and went into great detail on the process and what he did to minimize harm. His highest priority:

Disassociated my phone number from my email address. If you connect your phone number to your email, then a hacker with your phone number can reset your password and take over your email address.

Once they have your email and your phone number, they can reset passwords on pretty much all your accounts for which you don’t have physical 2FA (like a Yubikey).

Step 1 is far and away the most important. If you haven’t done this yet. Stop reading and do it now.

Not sure how you do that. Do you use a secondary email address for verification? YubiKey is a hardware dongle. Secure, but not convenient.

Opinions on this? Please tweet at me with how you solve this problem.

Google responds to a WSJ report that concluded there are millions of fake business listings on Maps

First, the Wall Street Journal posted this article about fake businesses hijacking legitimate business names on Google Maps:

The ruse lures the unsuspecting to what appear to be Google-suggested local businesses, a costly and dangerous deception. A man arrived at Ms. Carter’s home in an unmarked van and said he was a company contractor. He wasn’t. After working on the garage door, he asked for $728, nearly twice the cost of previous repairs, Ms. Carter said. He demanded cash or a personal check, but she refused. “I’m at my house by myself with this guy,” she said. “He could have knocked me over dead.” The repairman had hijacked the name of a legitimate business on Google Maps and listed his own phone number.

Google responded to the article with this detailed post. From that post:

We get millions of contributions each day (like new business profiles, reviews, star ratings, and more) and the vast majority of these contributions are helpful and accurate. But occasionally, business scammers take advantage of local listings to make a profit. They do things like charge business owners for services that are actually free, defraud customers by posing as real businesses, and impersonate real businesses to secure leads and then sell them. Even though fake business profiles are a small percentage of the overall business profiles on Google, local business scammers have been a thorn in the internet’s side for over a decade.

And:

We have an entire team dedicated to addressing these issues and taking constant action to remove profiles that violate our policies.

Google goes on to run through numbers, showing how many scams they’ve shut down. Which sort of goes to the point, I think. The problem exists, is massive, and Google is doing all they can, short of making businesses certify themselves in some verifiable way.

A formal verification process would be costly. As is, Google depends on the unpaid public to report fraudulent businesses. Caveat emptor.

Horns are growing on young people’s skulls. Phone use is to blame, research suggests.

Washington Post:

New research in biomechanics suggests that young people are developing hornlike spikes at the back of their skulls — bone spurs caused by the forward tilt of the head, which shifts weight from the spine to the muscles at the back of the head, causing bone growth in the connecting tendons and ligaments. The weight transfer that causes the buildup can be compared to the way the skin thickens into a callus as a response to pressure or abrasion.

The result is a hook or hornlike feature jutting out from the skull, just above the neck.

If you don’t have access to the article (and I find the Washington Post a no-brainer value, worth my subscription dollar), here’s a link to the original study, which shows X-rays of said horns. Crazy.

UPDATE: Reading the comments on the study itself, it seems like there’s some question as to the validity of the conclusion, that phone use is to blame. That said, there are a number of studies that do blame phone use for repetitive stress injuries to the neck. At the very least, we need more time and rigorous science to know what’s what.

UPDATE 2: This takedown by Ars Technica pulls no punches. It’s called Debunked: The absurd story about smartphones causing kids to sprout horns.

Apple’s product strategy is changing

Neil Cybart, laying out Apple’s pre-2018 “pull” strategy:

One way of conceptualizing this product strategy is to think of every major Apple product category being attached to a rope. The order in which these products were attached to the rope was determined by the degree to which technology was made more personal via new workflows and processes for getting work done. Accordingly, Apple Watch and iPhone were located on the end of the rope held by Apple management. Meanwhile, Mac desktops were located at the other end of the rope while iPads and Mac portables were somewhere in the middle.

As Apple management pulled on the rope, the Apple Watch and iPhone received much of the attention while the Mac increasingly resembled dead weight.

And:

The quicker Apple pulled on the rope, the more chaotic the end of the rope moved.

But that seems to be changing:

Over the past two years, we received clues that a major change was beginning to take hold in Apple’s product strategy. This change was on display during this year’s WWDC.

And:

Apple no longer appears to be relying so much on a pull system when it comes to advancing its product line. Instead, a push system is being utilized, and every major product category is being pushed forward simultaneously. The change was designed to reduce the amount of chaos found at the end of the “rope” that Apple was pulling. Accordingly, the primary benefactors arising from this new strategy are the iPad and Mac. This explains why this year’s WWDC announcements felt more overwhelming than those of previous years. Apple was able to move its entire product category forward at the same time.

Not sure I agree with the “push vs pull” label, but I do agree with the basic point. There does appear to be an overall change in Apple’s strategy, much more of a focus on the health of the overall ecosystem, rather than a focus on the new hotness, with older products gathering dust.

To me (as I’ve found myself saying again and again lately), Apple is firing on all cylinders. Great detailed read.

The SIM swap fix that the US isn’t using

Andy Greenberg, Wired:

…an escalating pattern of fraud based on so-called SIM swap attacks, where hackers trick or bribe a phone company employee into switching the SIM card associated with a victim’s phone number. The attackers then use that hijacked number to take over banking or other online accounts. According to Tenreiro, the bank had seen more than 17 SIM swap frauds every month. The problem was only getting worse.

And:

SIM swap hackers rely on intercepting a one-time password sent by text after stealing a victim’s banking credentials, or by using the phone number as a password reset fallback. So the phone company, Tenreiro says, offered a straightforward fix: The carrier would set up a system to let the bank query phone records for any recent SIM swaps associated with a bank account before they carried out a money transfer. If a SIM swap had occurred in, say, the last two or three days, the transfer would be blocked. Because SIM swap victims can typically see within minutes that their phone has been disabled, that window of time let them report the crime before fraudsters could take advantage.

I recognize that this is a game of whack-a-mole, where one security hole is plugged and another one is discovered. But this seems a pretty solid solution.

By August of 2018, Mozambique’s largest bank was performing SIM swap checks with all the major carriers. “It reduced their SIM swap fraud to nearly zero overnight.”

Why is the US not following in Mozambique’s SIM-securing footsteps?

CTIA vice president for technology and cybersecurity John Marinho argued that while US carriers may not offer real-time SIM swap checks, that’s in part because the US has other protections, like geolocation checks based on banks’ mobile applications installed on smartphones, and two-factor authentication. (The latter, of course, is exactly the security measure SIM swaps attempt to circumvent.)

Fascinating read.

[H/T @Varunorcv]

Apple is fourth largest gaming company globally, thanks to the iPhone

Malcolm Owen, AppleInsider:

In its Global Games Market Report, Newzoo outlined the top 35 public companies connected with gaming, with Apple firmly seated in the top five firms, beaten only by Tencent, Sony, and Microsoft and just ahead of Activision Blizzard.

That puts Apple ahead of Nintendo. And Apple Arcade is coming, with entry level iPod touch devices priced to fuel game growth.

A common conversational gambit is to suggest that Apple will become a major force in gaming. If that day is not already here, it certainly seems to be coming.

Apple partners with Best Buy for expanded repair service

Apple:

Apple today announced the completion of a major expansion of its Apple authorized service network. With nearly 1,000 Best Buy stores across the US now providing expert service and repairs for Apple products, customers have even easier and more convenient access to safe and reliable repairs.

And:

By expanding to every Best Buy store across the US, customers in cities including Yuma, Arizona; Sioux City, Iowa; Twin Falls, Idaho; Casper, Wyoming and Bismarck, North Dakota will have more convenient access to Apple repairs. Plus, Best Buy’s Geek Squad has nearly 7,600 newly Apple-certified technicians ready to make same-day iPhone repairs or to service other Apple products.

It just got a lot easier to find a place to get your gear serviced, in warranty, in an Apple blessed way.

Interesting that Apple specifically called out those cities. If you look up Yuma, Arizona on your map, for example, you’ll see how incredibly far you have to go to get to an Apple Store (All the way to San Diego to the west, or to Mesa to the northeast). This is a terrific move, extending Apple’s reach, a win for many of Apple’s remoter customers.

Apple Watch beta lets you delete Apple’s built-in apps, apply over the air updates without iPhone

Sarah Perez, Tech Crunch:

Good news for Apple Watch owners who don’t want to clutter up their Watch with unused apps. With the release of the new watchOS 6 operating system later this year, Apple will allow Apple Watch device owners to remove many more of the built-in, first-party apps from their smartwatch — including previously unremovable apps like Alarm, Timer, Stopwatch, Remote, Camera Remote, Radio and others, as well as health apps like ECG, Breathe, Noise and Cycle Tracking.

Excellent news. As is the news that you can update your Apple Watch running the watchOS 6 beta over the air, without the need to work through your iPhone. Props to Maks Motyka for this discovery:

https://twitter.com/MaksMotyka/status/1140681934529601537

You’ll still have to accept the EULA, apply the first beta via your iPhone but, once that’s done, it’s untethered updates. Huzzah.

YouTube intros AR Beauty Try-On: Try on makeup, virtually, guided by adjacent video

That was no easy headline to construct. Better just to watch the video embedded in this tweet:

https://twitter.com/claybavor/status/1141142140329680896

You’ve got an AR component, showing your face with different makeup applied, underneath a second pane, guiding you through the process.

This might not apply (sorry!) to you, but the basic concept, with an AR pane adjacent to a guiding video, seems groundbreaking to me.

If you’re interested in learning more, click the headline link to read Google’s official blog post.

SIM swap horror story: I’ve lost decades of data and Google won’t lift a finger

Matthew Miller, writing a story that no one wants to write:

At 11:30 pm on Monday, 10 June, my oldest daughter shook my shoulder to wake me up from a deep sleep. She said that it appeared my Twitter account had been hacked. It turns out that things were much worse than that.

After rolling out of bed, I picked up my Apple iPhone XS and saw a text message that read, “T-Mobile alert: The SIM card for xxx-xxx-xxxx has been changed. If this change is not authorized, call 611.”

This reads like a nightmare, told with ever increasing dread. Yes, it does get worse.

Read to the end for a section called “Recommendations for your security” but, since all this is still not resolved, I’m hoping for a “Lessons learned” update. And, for Matthew’s sake, hope the resolution happens quickly.

Sharing data between iPhone and external devices in iOS 13

[VIDEO] Loop reader Niles Mitchell was playing around with an iPhone running an iOS 13 beta and showed off (video embedded in main Loop post) sharing books from an iPhone to an attached Kindle.

While you may never have this particular need, seems to me this solution applies to a more general set of problems. Take a look. Found this very interesting.

iOS 13 uses your iPhone microphone to fix Apple TV audio sync issues

Benjamin Mayo, 9to5Mac:

If you have an Apple TV, particularly when connected to a secondary speaker system, then you can be afflicted by a common AV issue: unsynchronized audio.

The video signal is processed by the TV at a slightly different time than the audio is transmitted from the speaker system. This leads to a delay where the audio is out-of-sync to the video frames, often noticeable by looking at an actor’s lips move … but hearing the words a beat later.

What can you do? Physics, right? But:

With iOS 13 and tvOS 13, Apple aims to combat this problem. You can enter a new configuration step called Wireless Audio Sync. This is initiated by pressing a button in the Apple TV settings.

And:

As part of the process, the Apple TV will play a series of tones. The iPhone then measures how long it takes to hear the sounds. This calculation is then saved on the Apple TV.

The tvOS operating system can then send audio earlier or later using the time offset it calculated from the Wireless Audio Sync data, thereby synchronizing audio and visual outputs.

Cleverness abounds. Yet another example of Apple firing on all cylinders.

tvOS 13 beta 2 brings Picture-in-Picture video multitasking to Apple TV

Benjamin Mayo, 9to5Mac:

You can now watch shows from the Apple TV app whilst multitasking around the rest of the operating system. Just like the iPad, Apple TV users can leave the video playing in a thumbnail window whilst they navigate the rest of the operating system.

If this is true Picture-in-Picture (PiP), I would be thrilled. A game changing feature, at least for me. I’d be able to keep tabs on a ball game or news story, in a PiP overlay, while watching content on the main screen.

From everything I’ve seen, including this tweet that started this whole discussion, it looks like there’s only one live video feed.

Traditional PiP required two video sources to make that double-live-video feature happen, so this is no surprise, but it’d be very cool if there was a way Apple could bring real PiP to life in tvOS.

UPDATE: Been told that this feature will, indeed, support two separate sources, meaning you can watch live content in both the main screen and the inset screen. If true, this is a big deal. Will reach out to Apple for confirmation.

13 subtle iOS 13 features worth knowing about

[VIDEO] Interested in learning more about what’s coming with iOS 13? Some solid hidden features in this video (embedded in the main Loop post), worth watching.

You care more about your privacy than you think

Charlie Warzel, New York Times, writing about this experiment by Harvard researcher Dan Svirsky:

Svirsky ran a series of tests where he had participants fill out online surveys for money and made them decide whether to share their Facebook profile data with a survey taker in exchange for a bonus (in some cases, 50 cents). In a direct trade-off scenario, Svirsky found that 64 percent of participants refused to share their Facebook profile in exchange for 50 cents and a majority were “unwilling to share their Facebook data for $2.50.” In sum: Respondents generally sacrificed a small bonus to keep from turning over personal information.

And:

But things changed when Svirsky introduced the smallest bit of friction. When participants were faced with what he calls “a veiled trade-off,” where survey takers had to click to learn whether taking the survey without connecting to Facebook would be free or cost them 50 cents, only 40 percent ended up refusing to share their data. And 58 percent of participants did not click to reveal which payment option was associated with privacy, even though doing so cost them nothing more than a second of their time.

I came across this article in this Daring Fireball post. From the post:

The lack of friction in the Sign In With Apple experience — especially using a device with Face ID or Touch ID — is a key part of why I expect it to be successful. It’s not just more private than signing in with Google or Facebook, it’s as good or better in terms of how few steps it takes.

The genius of the Google button is reducing friction for the user, easing them into sharing data from an already existing account. Even if your browser or app makes it easy to enter your email and password, using Touch ID or Face ID, there’s still friction in that sequence. The Google button is one simple step. With a privacy cost.

Sign in with Apple (SiwA) has the same lack of friction as the Google button. But without the privacy sacrifice. To me, this takes a good thing and makes it a great thing. I look forward to seeing SiwA in the wild.

A look at plugging in an iOS device into a Mac running macOS Catalina

This is the new look and feel of the post-iTunes way of showing an iOS device plugged into your Mac. Just as you’d expect if you plugged an external drive into your Mac, your plugged in device will appear in the Finder’s sidebar.

Excellent job by Stephen Hackett laying all this out. This looks like a very clean implementation by Apple, a nice step forward.

Checking out what’s new with iOS 13 Beta 2

Follow the headline link to the release notes, then search for “New Features”. Rinse and repeat. So much to see.

One particular nugget I can’t wait to take for a spin:

Audio sharing is compatible with AirPods (1st generation or later) and PowerBeats Pro. iPhone 8 or later, iPad Pro 12.9-inch (2nd generation or later), iPad Pro 11-inch, iPad Pro 10.5-inch, iPad (5th generation or later), iPad Air (3rd generation), iPad mini (5th generation), or iPod touch (7th generation or later) is required. (51331268)

One definite benefit to keeping those first gen AirPods around if you upgrade to gen2 or the PowerBeats Pro.

Apple’s advice on storing your device to maximize battery life

From Apple’s Maximizing Battery Life and Lifespan page:

If you want to store your device long term, two key factors will affect the overall health of your battery: the environmental temperature and the percentage of charge on the battery when it’s powered down for storage. Therefore, we recommend the following:

  • Do not fully charge or fully discharge your device’s battery — charge it to around 50%. If you store a device when its battery is fully discharged, the battery could fall into a deep discharge state, which renders it incapable of holding a charge. Conversely, if you store it fully charged for an extended period of time, the battery may lose some capacity, leading to shorter battery life.

  • Power down the device to avoid additional battery use.

  • Place your device in a cool, moisture-free environment that’s less than 90° F (32° C).

  • If you plan to store your device for longer than six months, charge it to 50% every six months. Depending on how long you store your device, it may be in a low-battery state when you remove it from long-term storage. After it’s removed from storage, it may require 20 minutes of charging with the original adapter before you can use it.

This is one of those tips that applies widely, to all lithium ion devices. Best thing you can do is find an active home for your old devices. But if you can’t do that, and want to keep your battery alive, follow the advice above.

[Via Reddit]