Should you cover your webcam?
Webcam covers and physical mute buttons on microphones act as failsafes and helpful reminders to think about security, and a piece of tape really is the best solution for use with a MacBook.
by Aidan Fitzpatrick
Webcam covers and physical mute buttons on microphones act as failsafes and helpful reminders to think about security, and a piece of tape really is the best solution for use with a MacBook.
by Aidan Fitzpatrick
Over the course of the last two days, a number of engineers have been reviewing the app to discover whether — and how! — it is able to stay alive. Understanding this has required a deeper understanding of the relevant CoreBluetooth framework than most developers possess. Tonight, we’re sharing just what’s happening on iOS. Let’s step through it.
by Jamie Bishop
Digging into the options available for contact tracing apps built without recourse to Apple's iOS 13.5 frameworks
by Aidan Fitzpatrick
In this post, we look at Houseparty, the risks that come with using it, and what you can do in simple steps to avoid sharing anything that you’d rather keep private.
by Aidan Fitzpatrick
We conducted an experiment by examining the phones and Netflix data of 5 avid watchers to see what data was stored. The study reveals the data that Netflix keeps and tracks on user devices, and found that on average, users spend 58 hours watching Netflix on smartphones or tablet.
by Aidan Fitzpatrick
Despite press coverage to the contrary, Apple’s recommendations for regulating children’s behaviour with Screen Time are effective in ensuring Screen Time isn't removed without a parent's involvement.
by Aidan Fitzpatrick
Today, we’re going to take a dive into one of the approaches we use for recovering deleted messages: forensic recovery of SQLite data.
by Aidan Fitzpatrick
Might Apple know who stole your iPhone? Apple's Data and privacy tool revealed the identity of an iPhone's thief, even without it being locked to iCloud.
by Aidan Fitzpatrick
If Apple’s security systems see that an iCloud account is being used in a suspicious way it can result in the account being locked.
by Catalina Butnaru
Mechanisms to protect app and cloud data take a number of forms, and Apple’s track record of implementing them has been good. This article examines a number of the techniques that Apple — and the team at Reincubate — have been using.
by Aidan Fitzpatrick
© 2008 - 2020 Reincubate Ltd. All rights reserved. Registered in England and Wales #5189175, VAT GB151788978. Reincubate® and Camo® are registered trademarks. Privacy policy & terms. Built with in London.