The article lists settings to change on Android 14 and iOS 17.

According to the author:

Recommended setting changes reduce the amount of data submitted to device manufacturers, cell carriers, or app developers and improve device security against common threats, such as those posed by nosy people who find the device unattended or by common malware.

By enabling all of these settings, you are significantly reducing the amount of tracking and data collection these devices perform, but keep in mind that you are not completely eliminating it.

  • ForgottenFlux@lemmy.worldOP
    link
    fedilink
    English
    arrow-up
    2
    ·
    10 months ago

    The settings you’ve highlighted do improve device security against common threats, such as those posed by nosy people who find the device unattended, as I’ve mentioned in the post.

    • cjf@feddit.uk
      link
      fedilink
      English
      arrow-up
      2
      ·
      10 months ago

      So if an iPhone gets stolen, would having Find My completely disabled actually be a bad thing if we’re trying to improve device security? I see that’s listed in the article.

      Would this affect the ability to use the remote lock & wipe functionality?

      • ForgottenFlux@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        5
        ·
        10 months ago

        The setting you’re mentioning i.e., Apple ID > Find My: Disable everything1 has superscript i.e., 1 attached to it. The superscript leads to the following note:

        1: Some people prefer to leave “Find My iPhone” enabled as it allows them to remotely wipe the device if it gets lost. However, due to enabling the “Erase Data” setting, I don’t believe this is necessary. If it makes you feel better or if you have a specific use case for it, you can leave this feature on, but “Share My Location” should still be disabled (unless you use need to use it often) as this feature will report your location back to Apple regularly.

        I’m not the writer of the article, but I think that this note makes it clear that you can configure this setting according to your threat model.

    • INeedMana@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      10 months ago

      And I was commenting on the article. Which only has two lists and at the bottom

      By enabling all of these settings, you are significantly reducing the amount of tracking and data collection these devices perform, but keep in mind that you are not completely eliminating it.

      And I’m criticizing that

      • ForgottenFlux@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 months ago

        You make a valid point. As I’m not the writer of the article, perhaps it would be apt to convey your feedback to the writer.