top of page

Imagine you’re staring at a file or folder—perhaps confidential employee information that you need to send to your accountant. If attaching it to an email message makes you think, “That doesn’t seem like a good idea,” award yourself a gold star!

Sending sensitive files via email is a bad idea, partly because the email could be intercepted in transit (possible but highly unlikely), but more because the files then live in both your and your recipient’s email accounts in an unprotected form. If an attacker were to gain access to either of your email accounts, they might scan for patterns like credit card numbers, ID numbers, phone numbers, and postal addresses and find them even in attachments.

There are ways of encrypting email messages so they can be read only by the recipient and never exist in an unencrypted form other than while being created or read, but they’re difficult to set up and fussy to use. For most people, most of the time, encrypted email is overkill.

For a more straightforward solution to exchanging information securely via email, use password-protected and encrypted ZIP archives. They’re easy to create on the Mac, either using a simple command in Terminal or with a third-party utility. And better yet, any Mac user can expand them using the built-in Archive Utility simply by double-clicking and entering the necessary password.

Create Encrypted ZIP Archive Using Terminal

Although many Mac users are intimidated by using the Unix command line in Terminal, making an encrypted ZIP archive is easy enough for anyone. All it takes is typing a single command, dragging a file or folder to Terminal, and entering a password twice. Follow these steps, which make an encrypted ZIP archive on your Desktop:

  1. In your Applications folder, open the Utilities folder and double-click Terminal to launch it.

  2. Type (or copy and paste) this command, replacing “archiveName” with whatever you want to name the ZIP file and making sure to type a space after the last letter—the “p” in “zip”. (The tilde ~ character is Shift-backtick, and it’s the key to the left of the numeral 1 key.)

zip -er ~/Desktop/archiveName.zip
  1. Drag the file or folder you want to protect into the Terminal window to complete the command.

  2. Press Return, and when prompted, enter the desired password twice—the second time is for confirmation.

Create Encrypted ZIP Archive Using Archiver

If you have trouble with the command-line method or plan to create encrypted ZIP archives regularly, it’s worth using a Mac app that simplifies the process even more. There are various apps, but a particularly straightforward one for those running macOS 11 Big Sur is Archiver ($19.99, with a free trial). Download it and then follow these steps to create an encrypted ZIP archive:

  1. Launch Archiver.

  1. Drag a file or folder to the Archiver window and click the Archive button in the toolbar.

  1. Select the archive format (use ZIP), click the Encrypt checkbox, enter the password twice, and click the Archive button in the toolbar.

  1. Drag the ZIP archive to the Desktop or another folder and click the Done button.

Decrypting a ZIP Archive

As noted earlier, decrypting a password-protected ZIP archive on the Mac is as simple as double-clicking it and entering the password when prompted.

What about iOS or iPadOS? Never fear, since the Files app can also decrypt ZIP archives; just tap the archive to open it and enter the password when prompted.

A Word about Passwords

It’s important to think briefly about how you’re going to communicate the password to your recipient. Don’t send it in email or else anyone who compromises either your email account or your recipient’s account could decrypt the ZIP archive.

Instead, use what’s called an “out of band” communication channel. In other words, if you’re going to send the ZIP archive via email, communicate the password in a phone call or text message. That would keep the password safe if either of your email accounts were compromised.

If you’re sending password-protected ZIP archives to a particular person regularly (and the files don’t contain state or corporate secrets), you could agree on a system for generating passwords so you don’t have to communicate each one individually. For instance, you could combine a random word and the current month, so the password would be “cheddar9September” one month and “cheddar10October” the next.

As you can see, you can use this technique with so little extra effort that it’s worth ensuring a higher level of security whenever you need to share confidential information.

(Featured image by iStock.com/brijith vijayan)

 

Do you have a child heading off to college soon? As you’re undoubtedly aware from high school, a computer is essential for a college student. If you haven’t been paying close attention to Apple’s Mac lineup, you might wonder which model makes the most sense.

First, don’t buy anything without first checking with the college. Many college departments have specific requirements based on the software that students have to use in their classes. Generally, these revolve around processor type, amount of RAM, and storage space. Luckily, current Macs should meet the requirements.

Colleges often specify—and students usually prefer—laptops instead of desktop machines. Although the iMac is an excellent machine with a gorgeous screen, it’s too big and unwieldy for the transient lifestyle of the typical college student. The same is true of a Mac mini and external display. A laptop is much easier to pack during moves, and it can travel to class every day. A student who’s accustomed to taking notes on an iPad with a Smart Keyboard and Apple Pencil might be able to use that along with a desktop Mac, but most people should focus on Apple’s laptops.

In the past, it was harder to decide which model was best for a given student, but with Apple’s move to the M1 chip, which significantly outperforms the Intel processors used in previous models, the decision is easier. We see three primary scenarios:

  1. Most students: Buy Apple’s M1-based MacBook Air. It’s Apple’s smallest, lightest, and least expensive laptop, but thanks to its M1 processor, it has nearly identical performance to the heavier and more costly M1-based MacBook Pro. It also has the same lovely 13.3-inch Retina display. It starts at $999, and an education discount may be available.

  2. Slightly better specs: If cost is of little concern, the M1-based MacBook Pro offers just a bit more performance due to fans that keep its M1 chip cool. It also has a Touch Bar (which some people like, but others don’t), somewhat longer battery life, and nominally better speakers and microphones. It starts at $1299, and again, education pricing may be available.

  3. Windows compatibility: The only reason to buy an older Intel-based MacBook Pro— available in either 13.3-inch ($1799) and 16-inch ($2399) models—is if Windows compatibility is essential. All Intel-based Macs can run Windows with no problems, either by restarting in Apple’s Boot Camp or using virtualization software like VMware Fusion (free for students) or Parallels Desktop. (On M1-based Macs, it’s possible to run Parallels Desktop and Windows for ARM Insider Preview, but we can’t recommend that anyone rely on that combination yet.)

Regardless of which laptop you decide on, you’ll have to pick a processor, an amount of RAM, and storage capacity:

  1. Processor: With the M1-based MacBook Air, you have a choice between two CPUs that are identical apart from one having a 7-core GPU and the other an 8-core GPU. No one is likely to notice the difference for everyday software, but the price difference is only $50 if you’re also getting at least 512 GB of storage. (The M1-based MacBook Pro offers only the 8-core GPU chip.) For Intel-based Mac laptops, there are various options based on clock speed and number of cores. They’re all fine, but you pay for performance, so buy what fits your budget and needs.

  2. RAM: With the M1-based Macs, you can choose between 8 GB and 16 GB of RAM. 8 GB may be acceptable, but we recommend 16 GB. Intel-based Mac laptops start at 16 GB, which is a decent base level, and you can go up to 32 GB or 64 GB (16-inch only). Generally speaking, go beyond 16 GB only if you know you need it.

  3. Storage: For the M1-based Macs, 256 GB is the lowest storage level, whereas the Intel-based Macs usually start higher. Either way, you can upgrade to a maximum of 2 TB. Choose the amount of storage based on budget and anticipated usage—video takes a lot of space, as can large numbers of photos, but most other uses don’t.

To our thinking, the most obvious choice for a Mac that’s likely to last for four years of college would be the M1-based MacBook Air with the 8-core GPU, 16 GB of RAM, and 512 GB of storage. Be sure to budget for AppleCare+, too; it’s almost guaranteed that some mishap will befall a student laptop, and AppleCare+ covers up to two incidents of accidental damage every year.

You’ll need to have some conversations with your child to find out what they think they’ll need—and be sure to double-check that against the college’s recommendations—but if you have any questions after that, don’t hesitate to contact us.

(Featured image by Apple)

 

Apple’s new AirTag tracking device is an amazing bit of technology—it’s an elegant disc about the size of a stack of four US quarters that communicates its location with other Apple devices using Bluetooth and Ultra Wideband. Pair an AirTag with your iPhone and put it in your laptop bag, and from then on, you can use the Find My app to find your bag no matter where you’ve left it.

The key to the system is Apple’s Find My network of hundreds of millions of Apple devices, which detect nearby AirTags and report their location to Apple’s servers. It’s all completely private and secure, so only the owner of an AirTag can see where it is. All the devices in the Find My network are anonymous, and location data is encrypted at every step of the way. Not even Apple can locate an AirTag or determine the identity of the device that helps find it.

Plus, if you have an iPhone 11 or iPhone 12 with support for Ultra Wideband, the Find My app can use Precision Finding to give you the direction and distance of your nearby items. (“You’re getting warmer!”) If you need more help to locate an AirTag that’s out of sight, you can make it play a sound.

At $29 for one or $99 for a pack of four, AirTags are an inexpensive way to keep track of keys, purses, suitcases, kids’ backpacks, and more. You could even attach one to your dog’s collar, but it would likely be helpful only in urban areas where people with iPhones would come close enough to your rambling pet.

With great power comes great responsibility, though. There are always those who will attempt to use AirTags to track other people’s movements surreptitiously, perhaps a jealous spouse, a vindictive ex, or someone with a creepy crush. It wouldn’t be hard to hide an AirTag in someone’s car, in a seldom-used purse pocket, or in the lining of a coat.

Apple is fully aware of these possibilities and has built three safeguards into the AirTags and the Find My network. Given the potential for abuse, it’s essential that everyone knows what an AirTag is (done!) and how to determine if someone may be using one to track another person (read on!).

  1. Safety Alerts: If you get an “AirTag Found Moving With You” alert on your iPhone, you know that there’s an AirTag separated from its owner that’s traveling with you. Most likely, it’s in something you’re borrowing or attached to an item that someone left in your car. If you can’t easily find the AirTag, you may be able to make it play a sound. (That won’t work if the owner is in range or if it has been with you overnight such that its identifier has changed since the alert.) If you know why it’s there, you can pause the safety alerts for a day or disable them permanently for those in your Family Sharing group. If the owner has marked it as lost, you can tap Learn About This AirTag to discover its serial number and contact information for the owner. If there’s no good explanation for why the AirTag is with you, you can remove its battery to prevent it from reporting your location.

  1. Safety Sounds: If an AirTag is separated from its owner for 3 days, it will make a sound the next time it moves. There is some concern that 3 days may be too long and that the sound starts only after the AirTag moves. Apple has said it may change the time or tweak the system if the sound isn’t achieving its goal of tattling on maliciously placed AirTags.

  2. NFC identification: Let’s say you find an AirTag after a safety alert or sound. Hold an iPhone or other NFC-capable smartphone to the white side of the AirTag and tap the notification to load a website with the AirTag’s serial number and the last four digits of the owner’s phone number (which may help you or the police identify them). If the owner has marked it as lost, you’ll also see their phone number or email address.

The safety alerts appear only on iPhones, of course, but there are two other requirements that must be true as well. First, the iPhone must be running iOS 14.5 or later to display the alerts, so make sure you update. Second, in Settings > YourName > Find My > Find My iPhone, the Find My network option must be enabled. If you don’t want your iPhone to participate in the Find My network, you can turn that option off, but doing so means you’ll never receive a safety alert either.

(A quick aside: the Find My iPhone option in that screen is necessary to locate your iPhone if it’s lost or stolen. It also enables Activation Lock, which prevents a thief from erasing and reactivating your iPhone unless they can find your Apple ID password. Always leave Find My iPhone enabled. The Find My network can also help locate iPhones, iPads, Macs, and Apple Watches that are offline and can’t report their location to Find My on their own.)

The ultimate takeaway is that if you ever get a safety alert, hear an AirTag making a sound, or find an unexpected AirTag, hold your iPhone or an NFC-capable Android phone to the white side of the AirTag to load a Web page with more information. If you have reason to believe you’re being stalked, contact local law enforcement and give them the AirTag’s serial number, which they can use, with Apple’s help, to identify the AirTag’s owner.

(Featured image by Apple)

 
bottom of page