Apple often claims that security and privacy is a main subject for the company. They mean it. I always wondered why there were so few second hand and stolen iPhones in parallel and offshore markets. Well, because it’s pointless to steal them. Just like that. Only those who know nothing about Apple’s technologies will make this mistake. And won’t repeat it. Let’s see why.
When you turn on a brand new iPhone the whole process may seam annoying and a general hassle for an Android or Windows (do they exist?) user. But it’s worth it.
You’ll be asked to set up your account with email, PIN code (6 numbers), security questions and fingerprint. And of course your geographical area, main preferences and phone number. Once everything is configured, is advisable to open an account in the official forums. You never know when you will need help. And Apple users and forums are just as techie and active as any Linux’s. Oh! And of course, a two factors authentication will be set as well. Just in case.
You will be also offered to import all your data from an existing phone or account, regardless operating system (yes, they import from Android). That’s up to you.
Apple will offer you to sync your stuff to iCloud. This will include documents, photos, music, calendars, contacts and everything else you have stored in your computer. It’s a good idea to accept as it makes your information available in any other (trusted) device regardless operating system.
Every time you use a different device, Apple will ask you whether you trust it or not. If you don’t trust the device but still want to use the service you can do so but it means you’ll be asked again next time you use that particular device. If you do trust it, you won’t be asked for a period of time. After, you will need to confirm again that you still trust that device.
Then you may want to install some other apps. Apple delivers a useful and sleek system. It’s pretty much ready to use but you will always want to add something like Telegram or iWorks. So you have to go to the App Store. Every single time you want to install something you’ll be required to use the Touch ID. If not, nothing will be downloaded nor installed.
Same goes for system upgrades. Apple updates all their supported devices constantly and consistently. Upgrading is simple and smooth. And secure. Again, you’ll be required to prove that you are really the owner of this particular phone. Thrice. First to download the upgrade and then to actually upgrade. And then again after restarting.
Which takes me to the next topic: turning on and off an iPhone. It may look stupid, but they really nailed with this. Turning it off is KISS: You press a button and turn it off. That’s it. No annoying questions or further complications. And then turning it on will force you to authenticate yourself twice. So it’s certain that you… are still you.
The first time you use any Apple apps, it will require authentication, usually with the Touch ID (fingerprint) but sometimes with the PIN code.
Finally, if you ever lose your phone you can find it with the “Find my phone” utility (works also for cases of forgetfulness) and/or remotely delete all your data and set the device back to its original state. You can also block it, so nobody else will be able to use it. Just in case a superhacker FBI agent decides to break in. Normal people is put off with the usual two steps authentication.
Amazing isn’t it? Next article: Configuration and use