iOS or Android, the eternal debate. Issue of taste, to prioritize different functions or simply the price of the devices of said operating systems decide the balance for one side or another depending on the person. It is often said that Apple devices are better at camera and social networks level, but … Is there a foundation? The reality is that both operating systems have a very high market share.
Many users decide to opt for an iPhone And more after launching this most interesting and revolutionary range this September in recent years. However, all of them, as with other mobiles have A great concern: security. Both physical, so that there is no blow that can be fatal, as in the software, that is, Avoid possible cybercriminal hackeos. Unfortunately, it is usual, but the technology expert called in Tiktok ‘Gctech’ It reveals a simple trick to know if you have hacked your iPhone.
How to know if the iPhone have hacked me?
The technological expert clarifies a concept at the beginning of the video: “I do not talk about antivirus, this function is already activated on your iPhone”. It reveals the moment you have to use it and the great advantage: “If you think they can be hacking your iPhone, here are an easy way to check it”. After that, the process begins to explain: “The first thing you should do is go to settings”. You have to look for the following section: “Lower and go to the privacy and security section.”
You just have to look for one more thing: “Here we will go down until we reach an option where you put security check”. After clicking, two options appear that he explains and that they have to select with great care. The first is emergency restoration: “This is used to eliminate all accesses to all people and applications and review the safety of your account. The second is to manage access and shared data.
The warning not starting from scratch
Makes a serious warning about the first option: “I recommend that you only activate this option if you think there is something or someone who can have access to your phone almost 100% safe “. He opts for the second option: “If you just want to check how sure your iPhone is and manage the accesses, I recommend that you go to the second option Already the one that authentifies yourself with the face ID, you continue. “
Explain what this option allows: “You can see that people are sharing things like notes, messages or etcetera calendar. In my case I am not sharing with anyone. “You can also check with the people who share the gallery and something very fashionable today, the location.”You give you next, continue and here you can see all the applications that have access to much of the information that you may not be aware“, warn. Some of those things are the location, Bluetooth or camera data.”
What is it for me?
The specialist points out the function of getting here: “What you can do is select all, remove access and start from scratch or simply signal the one you don’t use“. The process ends by pressing to revoke permissions. It affects what is done with this process: “What you have done is to remove access to those applications that you do not use for security reasons“. You can also Control all devices connected to the iPhone. In your case there is a Mac.
Here it is also key to pay attention: “If you see any computer or device that you do not recognize and that you think it is not yours, eliminate it immediately, “ asks. iPhone It also allows you to activate the private relay of ICLOUD, which allows, as its proper one, navigate more privately “Since neither your location nor your history is going to be shared when activating it“Finally, in something similar to the passage of the iPhone, connected devices are checked To Apple’s account: “Eliminate those devices that you think have nothing to do with you.”
It also allows you to change the password, but it can be done without all this process in adjustments. Summarize what is done by following this process: “With this you have already made a security check and you have proven that your iPhone is completely sure”. Close with another recommendation: “I recommend that you do this whenever you are not very sure of any activity That is happening on your phone or if you believe that someone who is not authorized can be using your iPhone. “