Type your text in iMessage then tap the eMoji keyboard and each item that has a replaceable emoji will highlight in red and click each one that you would like to replace and you will have a very cool iMessage.
iPhone Tracking Frequent Locations
Over the past 5 years or so we’ve heard and seen a lot about cell phone tracking. I’d like to point out an often overlooked tracking on your iPhone, it’s called frequent locations. Your iPhone tracks where you’ve been and how long you’ve been there, doesn’t sound bad if it’s just tracking your travels to and from work, right? But it knows how long you’ve been out of the house, how long you’ve been at work, or at Home Depot, it’s a little too much information for me.
So if you want to turn it off, while still being able to use HomeKit or shopping apps, follow these steps.
Go to Settings, scroll down and tap Privacy, at the very top you’ll see Location Services, it’s probably on to give you the tracking you want. Tap Location Services and scroll down to the bottom and tap System Services. Now school down and tap Frequent Locations, it’s probably on, so you can review the tracking that’s gone on. Now ,Tap Clear History, to purge this data, then turn the Frequent Locations off. this will stop the Frequent Locations tracking.
I’d suggest you do this each time iOS updates, because we all just tap “Agree” and that may reset the Frequent Locations tracking.
By the Way it’s much worse on an Android Phone, because this data is tracked through Google and can be used by anyone with permissions on the phone.
This is my source:
See Link: https://support.apple.com/en-us/HT205236
iMessage is encrypted end-to-end during the conversation but when you back up to iCloud it is no longer encrypted end-to-end. It is encrypted but Apple or a Warrant can review everything in your iMessage Account. This happens if either person backs up using iCloud.
End-to-End encryption is the very best kind and it can not be hacked into in what is called Man-in-Middle, in other words only the two people one on each end can read the conversation.
One reason for letters being placed in envelopes is for the content not being read along the way to the intended recipient. That is also an excellent reason to place eMail in encrypted services such as ProtonMail. See Post on ProtonMail.
One of my favorite apps is the Walmart App… The best part about it is the “Savings Catcher”… When you make a purchase at Walmart, open the app – go to “Savings Catcher” and scan the QR code on your receipt – right in the app.
The app will scan the advertised prices of the item you purchased at Walmart – using a number of stores. If they find it cheaper somewhere else – you get the difference back in the form of Savings Catcher Reward Dollars – which can be redeemed for a Walmart Rewards eGift Card.
To use your eGift Card at Walmart – simply print out the email with the barcode and hand it to cashier at Walmart. Or you can use it online.
STAY ALERT: SIMPLE WAYS TO AVOID CELLPHONE “SCAMS”It’s happened to all of us: we get a strange call or message on our phone from someone we don’t know, offering a service we didn’t ask for, or requesting personal information that somehow just doesn’t feel right.
Protecting your personal information from phone scammers is a frustrating necessity of modern life. Fortunately, by staying alert and following the common sense guidelines listed below, you can stay protected and help foil purveyors of potential fraud.
Don’t answer calls from unfamiliar numbers. Let the call go to voicemail instead. This will give you the chance to find out who the person is and what they may be calling for.
If you do answer: don’t volunteer information to the caller. Instead, hang up and call the company directly. That way, you can confirm if the company is actually the one calling you and you’ll know you’re talking to the right person.
Don’t respond to suspicious text messages. It’s always important not to share secure information (bank account information, Social Security numbers or other personal identification data) unless you can safely verify whom you are providing it to. If you receive a request by text, call the company directly to confirm whether they’ve actually sent the message. Most reputable companies will not request confidential information by text message.
Download content only from trusted sources. Ringtones or apps should only be downloaded to your phone from Apple’s App Store or the Google Play Store. Files from other sources could easily contain malware or viruses that could compromise your phones security.
Password-protect your cellphone. Putting a password in place makes sure no one else will be able to access your stored information if you lose your phone.
Only enter personal information into secure sites on your phone. If you are making a purchase or sharing confidential info on your phone, make sure the site is listed as “https.” This will ensure secure encryption of the data you are sending.
Use only secure/password protected Wi-Fi networks. Before you connect to a Wi-Fi network, make sure it requires a password to ensure that your data will be secure.
The same rules apply to cellphones as anything else: if it sounds too good to be true, it probably is. And if it doesn’t feel right, it probably isn’t. Take a few extra steps to protect yourself. If the person contacting you is legitimate, they’ll certainly understand—and appreciate—your concerns.
Provide by ConsumerCellular