International stories and articles from our Flipboard mag.

MAR
19

Documenting the NFT voyage: A journey into the future

Documenting the NFT voyage: A journey into the future

Did you miss a session at the Data Summit? Watch On-Demand Here.

This article is contributed by Felix Xu, cofounder of ARPA and Bella Protocol.

Non-fungible tokens (NFTs) had a fantastic journey in 2021, inaugurating one of the most remarkable episodes in the history of emergent decentralized industries. NFT trading volume stood at $2.5 billion in June 2021. It surged ten times in the next six months, with total NFT sales reaching a whopping $23 billion by December 2021. In contrast, the 2020 total NFT trading volume amounted to just $100 million

To grasp the extraordinary success story of NFTs, we need to chart their trajectory throughout the last year. This article will adopt a chronological approach to explain the NFT craze and what lies ahead of us.

Laying the foundations

Cryptocurrency historians often debate whether any singular event led to the explosion of NFTs in the crypto domain. While there is no definite answer, the sale of Beeple’s NFT art for $69 million created ripples across the global market. People suddenly saw a spurt in NFT projects with attention-grabbing headlines on newspapers and web portals. Moreover, most of these NFTs reimagined the nature of artwork with their finite series of algorithmically-generated collectibles. 

Continue reading
  215 Hits

Copyright

© Flipboard and it's respective authors

215 Hits
MAR
11

Germany Issues Guidelines On Email Marketing Under GDPR

Germany Issues Guidelines On Email Marketing Under GDPR

New guidelines have been in issued in Germany that could influence how brands conduct direct marketing by email and other channels. 

The guidelines were released last month by the German Conference of DPAs (the DSK), according to an article in JD Supra.

While non-binding, they have been adopted by federal and state data authorities, and seem to recognize that some uses of data for direct marketing can be deemed use for legitimate interests.

According to JA Supra, the guidelines cover the following points:

Existing customers/clients — The principles of consent and data protection under GDPR do not prevail if an email addresses has been collected “directly from the data subjects in the context of a contractual relationship (existing customers).”

Continue reading
  216 Hits

Copyright

© Flipboard and it's respective authors

216 Hits
MAR
11

7 useful Google Maps features you might not know about

7 useful Google Maps features you might not know about

Despite the strides we’ve seen from Apple Maps and even Bing Maps, there’s no denying that Google Maps remains the best mapping platform on the planet. If anything, Google Maps remain so far ahead of the competition that Apple Maps and Bing, even years later, are still trying to play catch-up. Say what you will about Android or any of Google’s innumerable endeavors, but the company has search and mapping on lock. And seeing as how Google Maps is brimming with somewhat hidden features, we’ve compiled a list of awesome Google Maps tips you may not be aware of.

As a quick aside, one of the many reasons why Google Maps reigns supreme is because Google, to its credit, hasn’t rested on its laurels. Rather than coasting on its past success, Google Maps has improved tremendously over time. With each passing year, Google Maps adds more and more features that ultimately enhance and improve the user experience.

Don't Miss: Friday’s deals: $4 Alexa smart plugs, Shark vacuums, $110 AirPods, more

Use Google Maps offline

If you need access to Google Maps but anticipate being in a location with poor connectivity, downloading Google Maps for offline use is key. If you’re about to embark on a road trip, or even if you are running low on battery, this little Google Maps tip is a life-saver.

To download Google Maps, simply fire up the app and tap your profile icon. You should see it in the upper-right-hand corner of your mobile device. A menu will then appear. If you scan the list, you should see an option for Offline maps. Upon selecting it, you can choose a mapping area to download. Note that Google will also give you a suggestion of a mapping area to download.

Continue reading
  293 Hits

Copyright

© Flipboard and it's respective authors

293 Hits
MAR
08

How Long It Would Take A Hacker To Brute Force Your Password In 2022, Ranked

How Long It Would Take A Hacker To Brute Force Your Password In 2022, Ranked
How Long It Would Take A Hacker To Brute Force Your Password In 2022, Ranked - Digg

Submitted by 14 hours ago

According to Hive Systems your passwords should be at least 18 mixed up characters for maximum security. Here's how long it would take a hacker to come up with as many combinations or passphrases before guessing your password.

Additional submission from Adwait:

Big Brands And Oil Ban Punish Russia As Moscow Makes New Pledge On Ukraine Refugees

Submitted 5 hours ago via ukraine

A U.S. ban on imports of Russia's oil ratcheted up punishment for the invasion of Ukraine on Tuesday as McDonald's and Starbucks closed outlets and Moscow promised safe passage for some people to flee.

  135 Hits

Copyright

© Flipboard and it's respective authors

135 Hits
MAR
02

How to Get More Referral Traffic from Your Offsite Links - ReadWrite

How to Get More Referral Traffic from Your Offsite Links - ReadWrite

By now, you’re likely familiar with link building as a central strategy in the world of search engine optimization (SEO). With the help of the right link-building services, you can establish a broad network of links pointing back to your site.

When you have links pointing back to your site, these links help you generate more authority and trustworthiness for your domain, which will then increase your likelihood of ranking highly for terms relevant to your brand. In short, lots of powerful links will boost your visibility in search engine results pages (SERPs).

But external links aren’t just about improving your authority; they’re also about increasing your referral traffic. Don’t forget that links still serve their first and most important purpose – aiding web users in getting to their intended destination. If placed and used correctly, your network of links can generate thousands of regular visitors to your website.

Publishers

You can start by focusing on the publishers you choose for your core content. Millions of different publishers are available online, from mega institutions that get millions of views to obscure niche publishers that barely get any traffic.

Choosing better publishers can mean the difference between an article getting no referral traffic and one that practically crashes your website due to its popularity.

Continue reading
  234 Hits

Copyright

© Flipboard and it's respective authors

234 Hits
MAR
02

How to downgrade Windows 11 to Windows 10

How to downgrade Windows 11 to Windows 10

Phil Desforges / Pexels

Continue reading
  234 Hits

Copyright

© Flipboard and it's respective authors

234 Hits
MAR
02

DDoS attackers have found this new trick to knock over websites

DDoS attackers have found this new trick to knock over websites

Distributed denial of service (DDoS) attackers are using a new technique to knock websites offline by targeting vulnerable 'middleboxes', such as firewalls, to amplify junk traffic attacks. 

Amplification attacks are nothing new and have helped attackers knock over servers with short busts of traffic as high as 3.47 Tbps. Microsoft last year mitigated attacks on this scale that were the result of competition between online-gaming players

But there's a new attack on the horizon. Akamai, a content distribution network firm, says it has seen a recent wave of attacks using "TCP Middlebox Reflection", referring to transmission control protocol (TCP) – a founding protocol for secured communications on the internet between networked machines. The attacks reached 11 Gbps at 1.5 million packets per second (Mpps), according to Akamai.

SEE: Cybersecurity: Let's get tactical (ZDNet special report)

The amplification technique was revealed in a research paper last August, which showed that attackers could abuse middleboxes such as firewalls via TCP to magnify denial of service attacks. The paper was from researchers at the University of Maryland and the University of Colorado Boulder.

Continue reading
  203 Hits

Copyright

© Flipboard and it's respective authors

203 Hits
MAR
01

Don't Build an Ecommerce Site If You Don't Have These 7 Things Covered

Don't Build an Ecommerce Site If You Don't Have These 7 Things Covered

Opinions expressed by Entrepreneur contributors are their own.

Businesses are turning to ecommerce platforms to help them sell their products. These offer a clean, user-friendly interface, customer support and other features that make it easy for you to get your products in front of new customers.

It is not surprising that users who had a negative experience on a mobile website are 62% less likely to purchase from that business in the future. This statistic only shows how crucial the design of your website is. Thus, your website must be accessible and easy to navigate on all devices to increase customer retention.

For an ecommerce business to succeed, it is crucial to have a well-developed site. The following are some of the essential factors that you need to take into account when setting up your online store.

1. A strong ecommerce platform

The first factor you need to consider is the ecommerce platform you will be using. Not all platforms are created equal, so you will want to make sure you choose one suited for your needs. Some factors you may want to consider are the level of customization available, the number of products you can list and the level of customer support.

Continue reading
  279 Hits

Copyright

© Flipboard and it's respective authors

279 Hits
FEB
28

The messy Googlefication of the PC

The messy Googlefication of the PC

We will never know how a thriving app ecosystem on Windows 10 Mobile might have filled the hole of touch-first native Windows apps on the desktop. However, the company's acceptance of Android on mobile is on the brink of progress, with the company steadily cracking open the door further to Android apps running on Windows 11. That move preceded more recent announcements by Google that it would bring Google Play Games to both Windows 10 and 11. As for Google's other operating system, the company recently rolled out the first public preview of Chrome OS Flex, its update to Neverware's body-snatching CloudReady OS that turned PCs and Macs into Chromebooks.

All of these initiatives offer significant limitations. For example, Microsoft's Android efforts include the constrained selection of Amazon's app store that has been relegated to the company's Fire tablets, not the de facto Google Play option familiar to over a billion users. Google will also deprive Windows users of many of its own signature apps by limiting its initial efforts to games. It's hard to see how both Microsoft and Google could dive into making Android apps available for Windows with wildly popular Android apps such as Gmail, YouTube, and the Google Workspace suite not making the journey, but such is the case. 

That the two companies are pursuing their own initiatives dampens the odds that Google Play will join the Amazon Appstore as a choice for Microsoft's approach despite Microsoft's stated desire to provide multiple Android app store options. Google promoting Android apps on Windows carries exponentially more promotion weight than today's options such as Bluestacks (which supports Google Play apps beyond games) can deliver, and Google's knowledge of the apps installed on Android phones could lead them to promote those apps' Windows availability. On the other hand, having Google Play available through Microsoft's Windows Subsystem for Android would allow tighter integration into the setup process. Let's hope the rival approaches don't lead to the kind of digital goading we experience in the turf war between the Edge and Chrome browsers. (Maybe they can bond more over Microsoft removing more apps from Google Play on Chrome OS.)

As for Chrome OS Flex, Google's promotion of it to business customers (It is hosted on the Chrome Enterprise portal) represents an upgraded positioning versus that of CloudReady. It represents return fire in the battle for business customers after Microsoft finally unveiled an alternative for those in Chrome OS's education stronghold in Windows 11 SE. (While Chrome OS Flex will presumably be available to anyone via download as CloudReady has been, Windows 11 SE is available only through the education channel.) Google plays up Chrome OS's manageability and security as an upgrade versus its operation on low-end hardware; for many consumers, CloudReady was the final lap of the PC lifecycle. Of course, as Flex progresses and offers such advantages as being on the same upgrade cycle as Chrome OS proper, having it run on more powerful business-focused PCs should provide a better user experience.

While these limitations and competitive approaches may slow the impact, the cumulative effect of a growing Android and Chrome OS presence on Windows can only bolster Google's influence on the platform; for example, the large-screen features introduced in Android 12L would improve the experience of Android apps on Windows devices. While this does little to calm the nerves of those who have accused Microsoft of lowering its prioritization of Windows, it's consistent with the message of openness that Microsoft played up in its introduction of Windows 11 and has recently revisited in the app store principles it has shared following the launch of its takeover bid for Activision Blizzard. While Microsoft may not be encouraging Google's move to bring Android games to Windows, Google would never be able to launch such a store on, say, the iPad (a hypothetical in that there would be no case for doing so).

Continue reading
  296 Hits

Copyright

© Flipboard and it's respective authors

296 Hits
FEB
28

CISA, FBI warn US orgs of WhisperGate and HermeticWiper malware

CISA, FBI warn US orgs of WhisperGate and HermeticWiper malware

The Cybersecurity and Infrastructure Security Agency (CISA) and FBI released new guidance on the WhisperGate and HermeticWiper malware strains in a joint advisory this weekend. 

The government agencies warned US organizations and companies to look out for WhisperGate and HermeticWiper after they were seen being used against organizations in Ukraine in the run-up to Russia's invasion of the country. 

Both CISA and the FBI reiterated that there is no specific threat against US organizations. 

"In the wake of continued denial of service and destructive malware attacks affecting Ukraine and other countries in the region, CISA has been working hand-in-hand with our partners to identify and rapidly share information about malware that could threaten the operations of critical infrastructure here in the US," said CISA Director Jen Easterly. 

"Our public and private sector partners in the Joint Cyber Defense Collaborative (JCDC), international computer emergency readiness team (CERT) partners, and our long-time friends at the FBI are all working together to help organizations reduce their cyber risk."  

Continue reading
  131 Hits

Copyright

© Flipboard and it's respective authors

131 Hits
FEB
28

Climate change is blowing our predictions out of the water, says the IPCC

Climate change is blowing our predictions out of the water, says the IPCC

When the International Panel on Climate Change published its last dismal forecast in 2014, it focused on the risks in years to come. Now that future is already here. A new 3,675 page-long report released by the IPCC today gives a detailed look at how the world has already destabilized—and how it will continue to do so until drastic action is taken.

“Today’s IPCC report is an atlas of human suffering and a damning indictment of failed climate leadership,” United Nations Secretary-General Antonio Guterres said in a statement. “With fact upon fact, this report reveals how people and the planet are getting clobbered by climate change.”

Currently, average global temperatures stand at about 1.09 degrees Celsius above pre-industrial levels. The Paris Agreement, which was signed by 174 countries and the European Union, aims to keep that rise under 1.5 degrees Celsius. At this level, climate change will still have a strong impact on the planet, but not nearly as much as an increase of 2 or 3 degrees. There is some debate on if the world can hit that goal with its current trajectory, and what must be done to stay below the 1.5-degree cap.

[Related: You can’t escape climate change by moving to New Zealand.]

The report, authored by 270 researchers spanning nearly 70 nations, describes how climate change is coming on harder and faster than anyone predicted. Additionally, it advises governments and communities to expand their adaptation strategies to protect increasingly vulnerable landscapes.

Continue reading
  207 Hits

Copyright

© Flipboard and it's respective authors

207 Hits
FEB
28

The Oddly Addictive Quality of Google Alerts

The Oddly Addictive Quality of Google Alerts

Google advertises its alerts as a way to “monitor the web for interesting new content.” To use them, you simply identify any word, phrase, name, or topic to follow; then the tech firm crawls the Internet looking for mentions, and delivers every new appearance of that term by e-mail. You can restrict the results by language and region, and choose among frequencies for how often you receive the notices (multiple times a day, in real time, or in digest form once a day or once a week) and also among sources (news, blogs, videos, or any Web site at all).

Most of my alerts for the book produced frequent, if unremarkable, results. “Harper Lee,” for instance, turned up mentions of the novelist that were occasionally useful—if someone had posted memories of her to a blog or if an auction house was selling a collection of her letters—but were more often a useless deluge of all the babies, dogs, and cats named in her honor. “Willie Maxwell,” however—the name of a preacher whose life Lee had researched and tried to turn into a true-crime book in the years after “To Kill a Mockingbird”—was another story. Decades ago, Maxwell took out life-insurance policies on his family members (five of whom he was accused of murdering), using several different names, among them Will, Willie, William, W.J., and W. M. Maxwell. Only one Google Alert reliably returned results: “Willie Maxwell,” a name that began appearing in my in-box with some regularity.

Every few weeks, I’d check my e-mail and find that Willie Maxwell was back in the news. A Danish songwriter was suing him for copyright infringement. Multiple outlets reported that police caught him drag racing while drunk on the Gowanus Expressway. He was arrested for allegedly assaulting three employees of the Mirage hotel in Las Vegas. His Hollywood Hills landlords sued him for nearly two hundred thousand dollars in damage to their house. Last fall, he was indicted for conspiracy to distribute fentanyl, heroin, and cocaine, and was released on bond after pleading not guilty. About a month later, he was arrested at Newark Liberty International Airport for an unrelated outstanding warrant.

My Willie Maxwell had been murdered by a vigilante during the summer of 1977, and, despite rumors that he was still haunting three counties in Alabama, he plainly had nothing to do with this Willie Maxwell. Willie Junior Maxwell II is the legal name of the rapper better known as Fetty Wap, whose musical career took off around the time that I started tracking the Reverend Maxwell. The year that I began writing, Fetty Wap became the first artist to have four songs simultaneously on the Billboard Top Ten for rap. “Trap Queen,” “Again,” “My Way,” and “679” were all songs of the summer, and Fetty Wap quickly became the star of my in-box.

If you set a Google Alert for “hot-dog cannon,” then chances are it works exactly as intended: infrequently delighting you with news about launchers designed to hurl hot dogs great distances. Broader terms, however, present a problem, especially when Boolean search isn’t an option: if ANDs, ORs, or NOTs might exclude the exact results you’re looking for, you end up suffering through the semi-relevant and not-at-all relevant in the hopes that, someday, the alert will turn up something actually relevant. My colleague Patrick Radden Keefe found that one of his alerts for his nonfiction book “Say Nothing: A True Story of Murder and Memory in Northern Ireland” was especially troublesome, not because people didn’t cover the Irish Republican Army (I.R.A.) and the “disappeared” enough but because he’d routinely receive e-mails like one that notified him of an article in the New York Post, titled “Real estate industry confidence skyrockets as commercial deals rebound,” which included one Ira Schuman saying, “The panic has disappeared.”

Continue reading
  122 Hits

Copyright

© Flipboard and it's respective authors

122 Hits
FEB
28

Are social media influencers misleading their followers about NFTS?

Are social media influencers misleading their followers about NFTS?

Non-Fungible Tokens (NFTs) are the latest craze taking over the internet, with seemingly unknown artists suddenly making millions. But following in the same chaotic path cryptocurrencies have taken before, the world of NFTs has exploded into an uncontrollable phenomenon.

Advertisement

While the concept of an NFT has been around since around 2015, they’ve reached a peak in the last year or two but especially in recent months. With the success that has now been achieved, NFTs have penetrated the world of celebrities and influencers.

Despite this sudden interest in NFTs, the image connected with the technology isn’t entirely positive. According to research by Tidio, roughly 82% of those who are Gen-Z and 51% of millennials believe that NFTs are scams.

Merav Ozair, a blockchain expert and fintech professor thinks this perception comes from a misunderstanding of the technology, and a perpetuation of hype and gimmick culture from influencers.

Continue reading
  225 Hits

Copyright

© Flipboard and it's respective authors

225 Hits
FEB
27

Tim Winton says Australia's climate change approach a 'dumpster fire of business as usual'

Acclaimed author Tim Winton has used a closing address at the Perth Festival to implore people and governments to wean themselves off a reliance on fossil fuels industries, calling the current approach to climate change a "smouldering dumpster fire of business as usual".

Key points:

Tim Winton, Stella Donnelly, and Pond frontman Nick Allbrook raised concerns about sponsor Woodside's Scarborough gas projectScarborough is expected to emit millions of tonnes of greenhouse gas annuallyThe festival says it receives support from sponsors representing the scope of WA business

Winton was the latest in a string of artists who used their appearances at the event to denounce Woodside's Scarborough gas project west of Karratha, as well as the company's sponsorship of a WA Symphony Orchestra (WASO) and WA Youth Orchestra (WAYO) event inspired by climate change.

Stella Donnelly and Pond frontman Nick Allbrook were among those to raise their concerns about the environmental impact of the project expected to emit millions of tonnes of greenhouse gas annually. 

Winton said in an interview with ABC Radio host Nadia Mitsopoulos that the fossil fuels industry had a disproportionate influence on society and culture.

"If we're trying to give ourselves any chance of meeting the climate challenge, the emergency that we're facing, then we've got to extricate ourselves from their influence," he said. 

Continue reading
  287 Hits

Copyright

© Flipboard and it's respective authors

287 Hits
FEB
27

Turn your website into an awesome app in minutes with this top-rated software

Turn your website into an awesome app in minutes with this top-rated software
Build and launch apps in minutes -- no coding required -- with this easy-to-use software.
Photo: Cult of Mac Deals

Did you know that you can bring your website to life as an app without needing to hire a programmer? Smart app-building software like AppMySite allows you to create and publish your own app in minutes.

And for a limited time, you can grab a one-year subscription to AppMySite for just $29. That’s a huge 93% discount off the regular price.

Turn your website into an app

Whether you run a website, blog or e-commerce site, AppMySite will let you quickly turn it into a native, customizable iOS or Android app in minutes. In just a few clicks, it’ll be ready to publish directly on app stores — no need to write a single line of code.

Simply connect to your site, personalize your app in real time and preview your app as you work. Then allow the fast software to build the app and publish to the app stores, straight from your AppMySite account.

With customers using your app rather than browsing your website, you open yourself up to a whole new world of direct communication with them, right where they live. You can sync website updates to the app for constantly updated content, and send unlimited push notifications to customers, driving them to new content or sales.

Continue reading
  281 Hits

Copyright

© Flipboard and it's respective authors

281 Hits
FEB
27

How to Build an Effective Twitter Account for Your Company

How to Build an Effective Twitter Account for Your Company

By now, if your company is not on Twitter, the only explanation I can think of is that you don't know how to use it and optimize it. 

Twitter is an incredibly powerful business tool. Many mistakenly view it as a sales platform or as a broadcast platform, when in reality, it's the most powerful listening platform out there. So if you want to get your company on Twitter but don't know where to start or what to tweet, here are some tips. 

Make sure to complete your profile and bio. 

Nothing screams unprofessional more than a company on Twitter that has no profile picture. The same is true for a bio. Tell me, your potential follower, who you are and why I should follow you.  

Be clear and concise and try to make yourself as relatable as possible. A slight touch of humor in your bio might go a long way. Putting a smile on someone's face should be your mission statement. 

Figure out who to follow. 

You can tell a lot about a person or a company based on who they are following. I am not even talking about the fact that when you follow someone and they find you interesting, there is a good chance they'll follow you back. 

Continue reading
  96 Hits

Copyright

© Flipboard and it's respective authors

96 Hits
FEB
26

The Interplanetary File System: How you’ll store files in the future

The Interplanetary File System: How you’ll store files in the future

When you upload a file or send a tweet, your information is stashed in some corporation-owned mega data center in the middle of nowhere. The endless racks of computers in these facilities hold millions of ledgers, and with a flick of a switch, companies can censor or misuse the data.

Contents

But what if instead of handing it to, say Amazon or Google, your data is broken down into pieces and scattered across the globe so that no one except you and your key — not even the government — can access it?

Decentralized cloud storage

That’s the idea behind a radical new online framework for storing data called the Interplanetary File System or IPFS. It went live a few months ago, and Skiff, an online document editor, is one of the first platforms to take advantage of it.

Skiff looks and behaves like any other productivity service you may be familiar with, like Google Docs. You can create new documents, edit them together with your colleagues, and generally use it just like you would any other docs program. However, when you toggle on its IPFS switch, it stores all those documents in a way that none of its counterparts can.

Continue reading
  77 Hits

Copyright

© Flipboard and it's respective authors

77 Hits
FEB
25

Microsoft Defender for Cloud can now protect Google Cloud resources

Microsoft Defender for Cloud can now protect Google Cloud resources

Microsoft announced today that Microsoft Defender for Cloud now also comes with native protection for Google Cloud Platform (GCP) environments, providing security recommendations and threat detection across clouds.

Defender for Cloud (formerly known as Azure Security Center and Azure Defender) is a security solution that monitors cloud services for threats, makes recommendations to harden security posture, and detects and warns of vulnerabilities in protected multi-cloud and hybrid environments.

"Today we're excited to announce that Microsoft Defender for Cloud now supports Google Cloud Platform (GCP) with its native CSPM and CWP capabilities, without any dependencies on Google 1st party tools," said Gilad Elyashar, Microsoft Partner Group Program Manager.

"The support for GCP comes with a simplified onboarding experience, more than 80 out-of-the-box recommendations to harden your environment, and more."

Continue reading
  82 Hits

Copyright

© Flipboard and it's respective authors

82 Hits
FEB
25

Enhance Your iPhone Experience by Changing These 20 Settings

Enhance Your iPhone Experience by Changing These 20 Settings

Changing these settings can help you get the most out of your iPhone.

Patrick Holland/CNET

From last year's iPhone 13, to the value-packed iPhone SE, to the still buy-worthy iPhone 11, the phone market is packed with Apple products offering all sorts of specs and features. But one trait unites most of these iPhones: compatibility with iOS 15, the latest version of Apple's mobile software. (Keep an eye out for 15.4, which is under development and just might make an appearance at the rumored Apple event on March 8.)

If your iPhone is running iOS 15, you might want to jump right into using some of the more popular features, like SharePlay in FaceTime or text recognition in your camera. But it's also worth paying attention to the settings, as there are many that you should consider changing.

Read more: iPhone's Hidden Trackpad Makes Editing Text Easier

Below, we'll take you through the steps to configure the settings that could make your iPhone even better. If you're looking for more about the latest from Apple, check out all the rumors we've heard so far about the iPhone SE 3 and iPhone 14

Continue reading
  92 Hits

Copyright

© Flipboard and it's respective authors

92 Hits
FEB
25

iOS 15 Features You Probably Didn't Know Existed

iOS 15 Features You Probably Didn't Know Existed

Privacy is important to Apple, and we appreciate that. In iOS 15, you can now lock your PDF documents stored on the device.

To do this, open Files and tap on Browse in the bottom right corner. Tap On My iPhone (this only works with PDFs stored on your iPhone, not on iCloud) then tap Downloads or the location your PDFs are located. Once there, tap on the thumbnail of the document, tap the Share icon, then select Lock PDF. You'll then be prompted to enter a password and verify it. This password will now be required each time you want to open the document.

To open your password protected document, navigate to its location, tap its thumbnail, and tap Password, enter your password, and then tap Go.

Original author: Barnes
  82 Hits

Copyright

© Flipboard and it's respective authors

82 Hits
Advertisement