800 Million Android smartphones is indeed greater than 300 Million iPhones. I want to put emphasis on iPhones and not any other smartphones. This was a result during the December 2013 study on how many people actively use Android smartphones and iPhones. Nowadays, with the advent of iPhone6, for sure the number of iPhone users increased! If there is a new line of gadget being released, it automatically mans that the iPhone model preceding that newly released model will become cheaper than its normal and usual price range. Because of this, a lot of people are enticed to purchase a new set of iPhone even though it if it is not the latest model. Affordability has always been the problem with iPhone if you compare it against other Android running OS smartphones.


Why are iPhones more expensive than regular Android smartphones? For starters, one of the obvious reasons is, Apple acts more like a status symbol nowadays. Since a lot of people know that it is expensive, people who own any Apple product is automatically stereotyped as rich or someone who can afford the luxurious price of having an Apple Product. But for some people who were able to try to explore both Apple and Android devices, they can completely tell the difference between the performances of the two competing devices.

The most common reason why people admire Apple products is, Apple OS is bug-free and will surely keep you lag free too! You will never experience the hassle of constantly restarting your phone in order to fix some bugs or in order to kill apps that are malfunctioning or silently running in the background that takes up half of your RAM and phone battery. Plus, you can open a ton of apps all at once and your iPhone will still respond to its normal speed. Unfortunately for Android, the device runs slower when there numerous amount of apps running. Sometimes, the screen would totally freeze, like a cell phone having a heat stroke, and will automatically restart on its own. This factor is deemed important because nobody would love to have a mobile phone that keeps on lagging every time the user tries to open another without closing the previous running app. In this sense, iOS provides a very clean and completely functional operating system resulting from flawless engineering and craftsmanship.

Just a year ago, Apple released a new series of their iPhone which is the iPhone 6 and iPhone6 Plus. With this, Apple is highly respected in the industry because it never fails to meet the expectation of it consumers by providing constant innovations and updates to their products. With Apple devices, stagnation is a complete nonsense. The idea is to keep on innovating and keep on moving forward.

Exclusivity is also one of the reasons why iPhones are more expensive than other brands. For some reason, you cannot share some of your files to other devices via Bluetooth. However, if you want to share files with other co-Apple products, sharing is as easy as pie. By using AirDrop, sharing a hundred or two hundred photos will surely take you only a short period of time compared to other android Bluetooth file sharing. Another idea of exclusivity is that there are a lot of apps specifically created to be sold and to be available on Appstore and not in Playstore. Apple has a lot of apps and features that cannot be copied by any other Android device. An example for this is Apple’s iMessage and Facetime.

iMessage will allow all apple users with iOS 5 and up to send texts, multimedia files like photos and videos, contact information and group messages by using Wi-Fi, or any cellular data connection.

FaceTime has developed from WiFi-only app to a cellular-network-enabled app. Which means that before, you can only make video calls when you are connected to the WiFi, but now, you can completely use your cellular data connection in order to do video telephony.

However, with the huge number of hacking nowadays, Apple has decided to expand their security with extra security features in order to safeguard the privacy of messages and video chats made in iMessage and FaceTime. Apple released the latest two-step verification process for both iMessage and FaceTime.

Before, the text messages and video calls were protected with a single password which is the same password used in the user’s Apple ID. This was a little bit unsafe for some users because once the hackers attain access to your Apple ID and password, the hacker can completely go into your files and most importantly, your messages. This is why there are a lot of leaked naked or nude photos of celebrities circling the web. The one password you have for everything is very dangerous once it falls into the wrong hands. Lives could be ruined, reputations could be stained, and security could be jeopardized. That is why Apple decided to slowly and steadily shore up their security for their consumers’ welfare.


The said two-factor authentication will require the users to think and create a more complex and more difficult password. In addition, another PIN code will be prompted as a verification of the user’s identity. This PIN code is composed of 4 digits, totally chosen at random by the user.

Indeed, Apple has received a huge amount of scrutiny from their users after iCloud accounts of famous celebrities were hacked and breached, thus resulting to the circulation of their private and embarrassing photos. The Apple ID is the main key that will give you access to use the different features and apps in your Apple device – this includes updating your iCloud, purchasing in iTunes, iBooks and App Store. Therefore, it is important that you protect your Apple ID like protecting your SSN. You should always keep it private and you should not disclose it to anyone if your security and privacy mean a lot to you – especially if you know that you have a lot of secrets hidden in your closet.

In this case, if ever the hacker will get hold of such valuable information, they could log in using your Apple account and Apple account password but they would not be able to access whatever is inside you iMessage and FaceTime without an SMS text code or emergency recovery code. Not only will it prevent your messages from being hacked, it will also stop the hackers from sending text messages to whoever is in your contacts and stop them from obtaining valuable personal information about them. The worst thing that could ever happen to you is to have someone totally pretend to be like you, sending scams and horrible messages to the people in your circle. Identity theft is not a light issue wherein everyone would love to go through.

To set up your two-factor security, follow the simple steps written below:

  1. Access your Apple ID with your browser. You can do this by using either desktop or mobile device.
  2. Sign in using your Apple ID and press Manage Apple ID
  3. Select Password and Security. Input the necessary information that will buff up your security like assigning security questions that only you know the answers to.
  4. Once you have clicked the Two-Step Verification, press Get Started and follow the instructions on the screen.

After reading the instructions and warning, you need to agree to the following warnings in order to set up this feature. Finish the process and wait three days before you could start using this feature. One good thing about this is that Apple will give you the exact date and time when you could actually revisit your Apple ID and manage your two-step verification feature. No need for you to constantly check your Apple account. Just mark the date and time on your calendar and it will save you the hassle of patiently waiting in vain.

On the process of activation you Two-Step Verification feature, Apple will advise you to register at least one trusted device. This trusted device will receive the four-digit code via SMS. The four-digit code could also be retrieved via “Find My iPhone” which is another unique feature of iPhones that will help you protect your lost or misplaced iPhone by using iCloud to access its location or disabling your debit cards and Passbook.

If ever someone else will try to sign in using your Apple ID or iCloud, or even make purchases on iTunes, iBooks or Appstore, Apple will prompt your password plus the 4-digit verification code that you set up in you Two-Step Verification feature. This will prevent identity theft, leaked private photos and unwanted or unknown purchases.

However, since Apple has this one Apple ID for every iCloud account and every device, there is a possibility that the usage will be jeopardized if the user itself tend to forget about the security questions, password and the 4-digit verification code he or she assigned, there is a recovery process that Apple provided for its users. Apple will set a 14-character (Yes, this includes letters and numbers) Recovery Key that will be used to retrieve your password and verification code. Apple suggests that this 14-character Recovery Key should be kept in a safe and accessible place.

Although the Two-step authentication method does not require a physical component in order to keep your account safe, it heavily relies on SMS messages. We should not close our doors to the possibilities that there are exemplary hackers that can divert these messages into another number and thus, will have the access to your 4-digit verification code. Luckily for specific iPhone and iPad models, they have a special feature known as Touch ID.

Touch ID is an exclusive feature design by Apple Inc. that uses fingerprint recognition in order to unlock your Apple device. This feature is only available to iPhone 5S, iPhone 6, iPhone 6 Plus, iPad Air 2 and iPad Mini 3. It is integrated to the device and will allow the user to unlock his or her device by simply putting the registered finger on top of the Touch ID home button. This feature is so advanced that provides a mountain of convenience to its users. Even if you are in a public area, trying to walk your way home, the Touch ID home button will be able to recognize your finger even if you have been mobile, or even if you were only able to use half of the finger or even just the corners of your finger. In addition, you can also use Touch ID as an alternative of inputting your Apple ID password. This way, there will be no need for you to sulk in the corner while you are trying to hide you Apple ID password from being seen or accidentally read in public. You can just put your finger over the Touch ID home button and the fingerprint scanning will do the rest. However, since you can add other fingerprints for Touch ID, make sure that your other fingerprint is still yours or of another person whom you trust your whole life with.

In a conference in London, the chief executive of Global Identity Foundation, Paul Simmonds complained about the security industry in technology. He criticized the failure to provide a universal and acceptable method of authentication and protecting people’s privacy. Of course, messages, communication and files in private sectors are very well protected by using something like Silent Circle encryption devices, however not every user has the access to such encryption device which exposes the public or consumers to infinite threats of being hacked.

What the Global Identity Foundation is trying to convey is that it would be better and more convenient if we take a different approach to identity verification if we create a global identity system. This global identity system will promote privacy enhancing on a global scale. This way, rights to privacy are not only limited to people in private sectors or people who could afford it but to all the possible consumers who have every right to be protected of their privacy. All entities will be accepted in the system and will give them the privilege to rely on a digital identity with a known level of trust.

Apple Adds Two-Factor Security for Both iMessage and FaceTime0Jennifer Sandra2015-02-25 07:49:58800 Million Android smartphones is indeed greater than 300 Million iPhones. I want to put emphasis on iPhones and not any other smartphones. This was …