Skip to main content

Cognitive Dissonance required to Secure iPhone

I was just sent a link to a good article on smart phone security and safety.  It got me thinking about the mistakes I had made in my iPhone info security strategy.  Why had I made these simple mistakes?

Common Sense Security for Your iPhone

This article is about the basic.  Since I've had my iPhone stolen on a trip to Europe I'm an expert.  My iPhone had at the time: Find My iPhone installed and active.  But it didn't work, as the iPhone was in Airplane mode (being in Europe and off the home AT&T network).  Since the iPhone would not connect to the network, the Wipe Commands from Apple would never reach the iPhone (in Airplane mode).  A severe limitation to the security while traveling out of country (and an opportunity for a global service provider).

My iPhone had Passcode turned on, it had SplashID - a safe for sensitive info like credit card numbers, etc.  I had all my credit card info, banking account numbers, driver's license, passport info, tons of membership cards in the SplashID app.

After trying to wipe the iPhone when it went missin
I tried to remote wipe the iPhone when it went missing.  After hours of turning the state room up side down and inside out.  Using the ship-board Internet connection was difficult, time consuming and results-questionable.  But the wipe never worked.  My best guess, even after talking with Apple tech support, is that the airplane mode assisted the thief - foiling the wipe.

I found the thief had most likely sold the iPhone because it appeared to have come into the possession of someone in the Asian content.  The phone was lost in Italy.  The possessor was using my Mobile Me account to store their contacts.  I emailed their mother and explained the appearance of their child's new iPhone that looked slightly used.  It may have been purchased on the black market.  Mom never responded to me.

What mistakes had I made?  I was quite panicked and sick.  Some of my credit card info was also in the iPhone's Contacts app.  Other sensitive info was in the Camera apps photo album (pictures of my passport and credit cards).

These mistakes were made because of the cognitive dissonance require for one to secure their smart phone.  One has the mental model that the apps and info stored and accessible via the iPhone should be quick to access and retrieve.  This model is in direct opposition to the need to secure the info.  Putting it into the safe requires several extra steps, retrieving it requires several extra steps, the discipline to segregate the info requires cognitive dissonance.

When I'm at the airplane checkin counter and the clerk ask for my frequent flyer account number, rather than finding it in the contacts app, I have to retain the discipline to open the safe, login to the safe, search the safe for the card and then I can answer the query.

But, I've learned a lesson. Yes, I failed.  I'm turning it into success. Now I'm just practicing, practicing, practicing the lesson.  I hope you will also.
Post a Comment

Most Popular on Agile Complexification Inverter

Where is Shakespeare When We Need Him?

We are desperately searching for a term for people that connotes the best of human kind.  The creative, sensing, combinatorial synergistic, empathic solutioning persons that have yet to been labeled with a role name that works.

Some of the old terms:
Staff, Workforce, Human Resource, My Team, Army, Company

Shakespeare created 1700 words in his time.  He mutated verbs to nouns, and vice-a-versa, transformed verbs into adjectives, and formed words from whole cloth never before heard.  This skill is rare, but there is a poet that can create the term we need in the twenty-first century.

What should this term define?

21st Century Human Resource; the generalizing specialist.

Yes, but what more?  What less?

Suggest your poetry in the comments, let us see if we cannot do 1/1700 as well as The Bard.

By-the-way; who create the phrase "coin a word"?



A TED Play List - How do you create new words
6:52
Erin McKeanGo ahead, make up new words! In this fun, short talk from TEDYouth, lexicographer Er…

Elements of an Effective Scrum Task Board

What are the individual elements that make a Scrum task board effective for the team and the leadership of the team?  There are a few basic elements that are quite obvious when you have seen a few good Scrum boards... but there are some other elements that appear to elude even the most servant of leaders of Scrum teams.









In general I'm referring to a physical Scrum board.  Although software applications will replicated may of the elements of a good Scrum board there will be affordances that are not easily replicated.  And software applications offer features not easily implemented in the physical domain also.





Scrum Info Radiator Checklist (PDF) Basic Elements
Board Framework - columns and rows laid out in bold colors (blue tape works well)
Attributes:  space for the total number of stickies that will need to belong in each cell of the matrix;  lines that are not easy eroded, but are also easy to replace;  see Orientation.

Columns (or Rows) - labeled
    Stories
    To Do
    Work In P…

Situational Leadership II Model & Theory

Have you ever been in a situation where you thought the technique needed to move forward was one thing, yet the person leading (your leader) assumed something else was what was needed?  Did you feel misaligned, unheard, marginalized?  Would you believe that 54% of all leaders only use ONE style of leadership - regardless of the situation?  Does that one style of leading work well for the many levels of development we see on a team?

Perhaps your team should investigate one of the most widely used leadership models in the world ("used to train over 5 million managers in the world’s most respected organizations").  And it's not just for the leaders.  The training is most effective when everyone receives the training and uses the model.  The use of a ubiquitous language on your team is a collaboration accelerator.  When everyone is using the same mental model, speaking the same vernacular hours of frustration and discussion may be curtailed, and alignment achieved, outcomes …

One Dark and Stormy during a Hurricane

I'm from the Carolina's where legend has it that our family commonly just hunkered down in the home on the coast and waterways than to head for inland shelter. Now that's from the old school days of barely improved (read paved) roads. They counted a storms severity by how high on the back porch steps (about 15 - top to ground) the water reached.  I don't recommend this action in todays world of long range forecast and transportation options.

I do recommend a drink or two in a hotel bar, far far away.

This is the week that Harvey came ashore in Texas.  I live on a hill in the little old town of Grapevine outside Dallas and Fort Worth.  And thank you all for letting me know that a storm is coming... I didn't get out and walk Malibu before the rain hit, so I grabbed a hat and we went anyway.  Much nicer walk with the drizzle, I'd say.

I'll raise a glass to you - if you were not smart enough to do the responsible thing, at the last responsible moment.

I do re…

Software Development terms applied to Home Construction

Let's Invert the typically wrong headed view of Software Development project management as a construction project.  We can map it the other way just to see if it works... to have some fun, to explore the meaning of phrases we toss around quite frequently.


Normally Project Management terms come from a construction domain.  We are going to apply the lexicon of modern software to the construction of a home.  We will follow the construction project and meet some of the people doing the work.

This is a very small (8 homes from $600,000 skyward) program in my 30-40 year old neighborhood.

About 6 months ago I saw the programs landing page go up.  It gives casual observers and some of the stakeholders a general idea of the intent of the program.  And most importantly who to contact for additional information if you happen to be interested in their products.

The Refuge program has 8 product projects and has them running independently.  Yet much of their DevOps infrastructure has already b…