← All posts

What I Found Auditing Every Privacy Setting in iOS 26

I went through all 33 privacy and security settings in iOS 26 and categorized them by actual impact. Here's what matters, what doesn't, and what most guides get wrong.

What I Found Auditing Every Privacy Setting in iOS 26

I got curious about what my iPhone actually sends where after reading Apple's Platform Security Guide, the EFF's surveillance self-defense documentation, and Citizen Lab's Pegasus investigation reports. So I went through every privacy and security setting in iOS 26 and categorized them by actual impact.

This isn't a "turn everything off" guide. Some settings genuinely change what data leaves your device. Others are security theater. A few that get recommended everywhere don't actually improve your privacy at all. Here's what I found.

How I Evaluated Each Setting

Three criteria:

  1. Does it reduce data exposure to third parties? Not "does it feel more private" — does it measurably change what data leaves the device?
  2. Is it cited in Apple's own security documentation or independent research? Settings that Apple's Platform Security Guide specifically calls out, or that Citizen Lab, EFF, or academic research has validated.
  3. Has the vulnerability it addresses appeared in real-world incidents? Documented breaches, documented surveillance campaigns, documented data broker pipelines.

If a setting meets all three, it's critical. If it meets two, it's important. One, it's nice to have. Zero — and there are a few — it's overblown.


Tier 1: Critical — Do These Right Now

These are the settings with the highest real-world impact. Each one addresses a documented threat.

Advanced Data Protection for iCloud

What it does: Moves iCloud encryption keys from Apple's servers to your personal devices. With it off, Apple holds a copy of the key to your backups, photos, notes, and 22 other data categories. With it on, the keys exist only on your devices.

Why it's critical: This is the difference between "encrypted, but Apple can decrypt it with a court order" and "encrypted, and nobody can decrypt it — not even Apple." The encryption uses per-file keys derived from your device credentials, and the keys never touch Apple's servers in a readable form.

This isn't theoretical. In 2025, the UK government used the Investigatory Powers Act to demand Apple build a backdoor into this exact feature. Apple refused — and instead disabled Advanced Data Protection for all 35 million UK iPhone users. Privacy experts called it "a policy earthquake." If one government can force Apple to weaken encryption, others will try. Turning ADP on now means your data is protected even if that fight comes to the US.

The tradeoff is real: If you lose all your trusted devices AND your recovery key AND your recovery contact can't help, your data is gone. Apple cannot recover it. There is no backdoor, not even for you. Set up your recovery method carefully.

Settings path: Settings → [Your Name] → iCloud → Advanced Data Protection

Stolen Device Protection

What it does: When your phone detects it's away from familiar locations (home, work), it requires Face ID — not just the passcode — for sensitive actions like viewing passwords, using saved payment methods, and turning off Find My. Account changes like changing your Apple ID password require Face ID, a one-hour wait, then a second Face ID scan.

Why it's critical: This exists because of a specific, documented attack pattern. Starting in 2022, The Wall Street Journal reported a wave of thefts in US cities where thieves watched victims type their pascode in bars, stole the phone, then changed the Apple ID password within minutes — permanently locking victims out of their own accounts, photos, and financial apps. Some victims reported losses exceeding $10,000.

The one-hour security delay is designed specifically around this scenario. Investigations found most thieves attempted the password change within minutes of the theft. The delay gives you time to mark the device as lost from another device, which blocks the change entirely.

The location detection is smart: your phone compares current GPS against a locally stored, encrypted list of familiar places. No server call, no Apple involvement. The protection only kicks in when you're somewhere unfamiliar — which is exactly when a theft is most likely.

Settings path: Settings → Face ID & Passcode → Stolen Device Protection

App Tracking Transparency (Global Toggle)

What it does: Replaces your device's Identifier for Advertisers (IDFA) with a string of zeros for every app. The IDFA is essentially a license plate that advertising networks use to follow you across apps — "this device searched for running shoes in App A and then browsed a shoe store in App B."

Why it matters more than you think: There's a subtle distinction here that most guides miss. You can deny tracking on an app-by-app basis, but the global toggle is stronger: it prevents apps from even asking for permission. This matters because app developers are skilled at designing permission prompts that pressure you into tapping "Allow." The global toggle eliminates the prompt entirely.

Under the hood, denied apps receive a zeroed IDFA — the equivalent of a blank license plate. They can't follow you because there's nothing to follow.

Settings path: Settings → Privacy & Security → Tracking → Turn off "Allow Apps to Request to Track"

Location Permission Audit — Kill "Always" Access

What it does: Revokes background location access from apps that don't need it.

Why it's critical: This addresses a documented data broker pipeline. In 2020, 2023, and again in 2025, investigations revealed that apps — including weather apps, prayer apps, fitness trackers, and games — were collecting precise GPS coordinates and selling them to data brokers. One New York Times investigation found a single broker had location records for over 12 million US phones, accurate enough to track individuals to specific buildings: medical clinics, places of worship, domestic violence shelters.

The pipeline works like this: an app requests "Always" location permission for a benign reason, then embeds a data broker's SDK that continuously harvests GPS coordinates. The app developer gets paid per user. You have no idea it's happening.

The fix: go through Settings → Privacy & Security → Location Services and change every app to "While Using" or "Never." The only app that should have "Always" access is Find My iPhone. Everything else is a data leak.

While you're there: turn off "Precise Location" for everything except maps and navigation. When Precise is off, apps get a rough area of about 10 square miles instead of your exact GPS coordinates. Plenty for weather, useless for tracking your daily routine.

Settings path: Settings → Privacy & Security → Location Services


Tier 2: Important — Do This Weekend

These settings meaningfully reduce your data exposure but address less immediate threats.

Advanced Tracking and Fingerprinting Protection

Set this to "All Browsing" (iOS 26) in Safari settings. Fingerprinting is the sneakier cousin of cookie-based tracking: instead of planting a tracker, the website reads your screen size, installed fonts, battery level, timezone, and dozens of other signals to create a unique device profile. This setting makes your iPhone report generic, standardized values so it looks identical to millions of other iPhones. The fingerprint becomes useless.

Apple explicitly prohibits fingerprinting in its developer guidelines and has built this technical countermeasure to enforce it. Setting it to "All Browsing" instead of just "Private Browsing" extends the protection to your normal Safari sessions.

iCloud Private Relay

If you have iCloud+ (any paid storage plan), turn this on. It's a two-hop privacy proxy: Hop 1 (Apple) sees your identity but not which website you're visiting. Hop 2 (Cloudflare/Akamai) sees the website but not your identity. Neither relay has both pieces. The website sees the request but knows neither who you are nor your real location.

The critical caveat most guides skip: Private Relay only covers Safari traffic and DNS queries. Instagram, TikTok, banking apps — they all bypass it entirely and connect directly using your real IP. This is why Private Relay is not a VPN replacement. More on this below.

Tradeoff: Some websites that rely on IP-based location (sports streaming, banking fraud detection) may break. You can disable it per-network without turning it off globally.

Mail Privacy Protection

Turn on "Protect Mail Activity" in Mail settings. Marketing emails use invisible 1x1 pixel images to detect when you open them, where you are, and what device you're using. Mail Privacy Protection pre-fetches all remote content through Apple's proxy servers at random intervals — regardless of whether you've opened the email. The sender sees Apple's IP, not yours. They can't distinguish "opened" from "not opened" because everything appears pre-loaded. Open rates from Mail users effectively become noise.

Almost no downside. Turn it on.

Passkeys (Adopt Them When Offered)

This isn't a toggle — it's a habit. When a website offers to upgrade to a passkey, say yes. Passkeys use public-key cryptography: your phone generates a key pair, keeps the private half locked in the Secure Enclave (a physically separate processor with its own encrypted memory), and sends only the public half to the website.

The security property that matters: passkeys are not just harder to phish than passwords — they are mathematically impossible to phish. The private key only works with the exact domain it was created for. A fake login page presents a different domain, and the cryptographic handshake refuses to proceed. There's no code to intercept (unlike 2FA), no password to steal, and nothing on the server worth taking.

Control Third-Party AI Integrations

In Settings → Apple Intelligence & Siri, you can disable ChatGPT and Gemini integration or require confirmation every time. Here's why this matters:

Apple Intelligence processes most tasks on-device or through Private Cloud Compute (PCC). PCC's guarantees are architectural: stateless processing in volatile RAM only, no disk writes, no identity association, and independently verifiable software images. These are technical guarantees.

But when Siri sends a query to ChatGPT or Gemini, the protections shift from architectural to contractual. Apple says requests are anonymized and IPs are hidden. OpenAI and Google are contractually prohibited from using query data for training. That's a legal agreement, not a hardware constraint. If you're comfortable with that distinction, leave it on. If not, disable third-party integrations while keeping on-device and PCC processing active. You lose complex "world knowledge" questions. You keep your data within Apple's verified architecture.


Tier 3: Nice to Have — If You're Thorough

These are real protections but lower impact for most threat models.

  • App Privacy Report — A 7-day log of which apps accessed your camera, microphone, location, and contacts, plus which internet domains they contacted. iOS 26 categorizes domains as "Advertising," "Analytics," or "System Functional." Check it once a week — if a flashlight app is contacting advertising domains, delete it.

  • Private Wi-Fi Address (Rotating) — Replaces your device's real MAC address with a random one per network. On iOS 26, "Rotating" periodically changes the fake address even for the same network, preventing long-term tracking at a single location. Edge case: some corporate Wi-Fi uses MAC filtering and may not work.

  • Significant Locations Auto-Delete — iOS 26 lets you set auto-delete for your location history (Settings → Privacy & Security → Location Services → System Services → Visited Places). Set it to 3 months. You keep commute predictions in Maps without maintaining a permanent record of everywhere you've been. This data is encrypted and on-device only, but it's a liability if your phone is physically compromised.

  • Hide My Email — Creates disposable email aliases that forward to your real inbox. Your email address is the most common way data brokers stitch together your activity across services. Fragmenting it across unique aliases breaks the chain. Requires iCloud+.

  • Safety Check — Not a setting but a tool worth knowing about (Settings → Privacy & Security → Safety Check). "Emergency Reset" instantly stops all location sharing, revokes all data access, and signs you out of iCloud on all other devices. Designed for domestic abuse situations where someone needs to cut off a controlling partner's digital access immediately. I hope you never need it. Know it exists.

  • Carrier Location Limiting — iPhone 16e, iPhone Air, and newer models with Apple's C1 modem can limit the precision of carrier-based location estimation (Settings → Cellular → Mobile Data Options → Limit Precise Location). Carriers can estimate your location from cell tower connections, and some have been caught selling this data to third parties. This toggle reduces that estimate to neighborhood-level.


Tier 4: Overblown — Most Guides Get These Wrong

These get recommended in every "iPhone privacy" article. They don't actually help much.

"Turn Off Personalized Ads" Is Not What You Think

Every privacy guide tells you to turn off Apple's Personalized Ads (Settings → Privacy & Security → Apple Advertising). And yes, you should. But many guides conflate this with the IDFA toggle and imply it stops all ad tracking. It doesn't.

This setting only controls Apple's small advertising network inside the App Store, News, and Stocks. It changes which ads you see in Apple's own apps from personalized to generic. It does not affect third-party ad tracking, does not change what data apps collect, and does not zero out your IDFA. The IDFA toggle (Tier 1) is the one that actually cuts off cross-app tracking. This one is cosmetic by comparison.

Turn it off — it takes two seconds. But don't confuse it with the setting that actually matters.

VPNs Are Oversold for Most iPhone Users

VPN recommendations are the most overblown advice in the iPhone privacy space. Here's the honest take: a VPN encrypts all your traffic and hides your IP from every app and website. That's valuable if you regularly use public Wi-Fi at coffee shops, airports, or hotels.

But for the majority of users who primarily use home Wi-Fi and cellular data, iCloud Private Relay covers the most critical case (Safari browsing), and your cellular connection is already encrypted in transit. A VPN shifts trust from your ISP to the VPN provider — you're not eliminating surveillance, you're choosing who does it. Many VPN providers have been caught logging traffic despite "no-logs" policies.

If you need a VPN, get one. But don't let VPN marketing convince you it's the most important privacy tool on your phone. For most people, it's not even in the top five. The settings above — ADP, Stolen Device Protection, the IDFA toggle, the location audit — are all higher impact.

Resetting Your Keyboard Dictionary

Chapter-level privacy guides sometimes recommend resetting your keyboard dictionary (Settings → General → Transfer or Reset iPhone → Reset → Reset Keyboard Dictionary) to clear learned words and phrases. This is fine as a one-time cleanup, but it provides minimal ongoing privacy benefit. Your phone immediately starts rebuilding the dictionary from your typing. The data is on-device only and not transmitted anywhere. Of the 33 settings you could spend time on, this is among the least impactful.


The Apple Intelligence Nuance

iOS 26's AI integration deserves a more nuanced take than "it's fine" or "it's spying."

Most Apple Intelligence processing happens entirely on your device. The on-device models never send your data anywhere. For tasks requiring more compute, Private Cloud Compute is genuinely well-architected: processing happens in volatile RAM on Apple Silicon servers, data is never written to disk, there's no identity association, and the software images are published for independent verification. This "verify, don't trust" approach is unprecedented for a major tech company.

The weak link is third-party routing. When Siri sends a query to ChatGPT or Gemini, the guarantees downgrade from hardware-enforced to contract-enforced. Apple says the queries are anonymized. OpenAI says they won't train on it. These are business commitments, not physical constraints. You can turn off third-party integrations without losing on-device or PCC functionality.

The most useful thing you can do: check the Apple Intelligence Report periodically (Settings → Privacy & Security → Apple Intelligence Report). It shows exactly what was processed where — on-device, PCC, or third-party. Let the data inform your comfort level rather than guessing.


Things That Surprised Me

Apple's hidden System Services menu. Buried at the bottom of Location Services → System Services is a set of toggles controlling Apple's own background location collection — iPhone Analytics, Routing & Traffic, Improve Maps. These send location pings to Apple to improve their services. Most people never scroll far enough to see them. Turning them off doesn't affect your maps or any other functionality. Your phone just stops volunteering its location to Apple in the background.

The sophistication of Stolen Device Protection's location detection. The phone compares current GPS against a locally stored, encrypted list of significant locations. No server call, no Apple involvement, no network dependency. The protection activates based on a purely on-device computation. The one-hour delay was designed around documented theft timelines — most thieves attempted Apple ID password changes within minutes of theft. The delay is precisely calibrated to give victims enough time to react.

Mail tracking is more pervasive than I expected. Almost every marketing email contains an invisible tracking pixel. Before Mail Privacy Protection, every email you opened reported your IP, your device, and the exact time back to the sender. Turning on one toggle turns every sender's open-rate analytics into noise. It's one of the highest-impact, lowest-effort settings on the phone.

Private Cloud Compute is genuinely novel. I was skeptical, but publishing verifiable software images for independent audit is a real commitment. Most "trust us" claims from tech companies are unfalsifiable. Apple's claim is falsifiable — researchers can check. That's a meaningful difference, even if you remain skeptical of the company.


The Bottom Line

Out of 33 settings, about 7 genuinely change your privacy posture in measurable ways. Another 8-10 are worth doing if you're thorough. A few that get recommended everywhere are mostly theater.

The biggest privacy risk for most iPhone users isn't a hacker or a spy — it's inertia. Apple's default settings are more privacy-respecting than any other phone manufacturer, but "more private than the competition" isn't the same as "private." The gap between factory defaults and a hardened configuration is substantial, and most people never close it simply because they don't know the settings exist.

I compiled all 33 settings into a step-by-step guide with tappable deep links that open each Settings page directly: betterbetterbooks.com

This is 1 of 8 chapters in iPhone Lockdown — the expert-backed guide to locking down your iPhone in 30 minutes.

Get the full guide$29$19

Launch price: $19 (regular $29). Ends April 17.