Info

Apple Launches ‘Sign in with Apple ID’ Feature at WWDC 2019

0

Apple announced that they are launching the ‘Sign in with Apple’ feature which is a new, more private way to simply and quickly sign into apps and websites. This is similar to the ‘login with Google,’ ‘login with Facebook,’ Twitter, LinkedIn or any other social media site in which the user can quickly sign-up and log into third-party websites and apps using their Apple ID.

Apple states that signing-in with Apple ID would protect users’ privacy by not revealing their actual email addresses to the 3rd-party services, thereby limiting personal information to the minimum necessary data. The user need not have to use a social account or filling out forms, verify email addresses or choose passwords. They just have to use their Apple ID to authenticate, and Apple will protect users’ privacy by providing developers with a unique random ID.

The tech giant claims that the feature was designed to randomly generate a new unique email address for each service a user sign-up with, and will forward all emails to your primary email ID, internally.

These types of randomly generated emails are best to avoid spam. This not only helps the user to turn off spammy email easily, but also will be able to see who exactly is sharing and selling your email widely when that random address starts to get spam from companies buying up data.

This feature will be available as an API for developers who want to integrate the single-sign-on button on their apps and websites.

Even if the developers choose to ask for a name and email address, users have the option to keep their email addresses private and share a unique random email address instead.

The ‘Sign In with Apple’ feature makes it easier for users to authenticate with Face ID or Touch ID and has two-factor authentication built in for an added layer of security.

Priyanka R
Cyber Security Enthusiast, Security Blogger, Technical Editor, Author at Cyber Safe News

    GandCrab ransomware operators are shutting down

    Previous article

    BlackSquid malware uses exploits to drop crypto miners

    Next article

    You may also like

    More in Info

    Comments

    Leave a reply

    Your email address will not be published. Required fields are marked *