Joe Kissell, the fellow behind Take Control Books, has a new, live course: Taming Big Tech. As a multi-decade writer and teacher, and someone deeply skeptical about the invasive power of the biggest technology firms in our life, Joe is aptly placed to offer rich, practical insight. The four roughly 90-minute sessions include time for questions from participants. The course starts May 23, 2026, and then takes place every two weeks through July 11. All sessions are recorded in case you miss one, or for later playback.
Joe’s covering a lot in this course, but you can distill it down to a few principles: how to ensure your private information remains under your control, what you can do (if you want) to migrate from Big Tech products and services to alternatives, and how to minimize or eliminate privacy risks. The course includes a discussion forum, downloadable PDFs, and optional homework and quizzes, which can be a useful way to ensure your understanding of material. I trust Joe’s insights and his teaching approach, not only because (disclosure) I’m the Executive Editor of Take Control Books, but because I’ve seen over that time how patient he is at explaining the frustrating things tech companies (including Apple) do to us, instead of for us.
VoiceOver and Magnifier will gain AI-powered features that can provide enhanced image description, using the device camera. VoiceOver’s Image Explorer will use Apple Intelligence to give more detailed descriptions of what’s in photographs, scanned documents and labels, for example.
Magnifier users will be able to scan a document, then ask questions about its contents, with answers provided by Apple Intelligence. The feature will also be available to VoiceOver users.
With updates to live recognition, VoiceOver users can press the iPhone action button to quickly ask a question about what’s in the camera viewfinder and get a detailed response. Users can also ask follow-up questions in their own words to get more visual information. These question features resemble what’s available to users of the Be My Eyes app’s Be My AI feature, but it’s unclear whether Apple’s offerings will go further.
Magnifier for iOS and Mac will include the same Apple Intelligence-powered options, which can be used with speech or high-contrast onscreen text. Magnifier users will also be able to speak to the app, to get more specific information about their surroundings, or to ask follow-up questions.
Voice Control is set to get an Apple Intelligence boost, giving users the ability to describe an element onscreen they want to act on, instead of using a numbered grid, or remembering an item’s label. The natural language support should also allow Voice Control users to navigate apps or elements that aren’t labeled for the feature.
Accessibility Reader, which renders onscreen text in ways that are visually more accessible, including larger fonts, high-contrast backgrounds, and clutter-free layouts, will provide AI-generated summaries on demand, and can translate text into the user’s chosen language.
AI-generated captions will be available alongside standard SDH and closed captions, and also in places where no captions are provided otherwise. They’ll be available on macOS, iOS, Apple TV and Vision Pro, and they can be styled to meet the viewer’s taste or needs.
Power wheelchair users looking for a reason to try Vision Pro might find one in this year’s accessibility announcements, especially if they use an alternative drive controls to steer the chair. Those who can’t use a standard joystick to navigate often employ sip-n-puff switches, head arrays or other devices. With this year’s updates, Vision Pro users will be able to use eye-tracking to control compatible alternative drive systems. At launch, Vision Pro will be compatible with TOLT and LUCI systems.
Other updates coming this year include motion cues for VisionOS, improved Apple device handoff for Made for iPhone hearing aids, larger text support in the tvOS interface and more.
Today’s preview marked the fifth straight year Apple has used GAAD week to preview accessibility features coming to its platforms in the fall. GAAD celebrates its fifteenth year.
Stephen Hackett joins Jason to talk old Macs, binned chips, and Apple AI. Then Jason discusses the darkest part of Steve Jobs’s career with the author of “Steve Jobs In Exile”, Geoffrey Cain.
If you’ve enabled FileVault before macOS 26 Tahoe and used the option to escrow your key in iCloud, as of 26.4, you’ll be forced to migrate to a new, better, more secure method. Jason Snell just noted this update in his post about refreshed security. I wrote last September about how Tahoe shifted to storing the last-ditch account Recovery Key in Passwords starting with macOS 26.
In that column, I explained, “Your previous choices are preserved. If you wrote the key down or used iCloud escrow, this remains in place.” This is no longer the case! That article remains accurate and provides all the background and insight you need on using FileVault and the role of the Recovery Key.
However, when faced with the upgrade, you may appreciate a few tips and some advice.
You may not need FileVault
FileVault is not necessary for everyone. Apple encourages it, but enabling FileVault increases the odds that you might be locked out of your Mac forever should something go wrong. What is that something? If I could predict that, I wouldn’t be any richer, but you’d all be happier, as would Apple.
The something arises from FileVault’s two-part boot process, which uses a thin layer that requires a Mac account password to unlock your drive. There’s an “opportunity,” shall we say, for that data to corrupt for whatever reason. The Recovery Key bypasses the password requirement, uses a long code stored securely to let you in, and then resets your password.
You might also somehow forget your login password! Unlikely, but I have had times in the past when I used only a memorized password, and my fingers kept the muscle knowledge, and my brain apparently did not. I lost the thread of it, and couldn’t remember what to enter anymore! I have taken measures to prevent this since, but it isn’t impossible.
Fail to have a password or access to your Recovery Key, and you’re locked out forever. Apple can’t recover this data.
If you don’t use FileVault, you don’t need to worry about that at all. Consider your risk profile—are you concerned that someone other than you (or an authorized person) might have physical access to your Mac, and be able to bypass macOS’s login to read the drive directly? That is a big lift for anything but motivated cryptocurrency thieves or a government. If so, FileVault is a valuable add-on, a good complement to Lockdown Mode: FileVault hardens your Mac against local attempts to get into its contents; Lockdown Mode resists many common remote methods of malicious intrusion and phishing.
If not, you can rely on built-in encryption and the physical security of someone having to get to your machine to try to crack it.
But if you like or need the protection of FileVault, perhaps because you travel with a laptop or work in a sensitive industry or carry sensitive data, read on.
Practical upgrading insight
The previous column covers all the basics and the, er, advanceds, but as you migrate, consider these items:
Found in passwords: Recovery Key is now stored in Passwords. Search for “recovery key” or the model name listed in Settings: General: About in the Name field. (Changing the name doesn’t update the Passwords entry.) If you don’t see an entry in Passwords, try resetting FileVault (see below).
The Recovery Key entry in Passwords identifies the Mac by its model, and provides a shortcut to FileVault settings.
Persistently available: The key is persistently available in the Mac interface, too, either by using Touch ID or entering your password in Settings: Privacy & Security: FileVault and clicking Show.
You can click Show to display the Recovery Key dialog in Tahoe’s FileVault setting.
Backup your backup: Because you can no longer store your key in iCloud, it is critical that you have some means of using Passwords on a 26 or later operating system version to regain access to your Mac account if your login fails. You may want to store the key in another password management system, like 1Password, if that would increase your odds of gaining access to it. If you can’t use your password to log in and you can’t access your Recovery Key, you will be locked out of that data forever.
Older devices can’t see the key: Any of your iCloud-linked devices not yet running iOS 26, iPadOS 26, or macOS 26 will be unable to view the Recovery Key in Passwords (or equivalent in Safari in older versions of macOS).
Resetting FileVault
In my case, I’d upgraded to the new method back in 26.0, writing about it here and upgrading my book Take Control of Securing Your Apple Devices. When I went to check just now—with 26.5 installed—the FileVault view said I had FileVault enabled. However, the Show button was grayed out, and Passwords didn’t show an entry for this computer.
I fixed it in this way:
Disable FileVault.
Click Turn Off Encryption. (You may be prompted to enter your password.)
Enable FileVault. (You may be prompted again, but probably not.)
The entry now appears in Passwords.
Despite FileVault reporting a Recovery Key is set, my Show button was unavailable—the anomaly that prompted me to disable and re-enable FileVault.
Note also that Apple continues to show outdated text in this section: “FileVault secures your data by encrypting the contents of your Mac and locking your screen with a password.” All M-series Macs and all Intel Macs with a T2 Security Chip encrypt the contents of the startup drive by default. FileVault layers startup protection on top of that. So Apple may require this mandatory security change, but it fails to explain it correctly.
[Got a question for the column? You can email glenn@sixcolors.com or use/glennin our subscriber-only Discord community.]
Good people release good apps, OpenAI has complaints and Apple comes to the aid of some frenemies.
G as in Indigo
Remember when tech coverage was mostly just talking about cool new hardware and software and not about politics, AI, and the decline of civilization? Well, this week brought back a bit of that as two cool new apps were released.
Friend of the column Lex Friedman released Gnome, a delightful tool that makes it quicker and easier to find just the right GIF for any occasion. (Disclaimer: I am deep in the pocket of Big Lex.)
Meanwhile, Aaron Vegh and Ben McCarthy released Indigo, an app that unifies your Mastodon and Bluesky timelines, thus reducing the amount of madness in your life.
Check ‘em out.
Sometimes running to the press does nothing at all
A blockbuster report from Bloomberg’s Mark Gurman who talked to a kid whose uncle works at OpenAI and he says Apple is in biiig trouble.…
Gatekeeper gets in the way of non-notarized software.
One of the big differences between the Mac and Apple’s other platforms is that, by design, it’s an old-school “general computing” platform—you can install and run whatever software you want, from any source.
That’s a good thing. It’s what makes the Mac the Mac. But it also makes the Mac more vulnerable than Apple’s other platforms, where the company can strictly limit what software is allowed to run on the device behind layers of developer memberships, code signing, scanning, and App Store approval.
For the last decade or more, as the Mac has become more popular, Apple has been trying to ratchet up Mac security. But because the Mac is open, securing it brings some unique challenges, as I found out when I got a chance to discuss these issues with some members of Apple’s security team recently.
Back in 2018, the company introduced notarization for apps, a system that used developer code signing and automated scans to provide a slightly increased level of scrutiny and security. While you can run apps that aren’t notarized on your Mac, it’s become increasingly difficult to do so—on purpose.
That’s because as Apple gradually ratchets up its Mac security approach, it’s increasingly playing a game of Whac-a-Mole with malware makers and scammers who are trying to take advantage of Mac users. Adding notarization made it harder for users to install malware without taking additional steps, so scammers switched to social engineering, talking users through the process of bypassing the warnings for non-notarized software. Apple eventually made bypassing the warnings so onerous that most scammers moved on.
They generally moved on… to the Terminal, which is why macOS 26.4 introduced warnings about code being pasted into Terminal. Scammers were giving users long strings of mostly unreadable code to paste into Terminal to “fix” problems—and this code would, when entered, grant permission and download software. In 26.4, Apple looks for specific strings on the clipboard and blocks them with a warning—while also looking for the presence of various developer tools on the system as an indicator that the user is more sophisticated and therefore the blocking should be a bit more lenient. It’s a clever approach to spare confused novice users without getting in the way of more expert ones. (Malicious AppleScript scripts are also being checked these days. You can’t be too careful.)
Apple has also, over the years, increased Mac security by structuring the way macOS is stored on disk. Much of the operating system is stored on sealed volumes that are cryptographically signed, meaning they can’t be tampered with. System Integrity Protection prevents tampered OS versions from booting. Drivers have been moved into limited-access user areas, out of full-access admin areas. Admin users, who used to have ultimate power (without ultimate responsibility), are now more limited in what they can do.
A few years ago, I complained that Apple’s warning dialogs were out of control, especially when migrating to a new system. Since then, Apple has made a bunch of improvements, including honoring many older permissions choices when migrating. The security team seems to have also acknowledged that there are certain circumstances where installing a lot of software might not be as big a security threat. That’s why during the first 24 hours of setting up a new machine, Apple’s security warnings are now throttled.
Among other recent changes in macOS 26 updates are new background security improvements that allow Apple to install small updates in the background between normal system updates.
And as our own Glenn Fleishman reported last year, Apple began syncing FileVault keys via iCloud. What began as a gentle roll-out is now mandatory in macOS 26.4, where all users who are syncing FileVault keys will have them stored via this method.
The Mac is never going to be as secure as iOS, and that’s okay. That extra insecurity is the trade-off for the Mac being an open system, and that’s what makes the Mac special. In 2018, at WWDC, I watched as a representative of Apple’s security team stood on stage and promised that Apple would never prevent Mac users from running any code they wanted. He never promised it would always be easy, and it’s not—but that promise has been kept, and I get no sense that Apple envisions a world where it will ever be broken.
In the meantime, the good news: When you consider that the game of Whac-a-Mole has reached the “paste long strings of text into the Terminal” phase, it makes you wonder how desperate those scammers have gotten. Maybe after years of ratcheting up security, Apple’s made it just too hard to talk users into installing malware on their Macs. That has required a lot of extra effort that’s not necessary on the iOS side—and I’m glad Apple is making that effort to keep the Mac as safe as possible while it still remains open.
Indigo, from Soapbox Software, is a new social media client that combines Bluesky and Mastodon timelines in one place. I’ve been using it for the last month or so as my primary social-media client—and it’s so good that I’ve largely stopped using individual clients dedicated to the two services.
Indigo makes it easy to cross-post to the services, which is unsurprising given its pedigree—its creators, Aaron Vegh and Ben Rice McCarthy, made the cross-posting app Croissant before they made this. Since the services offer different character limits, Indigo shows you countdowns for both in one place. The app offers some other cross-service niceties, like identifying very similar posts on both services and de-duping them—though I still see not-quite-identical posts from time to time.
Indigo excels at scrolling through a timeline. Get too far beyond that, though, and you’ll find that it’s still definitely a 1.0 product. There’s no way to search within your timeline, tapping to expose an entire thread can be very slow, there’s no support for Bluesky lists, mute filters aren’t applied immediately to all items in a timeline, and occasionally I found that it just wouldn’t let me interact with some posts until I quit and re-launched the app. I also found the app’s choice of colors—blue for Bluesky, purple for Mastodon—to be impossible for me to differentiate as a colorblind person. (Fortunately you can add a badge on each account’s avatar, but it would sure be nice to pick a better color scheme.)
While I prefer Indigo because I want to scroll a timeline once and only once, it’s not yet at the level of a dedicated app like Tapbots’s Ivory for Mastodon. But this is a brand-new app, so I accept that it’s got room to grow. Ben Rice McCarthy has a nice blog post about how the project came to be, and another about how its design evolved.
Indigo is available for free on the App Store. For the Ultraviolet level, which allows interaction with posts, you can pay $5/month, $35/year, or $120 for a one-time purchase.
Our thoughts on Google’s Chromebook replacement, the dedicated hardware we use instead of our phones, the accessibility features we rely on, and whether we’re still using VR for anything.
Multitasking! Aliases! File sharing! System 7 had it all.
A lot of Mac users don’t remember a time before Mac OS X (or macOS, or OS X, depending on the era), but before OS X arrived on the scene, the Mac ran on an entirely different operating system, the classic Mac OS, which was with us from the Mac’s launch in 1984 through the funeral Steve Jobs held for Mac OS 9 in 2002.
The original Mac OS evolved a lot across those 18 years. And perhaps its single most important update, System 7, arrived 35 years ago this month, in May of 1991.
It seems like a footnote now, but so much of what we take for granted on the Mac today was introduced in System 7. Take it from someone who was there—I wanted System 7 so badly, I downloaded a load of floppy disk images across my college computer network so I could install it. And I wasn’t disappointed by what I got. System 7 really did show the way to the future of the Mac.
Gnome lives in your Mac’s menubar. You hit a hotkey. A little search window appears. You type what you’re looking for — weird al, shrug, nailed it, that’s a paddlin’ — and a grid of GIFs appears. Click the one you want. It’s now on your clipboard. Paste it wherever you were typing. Joke saved. World improved.
My favorite bit: You can also add in a local folder of GIFs, so your own go-tos are always at the ready, in addition to stuff from the wider Internet.
Maybe my second favorite bit:
Wait, why is the app called Gnome? Because that’s how I pronounce the “G” in “GIF.”
The app costs $7, one time, to unlock everything. Otherwise, after five minutes you’ll be limited to “Weird Al” and Rick Astley GIFs. I’m not kidding.
My belated thanks to ZenStand for sponsoring Six Colors last week.
ZenStand is a charger that doesn’t feel like a tech product. It sits on a desk or nightstand the way normal stuff does, without announcing itself. It’s made from real wood, solid dark walnut that looks nice in a way that molded plastic never will. It’s got a weighted and adhesive base, so your phone lifts off cleanly with one hand. There are no LEDs, on purpose. A charger doesn’t need to show off that it’s a charger.
What you end up with is a MagSafe stand that does its job properly and then gets out of the way. Which, in ZenStand’s view, is what good objects are supposed to do.
I could hardly remember writing it. But write it I did, at a time when we were deep in a news-aggregation desert. It seemed like RSS had experienced a conceptual death, through neglect and intent. Google first hijacked usage by creating Google Reader during RSS’s heyday in 2005, which sank the market for paid RSS apps and led to near hegemony for Google.
Then, typical of fickle Google, the company killed off Google Reader in 2013. Because Google Reader was web-based, its loss revealed a barren marketplace. Small developers tried to fill the gap, but the pattern of usage for many people had ended.
Couple that with the emergence, by that time, of the expectation of very low prices for single-purpose apps, and little chance yet of convincing people to pay for a recurring subscription. RSS readers persisted, but it seemed like their time had come and gone.
But I was too pessimistic! Today, I’m back to daily—or multiple-times-per-day—use of a newsreader, the same one that got me addicted back in the early 2000s. Hurray, I’m an RSS news junkie again!?
NetNewsWire remains true to RSS and its identity, as you can see from this version 2 screenshot.
The battle for the Mac menu bar has raged for decades, and shows no signs of letting up.
As the number of apps and controls in the menu bar have continued to proliferate, users have had to constantly find ways to keep them in check. For years, the de facto solution was the Mac app Bartender, but after an awkwardly managed ownership transition in 2024, a slew of alternatives sprouted up to take on the venerable utility and vie for the crown.
The team behind Bartender has continued to plug away, however, and the latest release is Bartender 6, which not only continues the app’s legacy of menu bar management, but also extends into an interesting new area: the omnipresent notch of the MacBook.
Bartender’s menu bar management is about the same as it has always been.
The menu bar management options haven’t changed much from Bartender 5 to 6; you’ll find all your usual options, including the ability to customize layout, behavior, and look and feel.
There’s also beta feature called Widgets, which lets you make your own menu bar items with a plug-and-play interface that feels like a combination of Shortcuts and Yahoo Pipes. It’s interesting but feels more than a little underbaked at present; I had a hard time getting it do anything that it was supposed to do, including simply showing the current CPU usage. With some more work, it might be more competitive with the likes of SwiftBar, but right now, it’s a beta in the classical sense.
Making your own menu bar icons seems natural for Bartender, but the feature needs improvement.
Bartender 6 is available as a four-week trial; after that time you’ll need to buy a full license for $20, though generous upgrade pricing is available for owners of previous versions. If you purchased Bartender 5 in 2025, you can even upgrade for free. Note that Bartender 6 does require macOS Sonoma or later and that if you do update from 5 to 6, your settings won’t transfer—the developers say this is because of changes in Tahoe, but it’s a shame they didn’t provide an export/import option.
If that were the whole story, it might make Bartender 6 an unremarkable update. However, in addition to all of those features, there’s also Bartender Pro, a $15/year subscription that promises not only all future Bartender updates, but also advanced features, starting with what it dubs Top Shelf.
We revisit the Ultra and Neo names, consider the future of Apple’s processor manufacturing strategy, and try to imagine why possible use case there could be for AirPods with built-in cameras.
Your Mac doesn’t have one kind of sleep—it has several. That fact is generally uninteresting until you find you can’t easily put your Mac into display sleep or system (idle) sleep automatically when you walk away from it or close a laptop’s lid. Let me help you help your Mac drift into the arms of Morpheus by digging beneath the surface.
Scattered sleep settings
Recently, I got frustrated with this recurrent problem on the Mac in my studio. Generally, I want this Mac’s displays to sleep and the system to lock, but to remain active, since I access it remotely and it handles networked Time Machine backups. I thought I’d correctly configured the various System Settings, scattered across different panes, several releases ago.
There are three settings to be aware of:
Lock Screen: In the System Settings app, select Lock Screen, note the “Turn display off… when inactive” setting or settings: “on battery” and “on power adapter” appear on a laptop; nothing on a desktop.1 You can choose an interval here. Never is an option, and could be your problem.
The Lock Screen pane in System Settings on a desktop Mac, where the display-sleep timers live.
Battery: On a laptop, go to the System Settings app and select Battery and click Options. There, you can enable “Wake for network access,” which is set to “Only on Power Adapter” by default, to wake your Mac as needed for certain incoming network traffic. Your Mac will wake up—and sometimes your display will, too. If set to Always, this can wake your laptop while it’s on battery power, and potentially leave its display active, which could drain your battery.
The Battery Options dialog on a laptop, where “Prevent automatic sleeping on power adapter when the display is off” and “Wake for network access” are configured.
Automatic sleeping: Apple enables a setting by default that keeps your Mac active when the display goes to sleep. The location and phrasing are slightly different between laptops and desktops. On a laptop, the setting is in Battery’s Options dialog, as above, and reads “Prevent automatic sleeping on power adapter when the display is off.” On a desktop, find it in the Energy preferences, where it’s called “Prevent automatic sleeping when the display is off.” Disable this switch if you want your Mac to sleep when the display powers down.
My Energy pane, in System Settings, shows the power adapter and UPS options, as I’m connected to a UPS.
Conversely, if you’d like a quick, manual way to put your display to sleep, you’ve got two options:
In the System Settings app, go to Desktop & Dock, click Hot Corners (found at the bottom), and choose Sleep as an action for one corner.
The Hot Corners dialog with the bottom-right corner assigned to Put Display to Sleep provides a quick way to sleep the display.
Press Control-Command-Q to activate Lock Screen, or choose Lock Screen from the Apple menu. I don’t love this keystroke, to be honest, because it’s perilously easy to type Command-Shift-Q, which logs you out of your account, shutting down all the apps.2
Unfortunately, tweaking these settings didn’t help my situation. The answer lay in Terminal, where I ran commands to reveal low-level information about what was keeping my Mac from display sleep.
Power management shows who’s keeping you awake
Apple does provide an excellent tool that shows what’s affecting power management and lets you control it: pmset.3 Even better, you can paste in the following to use that command to extract just sleep-related assertions, or activities that have an impact on sleep:
pmset -g assertions | grep -i sleep
When I typed this just now, I had a modest list, preceded by a summary:
The first three lines tell me the off/on status as a 0 (off) or a count (1 per set of connected items) about whether any application or other process affects those categories:
PreventUserIdleDisplaySleep: When showing 0, as it is for me, there’s nothing that will block the display from sleeping on your Lock Screen delay choice. If this is 1 or higher, the display will not go to sleep.
PreventSystemSleep: A non-zero value, as in my case, means something is actively preventing the system from sleeping at all, even if I tried to put it to sleep manually.
PreventUserIdleSystemSleep: With a value of 1 or more, a process prevents your Mac, when idle, from engaging system sleep. If you perform an action, like choosing Sleep from the Apple Menu or closing the lid on a laptop, it will sleep.
You can see that I have several typical items in the filtered list below. The three lines listing com.apple.audio.BuiltInHeadphoneOutputDevice.context.preventuseridlesleep (twice) and com.apple.Music.playback relate to my current situation: I’m listening to the Music app via my Mac’s headphone jack, which is connected to speakers.
Maybe I shouldn’t have chosen the tea kettle from Amphetamine’s options for alternative menu bar icons?
I have no idea why QuickTime Player, shown next, would prevent idle sleep—that seems strange, as it was inactive and had no open files. Quitting it removed that assertion. (Apparently, the specific language it uses is a legacy assertion, so it isn’t properly counted in the summary.)
Screen Sharing (screensharingd) is also an odd duck. Normally, if you have a Screen Sharing session connected to your Mac, its display can go to sleep, but the system stays active. In this case, this is a transient state: I use Bartender, which has to use Screen & System Audio Recording, which appears as a form of screen sharing when active, to determine which system menu items are currently visible.
The final item, powerd, is the setting noted earlier: “Prevent sleep while display is on.”
When previously looking through this list, I came across an online reference to a Mac utility called caffeinate. Folks, I’ve said before I have to keep humble despite being a technology writer for what is now nearly 30 years: I had never seen this command-line tool before, to my knowledge, and, according to Google, I have never mentioned it in my archived writing.
caffeinate was introduced 13 years ago by Apple as a cutely named option you can use to keep the display awake. For instance, to keep the display forced awake for an hour, overriding other settings, enter:
caffeinate -d -t 3600
Now, I was aware of Amphetamine (free from the Mac App Store). But I didn’t quite understand—or, let me be honest, maybe have forgotten—that it performed the same function, relying on the same system hooks caffeinate employs, and putting a friendly menu bar wrapper around it.
Finding the caffeinate reference led me to look for Amphetamine, which in turn revealed the problem. Perhaps due to some errant menu bar clicking, I had activated Amphetamine, thus locking my display on. My confusion might stem from three factors. First, I forgot I had it installed. Second, I used Bartender to put the icon in its Hidden list, so it wasn’t displayed in the active bar. Third, I used the icon selection option to change the menu bar picture from a pill to a tea kettle—you know, drinking tea might keep you awake? I regret my decision, as I didn’t recognize what it was when I made that decision, seemingly years ago.
Unfortunately, I couldn’t just turn it off in the app—I had to quit the app, then toggle the active state to turn it off. Sadly, we humans can’t turn off our caffeinated mode to go to sleep.
[Got a question for the column? You can email glenn@sixcolors.com or use/glennin our subscriber-only Discord community.]
I have an uninterruptible power supply (UPS), so I see “on power display” and “on UPS” (meaning when the UPS is actively providing power). ↩
If you have Keyboard Maestro, you can remap the Command-Shift-Q keystroke to do nothing or prompt you before logging out. ↩
You can use pmset to create limited sleep schedules, a feature available via System Preferences in macOS prior to Ventura. ↩
Starting today, end-to-end encrypted RCS messaging begins rolling out in beta for iPhone users running iOS 26.5 with supported carriers and Android users on the latest version of Google Messages. When RCS messages are end-to-end encrypted, they can’t be read while they’re sent between devices. Users will know that a conversation is end-to-end encrypted when they see a new lock icon in their RCS chats. Encryption is on by default and will be automatically enabled over time for new and existing RCS conversations.
Apple first talked about adding this feature more than a year ago, and first beta tested it in a previous version of iOS. With today’s release of iOS 26.5, it’s now available—pending carrier support, of course.
I’m glad to see the company implementing this: while iMessages have always been encrypted, which Apple points out in its press release, security of our messages should be table stakes.
This news does mean encrypted RCS messaging will functionally be available in Messages on macOS as well, since texts and RCS messaging are already facilitated by your iPhone, as long as your phone is running 26.5 and it’s supported by your carrier and your account.