Viewing 2 reply threads
  • Author
    • #71485
      Mr. Deezy

      Premium Content | Through the Eyes of a husDOM™

      Greetings, all.

      I developed an immediate need for technology to safely share explicit words and media with my wife when we jumped headfirst into the D/s dynamic recently. I am new to the dynamic, but I am not new to vetting security solutions. My ultimate goal is to develop a living, breathing guide of the most current, trustable, and future-proof technology solutions for macOS/iOS customers looking to share explicit content, but for now I’d like to share a few discoveries I’ve made along the way.

      iCloud Photo Library is not your friend.

      iCloud Photo Library is a powerful feature that allows all photos taken on any of your devices to be synced to the cloud. If any of the photos taken with your camera are explicit, you can be sure that this will cause you trouble at some point down the line because of the following:

      • Deleted photos stay in the Recently Deleted folder for 30 days unless explicitly removed
      • iCloud Photo Library can be updated asynchronously on your devices, so deleted explicit photos can briefly show up on devices that haven’t fully synced yet (!)

      In order to mitigate the risk of accidentally exposing even the thumbnails of explicit photos for a fraction of a second, it is necessary to disable cellular and WiFi communication when the Photo Library is being “soiled.” Once all cleanup has been performed, wireless communications can be safely resumed (more on this later).

      Obscurity is no defense.

      This probably goes without saying, but one should never assume that because a photo album is named “Family Texas Vacation 2002” that no one would go looking through it. The same applies to folders on your hard drive or removable media that are unsecured. A clever user can locate all media files on your computer or phone in a matter of moments, regardless of how they named. There is no good reason to leave unsecured media in an accessible location on your hard drives or mobile devices.

      Double-duty is dangerous.

      If you’re attempting to use your photo album for explicit and non explicit photos or your messages for non-explicit and explicit messages, it is only a matter of time before you are embarrassed by the sudden, unexpected cross-pollination of the two. For example, that picture of your cock bulging in your slacks next to a riding crop that you text could end up in a full-screen chat window in the Messages application of the intended recipient while she’s away from her desk. The message, “cocksucking training tonight” could pop up on her lockscreen while her phone is on the desk in front of her in her manager’s office.

      Apple has built a lot of great technology into their operating systems, but you should not assume that any of those technologies have more than a basic level of security. It is not, in my opinion, Dom-grade.

      Here are a few tips that may aid you in your quest to build a warchest of smut between you and your sub:

      1. Disable message previews on iOS to prevent message content from being visible to onlookers.
        • Settings -> Notifications -> Show Previews -> When Unlocked or Never
      2. Use Disk Utility in macOS to create secure disk images to hold your sensitive files.
        • File -> New Image -> Blank Image …
        • Choose an appropriate size for the image (1 GB is usually a good start)
        • Use 128-bit or 256-bit encryption on the disk image, and do NOT store the password in your keychain
        • (If you are bad at passwords, try a password manager such as 1Password or Dashlane.)
        • (If you can’t be bothered with a password manager, use short, easy-to-remember-hard-to-guess full sentence: “MargaretThatcherIsDeadSexy”)
        • Give your disk image a non-assuming name (“Thumbdrive Backup”), and feel free to leave it in a prominent location.
        • Mount the disk image any time you have sensitive material to transfer. Eject the image and delete the originals when done.
      3. Use an end-to-end encrypted service (EEES) for sending messages. I recommend Signal due to the following:
        • Message history is not stored on a server
        • Message history does not survive iCloud backup and is completely erased
        • Message history does not survive encrypted iTunes backup and is completely erased
        • (In case this isn’t clear, you’ll need to save anything of importance elsewhere if you require permanence.)
      4. Store your incoming filth in a password-protected media vault (PPMV) application (inVault, Photo Vault, etc.).
        • Be sure that a password (not your phone password) is set on your media vault. You can enable password recovery via email if desired.
        • Disable WiFi and cellular on your phone (Airplane mode usually will do this, but double check after enabling it).
        • Launch Photos. The UI may indicate that there is no WiFi connection and that uploads etc. are halted.
        • Tap the media to be saved in your EEES app and save it to your Photo Library.
        • YOUR PHOTO LIBRARY IS NOW SOILED. It is important to complete the next few steps before becoming distracted!
        • Launch your PPMV app and capture the desired photos from your Photo Library.
        • The PPMV app will ask if you want to delete the moved photos from your Photo Library. Choose yes.
        • Immediately launch Photos and navigate to the album called Recently Deleted.
        • Select all offending photos and erase them permanently.
        • Your Photo Library is now clean. It is safe to re-enable WiFi and cellular communications.
        • At this point, sensitive media is in the EEES and PPMV apps only. If your phone is restored from backup, ES will be empty, but PPMV will still retain all media.
        • If you really want to be safe, check every other device logged into iCloud and be sure that the Moments and Recently Deleted albums are free of sensitive media. Better to double check than be surprised.

      I realize that these guidelines can probably be more detailed and useful, but I welcome any feedback and suggestions before working them into a more detailed post.



    • #71486
      Sir OTW | AMB

      Premium Content | Through the Eyes of a husDOM™

      For the EEES messaging, we use signal for SMS and Wire for more involved chat. Wire is better for multimedia but can be finicky of sending/recieving.

    • #73497

      Premium Content | Through the Eyes of a husDOM™

      Here, I was all excited to come in and say “Oooo! I know! Use Signal!” because that’s what we do. And I’m something of a privacy nerd, even though I use iOS.

      Then again, I turned off my iCloud Photos, so as to not share anything on there, and I can save images to my iCloud Drive in the Files app. Of course, I don’t share my Apple devices with anybody, so there is limited risk of unintended access…

Viewing 2 reply threads
  • You must be logged in to reply to this topic.

©2020 husDOM™  subMrs™

Tangled Wood, LLC


We're not around right now. But you can send us an email and we'll get back to you, asap.


Monday Mastermind 04/06/20 | Beastly | Learn more

Log in with your credentials

Forgot your details?