Connect with us

Technology

Reclaim your privacy by disabling your cellphone carrier’s data tracking

Published

on

Reclaim your privacy by disabling your cellphone carrier’s data tracking

We’ve all heard before that our cellphones are listening to us and monitoring our every move. While this has been debunked (or, at least, explained), the fact of the matter is that data tracking is standard practice by the most popular mobile carriers these days.

And still in 2024, even with complaints from users, new tracking methods are continually emerging, making it harder for users to take back control of their data.

So, what do you need to know exactly about how your mobile carrier tracks your data? And how can you reclaim your privacy without having to say goodbye to your mobile carrier altogether?

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Women looking at a phone (Kurt “CyberGuy” Knutsson)

Advertisement

ASK ANY TECH QUESTION, AND GET KURT’S FREE CYBERGUY REPORT NEWSLETTER HERE

What is data tracking, and what do mobile carriers collect?

To start, let’s talk about what “data tracking” actually means. Data tracking is when companies collect information about a user’s online activities, including but not limited to their browsing history, location data, messaging information and app usage.

This data is used directly by the company collecting it or shared with third-party companies to ultimately tailor their advertising to you. (There are other justifications for this, such as “improving services.” But nowadays, targeted advertising is the primary reason, which leads users to feel more and more like their phones are listening in on them.)

Data tracking may look different from one company to the next. When it comes to mobile carriers, they can collect a wide range of information about their users, which is no surprise since, for most of us, our phones are an extension of ourselves. Therefore, it’s important for you to be aware of these practices and actively manage your privacy settings to maintain control over your personal information.

NO MORE MISSED ALARMS: HOW TO CRANK UP YOUR IPHONE’S ALARM VOLUME

Advertisement
WOMAN with iphone

A woman holding an iPhone (Kurt “CyberGuy” Knutsson)

MORE: FCC SLAPS AT&T, VERIZON, T-MOBILE WITH MEGA FINES FOR DATA DECEIT

Different ways mobile carriers collect data

Mobile carriers employ a variety of techniques to gather specific data from their users:

T-Mobile

  • User behavior profiling: T-Mobile analyzes personal data to predict user behaviors and preferences, which can influence future services and marketing strategies.
  • Research support: The carrier shares data to aid public and scientific research initiatives, ensuring that personal identifiers are removed.
  • App usage analysis: Tracks the frequency and duration of app usage to gather insights into user preferences and habits.
  • Advertising personalization: This process collects information on app usage and demographic details to tailor advertisements more closely to the user’s interests.

Verizon

  • Network usage insights: Verizon uses data like web browsing and app usage to offer additional services or upgrades.
  • Aggregate consumer insights: Combines user data with external data to generate insights into consumer behaviors and trends.
  • Customized user experience: Verizon analyzes the websites and apps users engage with to create a more personalized service experience.
  • Marketing optimization: Uses detailed user data to refine and personalize marketing efforts and service offerings.

AT&T

  • Browsing and location tracking: AT&T collects detailed records of users’ web browsing and location to customize ads and offers.
  • Automated decision-making: They employ algorithms to use collected data to make automated decisions that affect the ads and content presented to the user.
  • Demographic and viewing data: Gathers demographic information alongside viewing habits to better understand and segment their user base.
  • Identity verification services: AT&T shares certain data with third parties to facilitate identity verification and fraud prevention measures.

Feeling a bit surprised by all of this? Yeah, we are, too.

person on phone

A person holding a phone (Kurt “CyberGuy” Knutsson)

MORE: AT&T DATA LEAK FROM 73 MILLION CUSTOMERS; WHAT YOU NEED TO DO NEXT

How to turn off data tracking on your device based on your mobile carrier

If you don’t want your mobile carrier to have so much overarching access to your data, there are ways you can stop them. The problem is that most mobile carriers aren’t going to broadcast this information because it’s beneficial for them to maintain this access.

However, that’s why we’re here to help. Managing your data privacy involves understanding the settings available on your mobile device. Below, you will find instructions for disabling data tracking on devices served by the major U.S. carriers – T-Mobile, Verizon and AT&T – as well as a general guide for other carriers.

Advertisement

T-Mobile

To adjust privacy settings on a T-Mobile device:

Log into your T-Mobile account.

  • Navigate to My Account, then click on Profile.
  • Scroll to the bottom and select Privacy and Notifications, then Privacy Dashboard.
  • Here, you can toggle off various options:Share data for public and scientific research: Prevents the use of your data for external research projects.Analytics and reporting: Stops the aggregation of your usage data for business reports.Advertising options: Limits personalized ads based on your app usage and other collected data.Profiling and automated decisions: Opt out of data usage for profiling purposes.Do not sell or share my personal information: Ensure your data is not sold or shared externally.
  • Share data for public and scientific research: Prevents the use of your data for external research projects.
  • Analytics and reporting: Stops the aggregation of your usage data for business reports.
  • Advertising options: Limits personalized ads based on your app usage and other collected data.
  • Profiling and automated decisions: Opt out of data usage for profiling purposes.
  • Do not sell or share my personal information: Ensure your data is not sold or shared externally.

Additionally, T-Mobile offers a separate app to limit data shared with third-party advertisers through the Magenta Advertising Platform.

Verizon

To manage privacy settings on a Verizon device:

  • Log into your Verizon account.
  • Go to Account, then Account Overview and select Edit Profile and Settings.
  • Choose Manage Privacy Settings.
  • You can adjust the following:Customer Proprietary Network Info: Opt out to stop Verizon from using your data to market additional services.Business and Marketing Insights: Disable this to prevent the use of your data for creating consumer insights.Custom Experience and Custom Experience Plus: Opt out to stop personalized marketing based on your web and app usage.
  • Customer Proprietary Network Info: Opt out to stop Verizon from using your data to market additional services.
  • Business and Marketing Insights: Disable this to prevent the use of your data for creating consumer insights.
  • Custom Experience and Custom Experience Plus: Opt out to stop personalized marketing based on your web and app usage.

Resetting the Custom Experience settings will also stop Verizon from using previously collected browsing and location data.

AT&T

To disable data tracking on an AT&T device:

Advertisement
  • Log into your AT&T account.
  • Navigate to Profile, then Privacy Choices.
  • AT&T offers four main toggles you can turn off:Personalized Plus: Stops the use of your location and browsing data for personalized ads.Personalized: Disables automated decision-making using your data.Share or sell my personal information: This prevents AT&T from sharing your data for advertising purposes.
  • Personalized Plus: Stops the use of your location and browsing data for personalized ads.
  • Personalized: Disables automated decision-making using your data.
  • Share or sell my personal information: This prevents AT&T from sharing your data for advertising purposes.

It’s recommended that identity verification be kept active for security purposes.

MORE: TOP AFFORDABLE CELLPHONE PLANS

Other carriers

If you don’t use one of the above mobile carriers, the steps are likely very similar. But if you have any doubts, talk to your mobile carrier directly, perhaps by going into a store or searching online about how to do it for your specific carrier.

  • Log into your account through the carrier’s website or app.
  • Locate the privacy settings or preferences, which may be under sections labeled as Privacy, Security, or Data Management.
  • Review and adjust the settings to limit data tracking as per your preference.
WOMAN on phone

A woman on her phone (Kurt “CyberGuy” Knutsson)

MORE: TIDY UP YOUR TECH: SPRING-CLEANING TIPS FOR SAFEGUARDING YOUR DATA

Strengthen your privacy with a VPN

While disabling carrier tracking is an important step, using a virtual private network (VPN) adds an extra layer of protection for your mobile data. A VPN encrypts all of your internet traffic and routes it through a secure server, shielding your online activities from prying eyes, including your carrier.

With a trusted VPN service, your carrier won’t be able to see which websites you visit, what you search for or the contents of your communications. Your IP address and location will also be masked. Setting up a VPN on your smartphone is easy and affordable, with many top providers offering mobile apps. Just be sure to choose a no-logs VPN with robust encryption that doesn’t sell your data to third parties. Combining VPN protection with disabling carrier tracking maximizes your privacy on the go. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.

Advertisement

Kurt’s key takeaways

Even as users voice their concerns about their data, mobile carriers are still finding creative arguments to justify what they take and why they take it. It’s more important than ever to take your data into our own hands and utilize these tips to keep your data private as much as possible. Remember, if your data falls into the wrong hands, you have a much higher chance of becoming a victim of a cybercrime.

What do you think about all this data privacy information? Will this information influence how you choose your mobile carrier in the future or how you’ll take control of your data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on Facebook, YouTube and Instagram.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Tanks, guns and face-painting

Published

on

Tanks, guns and face-painting

Of all the jarring things I’ve witnessed on the National Mall, nothing will beat the image of the first thing I saw after I cleared security at the Army festival: a child, sitting at the controls of an M119A3 Howitzer, being instructed by a soldier on how to aim it, as his red-hatted parents took a photo with the Washington Monument in the background.

The primary stated reason for the Grand Military Parade is to celebrate the US Army’s 250th birthday. The second stated reason is to use the event for recruiting purposes. Like other military branches, the Army has struggled to meet its enlistment quotas for over the past decade. And according to very defensive Army spokespeople trying to convince skeptics that the parade was not for Donald Trump’s birthday, there had always been a festival planned on the National Mall that day, and it had been in the works for over two years, and the parade, tacked on just two months ago, was purely incidental. Assuming that their statement was true, I wasn’t quite sure if they had anticipated so many people in blatant MAGA swag in attendance — or how eager they were to bring their children and hand them assault rifles.

WASHINGTON, DC – JUNE 14: An Army festival attendee holds a M3 Carl Gustav Recoilless Rifle on June 14, 2025 in Washington, DC.
Photo by Anna Moneymaker / Getty Images

There had been kid-friendly events planned: an NFL Kids Zone with a photo op with the Washington Commanders’ mascot, a few face-painting booths, several rock-climbing walls. But they were dwarfed, literally, by dozens of war machines parked along the jogging paths: massive tanks, trucks with gun-mounted turrets, assault helicopters, many of them currently used in combat, all with helpful signs explaining the history of each vehicle, as well as the guns and ammo it could carry. And the families — wearing everything from J6 shirts to Vineyard Vines — were drawn more to the military vehicles, all-too-ready to place their kids in the cockpit of an AH-1F Cobra 998 helicopter as they pretended to aim the nose-mounted 3-barrelled Gatling Cannon. Parents told their children to smile as they poked their little heads out of the hatch of an M1135 Stryker armored vehicle; reminded them to be patient as they waited in line to sit inside an M109A7 self-propelled Howitzer with a 155MM rifled cannon.

Attendees look at a military vehicle on display.

Attendees look at a military vehicle on display.
Bloomberg via Getty Images

But seeing a kid’s happiness of being inside a big thing that goes boom was nothing compared to the grownups’ faces when they got the chance to hold genuine military assault rifles — especially the grownups who had made sure to wear Trump merch during the Army’s birthday party. (Some even handed the rifles to their children for their own photo ops.) It seemed that not even a free Army-branded Bluetooth speaker could compare to how fucking sick the modded AR-15 was. Attendees were in raptures over the Boston Dynamics robot dog gun, the quadcopter drone gun, or really any of the other guns available (except for those historic guns, those were only maybe cool).

Advertisement

However many protesters made it out to DC, they were dwarfed by thousands of people winding down Constitution Avenue to enter the parade viewing grounds: lots of MAGA heads, lots of foreign tourists, all people who really just like to see big, big tanks. “Angry LOSERS!” they jeered at the protesters. (“Don’t worry about them,” said one cop, “they lost anyways.”) and after walking past them, crossing the bridge, winding through hundreds of yards of metal fencing, Funneling through security, crossing a choked pedestrian bridge over Constitution Ave, I was finally dumped onto the parade viewing section: slightly muggy and surprisingly navigable. But whatever sluggishness the crowd was feeling, it would immediately dissipate the moment a tank turned the corner — and the music started blasting.

Americans have a critical weakness for 70s and 80s rock, and this crowd seemed more than willing to look past the questionable origins of the parade so long as the soundtrack had a sick guitar solo. An M1 Abrams tank driving past you while Barracuda blasts on a tower of speakers? Badass. Black Hawk helicopters circling the Washington Monument and disappearing behind the African-American history museum, thrashing your head to “separate ways” by Journey? Fucking badass. ANOTHER M1 ABRAMS TANK?!?!! AND TO FORTUNATE SON??!?!? “They got me fucking hooked,” a young redheaded man said behind me as the crowd screamed for the waving drivers. (The tank was so badass that the irony of “Fortunate Son” didn’t matter.)

Members of the U.S. Army drive Bradley Fighting Vehicles in the 250th birthday parade on June 14, 2025 in Washington, DC.

Members of the U.S. Army drive Bradley Fighting Vehicles in the 250th birthday parade on June 14, 2025 in Washington, DC.
Getty Images

When you listen to the hardest fucking rock soundtrack long enough, and learn more about how fucking sick the Bradley Fighting Vehicles streaming by you are (either from the parade announcer or the tank enthusiast next to you), an animalistic hype takes over you — enough to drown out all the nationwide anger about the parade, the enormity of Trump’s power grab, the fact that two Minnesota Democratic lawmakers were shot in their homes just that morning, the riot police roving the streets of LA.

It helped that it didn’t rain. It helped that the only people at the parade were the diehards who didn’t care if they were rained out. And by the end of the parade, they didn’t even bother to stay for Trump’s speech, beelining back to the bridge at the first drop of rain.

The only thing that mattered to this crowd inside the security perimeter — more than the Army’s honor and history, and barely more than Trump himself — was firepower, strength, hard rock, and America’s unparalleled, world-class ability to kill.

Advertisement

Continue Reading

Technology

How addresses are collected and put on people finder sites

Published

on

How addresses are collected and put on people finder sites

NEWYou can now listen to Fox News articles!

Your home address might be easier to find online than you think. 

A quick search of your name could turn up past and current locations, all thanks to people finder sites. 

These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

A woman searching for herself online. (Kurt “CyberGuy” Knutsson)

How your address gets exposed online and who’s using it

If you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.

11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.

Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams.

Advertisement
woman at keyboard

A woman searching for herself online. (Kurt “CyberGuy” Knutsson)

How do people search sites get your home address?

First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 

1. Public sources

Your home address can appear in:

  • Property deeds: When you buy or sell a home, your name and address become part of the public record.
  • Voter registration: You need to list your address when voting.
  • Court documents: Addresses appear in legal filings or lawsuits.
  • Marriage and divorce records: These often include current or past addresses.
  • Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.

2. Private sources

Other sites buy your data from companies you’ve interacted with:

  • Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.
  • Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.
  • Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.
  • Mobile apps and websites: Some apps track your location.

People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information.

woman searching online

A woman searching for herself online. (Kurt “CyberGuy” Knutsson)

What are the risks of having your address on people finder sites?

The Federal Trade Commission (FTC) advises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.

Advertisement

People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:

  • Stalking and harassment: Criminals can easily find your home address and threaten you.
  • Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.
  • Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.
  • Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.
  • Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.

How to protect your home address

The good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.

I recommend a few ways to delete your private information, including your home address, from such websites.

1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web

Advertisement

2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like “opt out,” “delete my information,” etc., point the way.

Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.

3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.

4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.

Kurt’s key takeaways

Your home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.

Advertisement

How do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

Inside Mark Zuckerberg’s AI hiring spree

Published

on

Inside Mark Zuckerberg’s AI hiring spree

AI researchers have recently been asking themselves a version of the question, “Is that really Zuck?

As first reported by Bloomberg, the Meta CEO has been personally asking top AI talent to join his new “superintelligence” AI lab and reboot Llama. His recruiting process typically goes like this: a cold outreach via email or WhatsApp that cites the recruit’s work history and requests a 15-minute chat. Dozens of researchers have gotten these kinds of messages at Google alone.

For those who do agree to hear his pitch (amazingly, not all of them do), Zuckerberg highlights the latitude they’ll have to make risky bets, the scale of Meta’s products, and the money he’s prepared to invest in the infrastructure to support them. He makes clear that this new team will be empowered and sit with him at Meta’s headquarters, where I’m told the desks have already been rearranged for the incoming team.

Most of the headlines so far have focused on the eye-popping compensation packages Zuckerberg is offering, some of which are well into the eight-figure range. As I’ve covered before, hiring the best AI researcher is like hiring a star basketball player: there are very few of them, and you have to pay up. Case in point: Zuckerberg basically just paid 14 Instagrams to hire away Scale AI CEO Alexandr Wang.

It’s easily the most expensive hire of all time, dwarfing the billions that Google spent to rehire Noam Shazeer and his core team from Character.AI (a deal Zuckerberg passed on). “Opportunities of this magnitude often come at a cost,” Wang wrote in his note to employees this week. “In this instance, that cost is my departure.”

Advertisement

Zuckerberg’s recruiting spree is already starting to rattle his competitors. The day before his offer deadline for some senior OpenAI employees, Sam Altman dropped an essay proclaiming that “before anything else, we are a superintelligence research company.” And after Zuckerberg tried to hire DeepMind CTO Koray Kavukcuoglu, he was given a larger SVP title and now reports directly to Google CEO Sundar Pichai.

I expect Wang to have the title of “chief AI officer” at Meta when the new lab is announced. Jack Rae, a principal researcher from DeepMind who has signed on, will lead pre-training. Meta certainly needs a reset. According to my sources, Llama has fallen so far behind that Meta’s product teams have recently discussed using AI models from other companies (although that is highly unlikely to happen). Meta’s internal coding tool for engineers, however, is already using Claude.

While Meta’s existing AI researchers have good reason to be looking over their shoulders, Zuckerberg’s $14.3 billion investment in Scale is making many longtime employees, or Scaliens, quite wealthy. They were popping champagne in the office this morning.

Then, Wang held his last all-hands meeting to say goodbye and cried. He didn’t mention what he would be doing at Meta. I expect his new team will be unveiled within the next few weeks after Zuckerberg gets a critical number of members to officially sign on.

Tim Cook.
Getty Images / The Verge
Advertisement

Apple is accustomed to being on top of the tech industry, and for good reason: the company has enjoyed a nearly unrivaled run of dominance.

After spending time at Apple HQ this week for WWDC, I’m not sure that its leaders appreciate the meteorite that is heading their way. The hubris they display suggests they don’t understand how AI is fundamentally changing how people use and build software.

Heading into the keynote on Monday, everyone knew not to expect the revamped Siri that had been promised the previous year. Apple, to its credit, acknowledged that it dropped the ball there, and it sounds like a large language model rebuild of Siri is very much underway and coming in 2026.

The AI industry moves much faster than Apple’s release schedule, though. By the time Siri is perhaps good enough to keep pace, it will have to contend with the lock-in that OpenAI and others are building through their memory features. Apple and OpenAI are currently partners, but both companies want to ultimately control the interface for interacting with AI, which puts them on a collision course.

Apple’s decision to let developers use its own, on-device foundational models for free in their apps sounds strategically smart, but unfortunately, the models look far from leading. Apple ran its own benchmarks, which aren’t impressive, and has confirmed a measly context window of 4,096 tokens. It’s also saying that the models will be updated alongside its operating systems — a snail’s pace compared to how quickly AI companies move.

Advertisement

I’d be surprised if any serious developers use these Apple models, although I can see them being helpful to indie devs who are just getting started and don’t want to spend on the leading cloud models. I don’t think most people care about the privacy angle that Apple is claiming as a differentiator; they are already sharing their darkest secrets with ChatGPT and other assistants.

Some of the new Apple Intelligence features I demoed this week were impressive, such as live language translation for calls. Mostly, I came away with the impression that the company is heavily leaning on its ChatGPT partnership as a stopgap until Apple Intelligence and Siri are both where they need to be.

AI probably isn’t a near-term risk to Apple’s business. No one has shipped anything close to the contextually aware Siri that was demoed at last year’s WWDC. People will continue to buy Apple hardware for a long time, even after Sam Altman and Jony Ive announce their first AI device for ChatGPT next year. AR glasses aren’t going mainstream anytime soon either, although we can expect to see more eyewear from Meta, Google, and Snap over the coming year.

In aggregate, these AI-powered devices could begin to siphon away engagement from the iPhone, but I don’t see people fully replacing their smartphones for a long time. The bigger question after this week is whether Apple has what it takes to rise to the occasion and culturally reset itself for the AI era.

I would have loved to hear Tim Cook address this issue directly, but the only interview he did for WWDC was a cover story in Variety about the company’s new F1 movie.

Advertisement
  • AI agents are coming. I recently caught up with Databricks CEO Ali Ghodsi ahead of his company’s annual developer conference this week in San Francisco. Given Databricks’ position, he has a unique, bird’s-eye view of where things are headed for AI. He doesn’t envision a near-term future where AI agents completely automate real-world tasks, but he does predict a wave of startups over the next year that will come close to completing actions in areas such as travel booking. He thinks humans will need (and want) to approve what an agent does before it goes off and completes a task. “We have most of the airplanes flying automated, and we still want pilots in there.”
  • Buyouts are the new normal at Google. That much is clear after this week’s rollout of the “voluntary exit program” in core engineering, the Search organization, and some other divisions. In his internal memo, Search SVP Nick Fox was clear that management thinks buyouts have been successful in other parts of the company that have tried them. In a separate memo I saw, engineering exec Jen Fitzpatrick called the buyouts an “opportunity to create internal mobility and fresh growth opportunities.” Google appears to be attempting a cultural reset, which will be a challenging task for a company of its size. We’ll see if it can pull it off.
  • Evan Spiegel wants help with AR glasses. I doubt that his announcement that consumer glasses are coming next year was solely aimed at AR developers. Telegraphing the plan and announcing that Snap has spent $3 billion on hardware to date feels more aimed at potential partners that want to make a bigger glasses play, such as Google. A strategic investment could help insulate Snap from the pain of the stock market. A full acquisition may not be off the table, either. When he was recently asked if he’d be open to a sale, Spiegel didn’t shut it down like he always has, but instead said he’d “consider anything” that helps the company “create the next computing platform.”

If you haven’t already, don’t forget to subscribe to The Verge, which includes unlimited access to Command Line and all of our reporting.

As always, I welcome your feedback, especially if you’re an AI researcher fielding a juicy job offer. You can respond here or ping me securely on Signal.

Continue Reading

Trending