iOS 9 nad El Capitan to increase device security

Apple has just released the new public beta versions of its platforms, the iOS 9 for mobile devices and the OS X El Capitan. These public beta versions are essentially the same as the third pre-release developer previews that Apple released for developers early this week. 

In the features included in the new versions of Apple's upcoming platforms is what the Cupertino-based company describes as more robust security. 

Integrated directly into the new iOS 9 and El Capitan is a system called "two-factor authentication," designed to confirm ownership of an iOS device or a Mac. This new authentication system is different from the current two-step verification option available on Apple devices. According to the developer page, the new system "uses different methods to trust devices and deliver verification codes, and offers a more streamlined user experience. The current two-step verification feature will continue to work separately for users who are already enrolled." 

In the additional new security feature, Apple devices will be able to identify the identity of the user through a password and additional six-digit code. Different from the current two-step verification which is device-focused, the new feature is integrated into the platforms themselves. This means that using the owner's Apple ID, the authentication will pop out on every Apple device that the owner has. Once the Apple device signs in the Apple ID with the codes, it will become a trusted device. The new additional authentication system is of great use to Apple fans who use multiple Apple devices. 

If the devices use the new authentication system instead of the two-step verification, users may do away with the 14-digit Recovery Key, which is necessary when the users get locked out of their devices, or if the Apple devices get lost or stolen. However, recovery for the new authentication feature has a downside – Apple still needs to review recovery of the user's account on a case-to-case basis. This means that users would need to provide a verified phone number, and would need to wait for at least a few days in order for the process to finish.