On iOS 8 , Apple hides your device's MAC address when it's scanning for WiFi, which could otherwise be used to track the movement of a specific phone or tablet. Apple claims that unlike its competitors, it cannot bypass your passcode on iOS 8 to potentially unlock data from a device at the request of law enforcement. As of a couple of years ago, this was not the case . Security researcher Justin Case says current/updated Android phones can't have their passcode bypassed either , however it still may exist if the user is securing their phone with an unlock pattern.

Of course, Apple still says that whatever data it does collect on users, could potentially be transferred to another company if it's ever sold or merges -- based on the current stock price that seems doubtful, but who knows. There's a lengthy white paper available (PDF) on its iOS security policies as well, so whether you're just need help locking down some private selfies, doing serious security research or trying to decide if Apple Pay is safe, there's plenty of reading to be done.

Existing commercial forensics tools can still dump 3rd party app data, camera reel, video, and recordings from iOS 8 http://t.co/fbgNrKN12E Jonathan Zdziarski (@JZdziarski) September 18, 2014

Update: Security researcher Jonathan Zdziarski points out that Apple's new iOS 8 protections may not keep all of your data safe by themselves. While "photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders" are protected under the passcode -- that's not everything. Information that could be accessed anyway by existing tools includes your camera reel, videos, iTunes media and all third-party app data. To keep these things secure, Zdziarski recommends turning off your iThing when it's not in use, and for any computers that are set up to pair with them (a trusted computer is necessary to dump the data) to be shut down, and have strong passwords/encryption set up.