Safely Share Devices: Smartphones, Computers & Tablets

Guest Access to Your Computer: A Secure Approach
Contemporary operating systems for smartphones, tablets, and desktop computers provide secure methods for granting temporary access to others. These features allow you to control the level of access a guest receives.
You can limit a guest's use to a single application or provide them with restricted access to your entire system. This eliminates the need for direct supervision.
Limitations of Basic Profile Switchers
While utilizing a profile switcher, such as the one found within the Chrome browser, can offer a degree of separation, it isn't the most robust solution.
It does establish a distinct browsing session for the guest. However, it's relatively simple for them to revert to your primary profile with minimal effort.
Therefore, dedicated guest access features within the operating system itself are preferable for enhanced security and control.
iPhone and iPad
Guided Access on iOS devices provides a method for temporarily limiting the use of an iPhone or iPad to a single application. This functionality is particularly useful when sharing your device with others.
For instance, you might wish to permit a friend to make a call without granting access to your other apps, or allow a child to enjoy a game without the risk of accidental access to sensitive information like emails.
Exiting Guided Access requires entering a passcode or utilizing Touch ID for authentication.
Enabling Guided Access
The process of enabling Guided Access begins within the Settings application. Navigate to General, then select Accessibility.
Within the Accessibility menu, scroll down to the Learning section and tap on Guided Access.
Activating and Deactivating
To initiate Guided Access, launch the desired application. Subsequently, quickly press the Home button three consecutive times.
This action will present options to enable Guided Access and establish a passcode for security.
To exit the application while Guided Access is active, press the Home button three times again and enter the previously set passcode. Your device will then be restricted to that single application when handed to another user.
Android
A feature related to enhanced security and privacy is the ability to pin screens in Android 5.0. This functionality mirrors Guided Access found on iOS devices. It allows you to restrict a device to a single application before lending it to another user.
To activate screen pinning, access the Settings application. Navigate to the Security section, then select 'Screen pinning' within the Advanced options. Ensure the 'Screen pinning' toggle is enabled.
Using Screen Pinning
Once enabled, locate the application you wish to lock the device to. Initiate the Activity overview by tapping the square button situated at the bottom of the screen. Then, tap the Pin icon displayed on the app's thumbnail. If the icon isn't immediately visible, scroll downwards.
To release the pinned application, simultaneously touch and hold the activity overview button (the square icon). You may be prompted to enter your device’s PIN code, depending on your chosen settings. This prevents unauthorized access and confines the user to the specified app until the device is returned.

Guest User Mode in Android 5.0
Android 5.0 Lollipop also introduced a Guest user mode. User accounts are now supported on both Android smartphones and tablets, starting with this version. To access this mode, pull down the notification drawer and tap the user icon, subsequently selecting 'Guest'.
This provides a guest user with limited access to the device, preventing them from accessing your personal information. Data created within Guest user mode is stored temporarily. Upon signing in, you can choose to resume a previous guest session or begin a new one.

Older Android Versions
Implementing guest access is more challenging on older Android versions, specifically Android 4.4 and earlier. If your Android tablet operates on Android 4.2, 4.3, or 4.4, creating a Guest user account is possible.
However, Android phones running these older versions generally lack this functionality unless the device manufacturer has included custom guest-mode software. Some manufacturers have indeed incorporated such features.

Windows
Windows operating systems offer a method for temporary access by visitors. This is achieved through a dedicated Guest account.
However, the Guest account isn't activated by default. Enabling it requires navigating to the Control Panel settings.
Enabling the Guest Account
To activate the Guest account, open the Control Panel. Then, proceed to User Accounts and Family Safety, followed by User Accounts, and finally select Manage Another Account.
Within Manage Another Account, locate and click on the Guest account option to enable it. This process prepares the system for temporary user sessions.
Using the Guest Account
Once enabled, you can log out of your primary user profile. Alternatively, you can utilize the Switch User function to access the Guest account.
The Guest account operates without requiring a password, simplifying access for temporary users. This enhances convenience while maintaining a level of security.
Account Restrictions and Data Handling
Any modifications made while operating within the Guest account are automatically discarded upon logout. This ensures each guest receives a clean, unaltered computing environment.
Furthermore, Guest accounts are subject to restrictions. They prevent the installation of new software and limit access to personal files, safeguarding the host system's integrity.
These limitations provide a secure way to allow temporary computer use without compromising the primary user’s data or system configuration.
Mac OS X Guest Account
Mac OS X incorporates a Guest account functionality, operating in a comparable manner to similar features on other systems. It provides temporary, limited access to the computer, preventing unauthorized modifications or access to private data.
Any alterations made or files downloaded during a Guest session are automatically erased upon logout, ensuring user privacy and system integrity.
By default, this feature is activated. Users can initiate a Guest session by logging out via the Apple menu and selecting "Log Out," followed by logging in as the Guest User.
Configuring the Guest Account
The settings for the Guest account can be adjusted through the System Preferences application. Navigate to "Users & Groups" to manage its status.
From this panel, you can enable or disable the Guest account as needed. Furthermore, the "Fast User Switching" option can be enabled.
Fast User Switching allows for a seamless transition between user accounts. This facilitates quick guest access without requiring a full logout from your primary Mac account.
Linux
Many Linux desktop environments provide guest accounts with similar functionality to those found on other operating systems.
Choosing the Guest user initiates a restricted session. All modifications made during this session are automatically discarded upon logout.
The Guest user option is typically visible directly on the Linux desktop’s login screen.
If the option isn't immediately apparent, explore the Users or Login preferences within your specific Linux desktop environment. There, you should locate a setting to activate the Guest user feature.
Ubuntu Example
As an illustration, on Ubuntu utilizing the Unity desktop, simply select the Guest Session icon. This icon is positioned below the displayed list of available users on the system.
This provides a convenient way to offer temporary access without compromising the security or integrity of the primary user accounts.
Chrome OS
Chromebook devices also provide a guest user session. This functionality mirrors a standard Chrome OS account, but enables web browsing without requiring initial login with a Google account.
All downloaded files and modified settings within the Guest session are erased upon logout. This presents a practical solution for lending your Chromebook without sharing login credentials or synchronizing personal data.
Activating this feature is straightforward; simply log out of your Chromebook and select the "Browse as Guest" option located at the bottom of the login screen.
Guest Mode Benefits
While not always necessary when dealing with trusted individuals, these modes are invaluable for security. Specifically, they are the safest approach when allowing children access to your device.
Even with trusted users, Guest Mode eliminates concerns about accidental access to private information or unintended system alterations.
Guest Mode provides a secure browsing environment.
Image Credit: Max Stotsky on Flickr