logo
I just installed the iOS 26 beta — and here's the first thing I did to make Liquid Glass better

I just installed the iOS 26 beta — and here's the first thing I did to make Liquid Glass better

Tom's Guide13-06-2025

Just like a lot of my colleagues that were tuned into the WWDC 2025 keynote, I was excited for the new iOS 26 redesign with its new Liquid Glass interface. Apple's reason to implement this change is to unify how its software looks and feels across its entire device portfolio, so whether you're using iPadOS 26 or macOS Tahoe 26, you'll be treated to a familiar experience.
Liquid Glass brings a layered design philosophy that borrows from what Apple has done previously with visionOS, but it does introduce one particular quality that made things confusing for me. Soon after I installed the iOS 26 developer beta on my iPhone, I noticed how the transparency of Liquid Glass clashes with the way the Control Center appears on top of certain elements, like the icons on my home screen, or very busy web pages.
After showing this to one of my colleagues, he suggested a fix that changes the way Liquid Glass looks — and I suggest you do the same as well. Here's what I did.
The problem with Liquid Glass is that the space surrounding icons in Control Center is too transparent. Now, this isn't a visual distraction when I'm running apps that are showing mostly one solid color, but it looks messy when I access it on my home screen. This is because there's not as much separation between the overlaid Control Center with all the icons on my home screen.
That's why the first you'll want to do in iOS 26 is what I ended up doing — enabling the reduce transparency option. It's really simple and it makes Control Center easier to visualize over the home screen and apps.
You simply need to go to the Settings menu, select Accessibility, then Display & Text Size, and finally hit the toggle for Reduce Transparency. According to the option, it helps to improve the contrast between the foreground and background colors.
Even though this feature is referred to as reduce transparency, the end result looks more like no transparency at all when I access Control Center. That's because the surrounding background becomes more opaque in tone, which ditches the see-through look that Liquid Glass offers. If you look at the shots above, you'll see the difference with how Control Center looks when it's overlaid on top of something.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
While I was looking at the before and after screens, I also tried enabling another accessibility option to help out with this — increase contrast. I like the way this adds more contrast to when the screen is covered by buttons that have very similar color tones to them. For those with reduced sight, this certainly helps to distinguish elements all across iOS 26.
I'm not saying that Liquid Glass is poorly implemented with the Control Center, but the issue I have with the current implementation is that it feels like there's not enough separation between the overlays. Like I've said, it looks messy because of how difficult it is to make out icons in Control Center.
Perhaps a stronger blur effect to the background, or an animation that "shrinks" the background could make for better layering with this new interface. Either way, I hope Apple does make a change to this before the final iOS 26 public build is released later this year.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Why Danny Boyle shot ‘28 Years Later' with iPhones
Why Danny Boyle shot ‘28 Years Later' with iPhones

TechCrunch

timean hour ago

  • TechCrunch

Why Danny Boyle shot ‘28 Years Later' with iPhones

In Brief Director Danny Boyle famously shot his post-apocalyptic classic '28 Days Later' on Canon digital cameras, making it easier for him to capture eerie scenes of an abandoned London, and giving the movie's fast-moving zombies a terrifying immediacy. To make his decades-later sequel '28 Years Later' (which opened this weekend), Boyle turned to a different piece of consumer tech — the iPhone. Boyle told Wired that by using a rig that could hold 20 iPhone Pro Max cameras, the filmmaking team created 'basically a poor man's bullet time,' capturing the brutal action scenes from a variety of angles. Even when he wasn't using the rig, Boyle (who once directed a biopic of Apple co-founder Steve Jobs) said the iPhone was the movie's 'principal camera,' albeit after disabling settings like automatic focus and adding special accessories. 'Filming with iPhones allowed us to move without huge amounts of equipment,' Boyle said, adding that the team was 'able to move quickly and lightly to areas of the countryside that we wanted to retain their lack of human imprint.'

Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP
Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP

Yahoo

time2 hours ago

  • Yahoo

Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP

A staggering 16 billion login credentials — including usernames, emails, and passwords for Apple, Google, Facebook and more — have been leaked online, shocking cybersecurity researchers. The data even contained the credentials of government officials, posing security concerns. The compromised data was scraped from over 30 databases since the start of 2025 and likely stems from malicious 'infostealer' software designed to extract sensitive information from victims' devices, a report published by Cybernews reveals. The leaked credentials span nearly every type of online service imaginable from social media and email accounts to VPNs and developer platforms. "No stone was left unturned," the report warns. Thanks to Jeff Bezos, you can now become a landlord for as little as $100 — and no, you don't have to deal with tenants or fix freezers. Here's how I'm 49 years old and have nothing saved for retirement — what should I do? Don't panic. Here are 6 of the easiest ways you can catch up (and fast) Nervous about the stock market in 2025? Find out how you can access this $1B private real estate fund (with as little as $10) This breach isn't just about stolen email addresses, it's about what cybercriminals can do with your full login credentials — especially if you tend to use the same passwords across your different accounts. Once hackers get your email and password combo, they can launch a range of attacks, including: Credential stuffing: Hackers try your login across banking, streaming, shopping, or investment sites. If you reuse passwords, they could gain access to your most sensitive accounts. Phishing and social engineering: With access to personal details or email accounts, scammers can send convincing fake messages or impersonate you to friends, coworkers, or customer service agents. Identity theft: Stolen credentials can be used to open credit cards, apply for loans, or take over government benefit accounts in your name. Access to 2FA and backups: If hackers get into your email, they may intercept security codes, password reset links, or even gain access to your cloud storage and documents. Google, Facebook, Netflix, Apple, LinkedIn, Dropbox and PayPal are among the slew of accounts with data compromised meaning nearly every kind of online identity is at risk. Even worse: many of the stolen credentials are in plain text, making them incredibly easy to exploit with automated tools. While the current combination of credential data is new, some of the data could also be from previous data breaches, including a database containing 184 million records discovered back in May of this year. Read more: Want an extra $1,300,000 when you retire? Dave Ramsey says — and that 'anyone' can do it With billions of passwords out in the wild, here's how to stay one step ahead of hackers: Change your passwords — especially for email, banking and shopping accounts. If you reuse passwords, it's time to break the habit. Turn on 2FA — that's two-factor authentication. It adds a second layer of defense, and it's free on most platforms. Use a password manager — stop relying on your memory (or sticky notes). Let an encrypted vault generate strong passwords for you. This makes it easier to change your password frequently, too. Watch your inbox — phishing scams tend to spike after big breaches. Don't click suspicious links, even if they look legit. Most importantly, monitor any financial accounts you have closely. Think PayPal, bank accounts and credit cards etc. Check your statements and even pull a credit report from Equifax, Experian or Transunion. 'This is the mother of all data breaches,' Ed Peters, CEO of Data Discovery Sciences, said to NBC 5 DFW. 'We tend to think of a lone hacker going and stealing your data. That's not the case.' With cybercriminals sitting on a dragon's hoard of credentials, experts say the risks of account takeovers, phishing and fraud are higher than ever. Don't wait for a 'suspicious activity' email — lock it down now. Rich, young Americans are ditching the stormy stock market — here are the alternative assets they're banking on instead Robert Kiyosaki warns of a 'Greater Depression' coming to the US — with millions of Americans going poor. But he says these 2 'easy-money' assets will bring in 'great wealth'. How to get in now This tiny hot Costco item has skyrocketed 74% in price in under 2 years — but now the retail giant is restricting purchases. Here's how to buy the coveted asset in bulk Here are 5 'must have' items that Americans (almost) always overpay for — and very quickly regret. How many are hurting you? Like what you read? Join 200,000+ readers and get the best of Moneywise straight to your inbox every week. This article provides information only and should not be construed as advice. It is provided without warranty of any kind.

If You Get This Message From Apple Or Google, It's An Attack
If You Get This Message From Apple Or Google, It's An Attack

Forbes

time2 hours ago

  • Forbes

If You Get This Message From Apple Or Google, It's An Attack

Delete all these messages. There's nothing a cyber criminal likes more than highly publicized events, sudden fear and a sense or urgency. And so last week's headlines that 16 billion passwords leaked in the 'largest ever data breach' hit the jackpot. That this 'opened access' to Apple and Google accounts, the most prized of all, just made it all the sweeter. The fact there's no new data breach impacting Google or Apple or Microsoft or Facebook is beside the point. This is an amalgamation of various breaches, collecting data from multiple sources including infostealers on PCs. But users reading the headlines will not realize and will understandably panic. This highlights the weakness in using passwords to secure accounts. Despite what you've read, the answer is not to reset or change all your passwords. It's to enable two-factor authentication on all your key accounts — especially the likes of Apple, Google, Microsoft, Facebook and Amazon. Better still, switch to passkeys where you can. But many everyday users are now at risk from attacks, whether or not their user names and passwords were in any of those breached datasets. Attackers will now send out emails pretending to be from Apple, Google or other brands, warning of the breach and linking to the public headlines and password reset advice. And those emails or texts will helpfully include a password reset link or a helpline number to call. We've already seen multiple attacks on Apple and Google users, with fake support emails or calls or texts warning that accounts are compromised and passwords need to be reset. These recent headlines are a surprise gift to those attackers. And so, a timely reminder that no major tech brand — Google, Apple, Microsoft and Facebook included — will ever reach out to you about an account security problem or to reset a password. If you receive any such message or call, it's an attack. Period. Google has asked me in the past to 'please reiterate to your readers that Google will not contact you to reset your password or troubleshoot account issues.' The same is true for all those others. It never happens. As the FBI says, 'legitimate customer, security, or tech support companies will not initiate unsolicited contact with individuals." Even if a message is so plausible that you can't ignore it, you must still delete it and access your account using the usual means. Online or using your app. If there's a password issue you'll be directed to a reset option. There won't be. Similarly, if you receive a call or a message to call back, do not respond. Access your account as normal. Google and Apple account details are the most valuable, granting access to many apps and services and the mobile phones that control our lives. But treat any messages from Microsoft or Facebook or any other brand in the wake of this 'breach' the same way. The key advice — to add 2FA or passkeys — will protect you even if a breach is new. The final advice is to avoid SMS 2FA — use another method if you can.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store