What Is iCloud+ and What Can You Do With It?

As you upgrade to iOS 15, iPadOS 15 (and macOS 12 Monterey by the end of the year), you’re going to see references to iCloud+. You might even already be an iCloud+ subscriber! That’s because iCloud+ is Apple’s new name for what you get if you pay for additional iCloud storage for yourself and up to five family members, which has been possible for a long time.

iCloud+ comes with some new features as well, namely iCloud Private Relay (still in beta), Hide My Email, and Custom Email Domain, along with expanded HomeKit Secure Video support. Three tiers of iCloud+ match up with the previous storage tiers:

  • 50 GB for $0.99 per month gets you all the iCloud+ features plus HomeKit Secure Video support for one camera

  • 200 GB for $2.99 per month gets you all the iCloud+ features plus HomeKit Secure Video support for five cameras

  • 2 TB for $9.99 per month gets you all the iCloud+ features plus HomeKit Secure Video support for unlimited cameras

We expect that most people will subscribe to iCloud+ largely for the extra storage—Apple provides only 5 GB of iCloud storage for free—but once you’re paying for more storage, the other new features are welcome. Let’s look at each.

Blog Photo

iCloud Private Relay

Whenever you browse the Internet, your privacy can be compromised in two ways. First, anyone on your local network can see the names of the websites you access based on your DNS lookups. Second, the websites you visit record the IP address of your computer, which makes it easier for advertisers to track you across multiple sites.

iCloud Private Relay, which Apple says will come out of beta by the end of the year, attempts to block such tracking by encrypting your Safari traffic (plus DNS queries and most non-HTTPS Web queries), sending it through two proxy servers, and associating it with a geographically reasonable but otherwise anonymous IP address. That way, the first proxy server (which Apple runs) knows who you are but not what site you’re visiting. The second proxy server (run by companies other than Apple) knows what site you’re visiting, but not who you are.

Blog Photo

Although Apple’s technique appeared to work well and early reports suggest that it didn’t slow down traffic noticeably, networking is notoriously complex. Apple wanted more time to ensure that iCloud Private Relay works as promised with all network traffic, which is why the feature remains in beta. However, nothing prevents you from trying it out now. After you turn it on, you shouldn’t notice any difference when using the Internet. Just make sure that if you have network-related troubles, you remember to turn off iCloud Private Relay to remove it from the troubleshooting equation.

To enable the feature, go to Settings > Your Name > iCloud > Private Relay (Beta) and turn on the switch for Private Relay (Beta). In the IP Address Location Settings screen, you can choose whether iCloud Private Relay should try to maintain your general location or just make sure it gets your country and time zone correct.

Blog Photo

Hide My Email

Have you ever felt icky giving your email address to a questionable website, knowing that it’s probably going to spam you with unwanted solicitations? The new Hide My Email service that’s part of iCloud+ creates random, unique email addresses that automatically forward to your inbox, either your Apple ID address or another address associated with an email account configured on your device. In fact, Apple has provided this option for some time with apps that use the Sign in with Apple service—you can opt to give them a random address instead of your real address.

To use Hide My Email, go to Settings > Your Name > iCloud > Hide My Email. Make sure the Forward To address is the one you want, and then tap Create New Address at the top. Either accept the address provided or ask for a different one, give it a label and optional note so you know where you used it, tap Next, and tap Done.

Blog Photo

To stop receiving email from an address, tap it in the list and tap Deactivate Email Address. In the Inactive Addresses list, you can see such addresses and leave them for reference, reactivate them, or delete them.

Blog Photo

Custom Email Domain

Throughout the history of iCloud (including its predecessors iTools, Mac.com, and MobileMe), users have received email addresses that end with the mac.com, me.com, and icloud.com domains. If you wanted to register your own custom email domain (like hoopyfroodemail.com, for instance) and use that in a personalized email address, you had to rely on another service like Gmail or Fastmail.

With iCloud+, it is at long last possible to connect up to five custom domains and use them in addition to the standard domains. You (and each person in your Family Sharing group) can have up to three addresses for each domain. Note that you must have a primary iCloud Mail email address set up and have two-factor authentication enabled for your Apple ID.

Although the process for setting up a custom email domain isn’t that difficult, it’s beyond the scope of this article. You need to have a domain registered, update DNS records with your domain registrar, associate email addresses with the custom domain, and verify your settings. Apple provides instructions, and you should also read How to Set Up Custom Email Domains with iCloud Mail from TidBITS for more real-world coverage. Reach out if you need help.

Our take is that this feature is welcome, but it’s just for hobbyists and families. If you’re running a business of any sort, you should have a custom email domain with a full-fledged email service. Contact us for advice on the best solution for your particular situation—this is very much not a “one size fits all” scenario.

HomeKit Secure Video

The final iCloud+ feature is HomeKit Secure Video, previously a free bonus with the higher-level iCloud storage plans. It requires a compatible third-party security camera and takes over from the manufacturer’s app to ensure that no one can access your video, including the camera maker and Apple. That’s a big deal—one of the main problems with many third-party security cameras is that they transmit and store video in insecure ways, making it possible for evildoers to capture video from inside your house. (Yeah, it happens.)

All that seems to have changed with iCloud+ is that Apple has added HomeKit Secure Video to the 50 GB plan with support for one camera, increased the number of supported cameras on the 200 GB plan to five, and allowed an unlimited number of cameras for 2 TB plans.

As with custom email domains, the steps necessary to set up a security camera in the Home app and work with HomeKit Secure Video are beyond the scope of this article. Apple provides basic instructions, and the year-old article Apple’s HomeKit Secure Video Leverages iCloud Storage and Preserves Privacy from TidBITS explains more and provides context.

Welcome as these features may be, they’re unlikely to compel upgrades for those who don’t need more than the 5 GB of free iCloud storage. However, it’s so common to need more iCloud space for photos, backups, and files that we anticipate lots of people taking advantage of the iCloud+ features that come along for the ride.

AI Usage Transparency Report

Pre-AI Era · Written before widespread use of generative AI tools

AI Signal Composition

Rep Tone Struct List Instr
Repetition: 52%
Tone: 59%
Structure: 45%
List: 2%
Instructional: 27%
Emoji: 0%

Score: 0.05 · Low AI Influence

Summary

iCloud+ is a new service from Apple that offers additional features and storage for users. It includes iCloud Private Relay, Hide My Email, Custom Email Domain, and HomeKit Secure Video.

Related Posts

How I Finally Passed the PMP Exam (After 12 Years of Waiting)

Back in 2013, I registered for a PMI membership with every intention of pursuing my PMP certification. I downloaded the handbook, bookmarked the eligibility requirements, and even told a few friends that I was going to do it "soon." At the time, I thought getting certified would be a straightforward process, but little did I know what lay ahead in terms of studying and preparation.

Read more

The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth

When I recently passed the Apple Certified Support Professional (ACSP) exam again, I paused to reflect — not just on this milestone, but on the long path I’ve walked through Apple’s certification landscape. My first certification dates back to macOS 10.5, and over the years, I’ve earned credentials across nearly every version since. In that time, the exams — and Apple itself — have transformed significantly.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune

Alright, so today we're going to be talking about the management of bring your own device BYOD for Android devices. There's a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen to use Jamf where I work, but you could use anything from Braavos to SimpleMDM to Kanji or JumpCloud. Mosyle is also a great option.

Read more

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.

Read more

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. This approach will help prevent unauthorized access and data breaches, aligning with our commitment to maintaining the security and integrity of company communications.

Read more

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.

Read more

Get more out of scripting than you may expect

Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems. Its functionality allows users to interact with these programs through scripted commands, eliminating the need for manual input.

Read more