Post

Replies

Boosts

Views

Activity

Reply to Xcode? Hacking? Iphone11
hello, first my disclaimer...I am very new to Apple products and my knowledge base is minimal. That said, I have immersed myself in an effort to learn all I possibly can about all topics related to being hacked, because I have also been invaded. i will summarize my experiences and offer a nugget or two of gathered wisdom. i believe the invasion (access to my device) was not physical, and i think it began through using information held only by my provider. **Incidentally, in a separate though related research project, and with info gathered specific to corporate ownership, parent-child relationships, patterns found in company formation/agent for process data/physical addresses offered publicly through registration documentation, and probably more that I do not recall right now...I think I know the person who owns, or has financial control of, my cellular carrier. I will add that this person owns and controls many nationally known companies but disconnects himself by using proxy synthetic identities to hide his nefarious activities. So, his name is not connected as owner nor executive and his nefarious deeds are never connected to him. Because only one individual is ultimately in control of the naming of businesses and synthetic identities, patterns in naming are present and with diligence, anyone can find and see the same data I found. This has been a lengthy project now exceeding five years. i believe i now have adequate gathered data to support my beliefs but am striking out miserably with regard to the next step. If anyone knows what i should do next, please share. once access was achieved, shortcuts were created to allow my hacker easy-peasy monitoring of my online activity. an example of a shortcut i found is one that copies any screenshots i take when on a specific governmental website where i find data supporting the presence of criminal activity. The screenshots are sent somewhere. I have found mystery activities with "auth" and "webkit" and "trusted contacts", to name a few. Regarding the last mentioned, research revealed a "trusted contact" is a person who Google will contact should my Google account ever stop showing activity for a specified length of time. this contact can be named by account holder within data and privacy section (i think:) when "legacy something" is tapped. But I visited this "legacy" section for the first time AFTER seeing "trusted contacts" in web and app activity. This is but one of a large quantity of activities on my accounts NOT done by me. oodles of research have brought minimal fruit, though i have found a few others who have experienced unusual activity so similar to mine. Now, one commonality amongst so many of us is the fact that even with device replacement, switching carriers/sims, etc. the problem continues with rapid restart. One commenter spoke of bluetooth (specifically the bluetooth type with "wideband" in its name) being the method by which other devices in the home become infected. folks, THIS makes sense to me, but again, i am merely a novice. What the commenter recommended, actually he said it was "necessary", was (FIRST) removal of all household gadgetry with WiFi and/or Bluetooth capability. Think about it, because most of us have PUHLENTY of these items that include lightbulbs, vehicles, TVs, that little round tag that helps find lost items, and so many more we allow ourselves to acquire and forget. I myself have purposefully disallowed smart products in my home since smart products were created. Yet, a casual tally of WiFi and/or Bluetooth capable products in my home exceeds 20. After removing these items, and not returning them to the home (permanent removal is required), (SECOND) a sweep of home, cars, garage etc is recommended using a device that detects such items.basically during this phase one reverts back to a time, and way of life, reminiscent of our childhood where landline phones were the only type we knew of. In my own specific situation, i would also sweep the attic and area surrounding my home for maybe 50' to 100' on each side of home. Then, (THIRD and FINAL) acquire new gadgets and NEVER EVER REUSE PAST ACCOUNTS. all new everything is required. In my case, i would also employ Faraday bags for gadgetry when not in use and be wary of people being too helpful or owning cell phones that seem to not correlate with presumed income levels. the other nugget i heard from an Apple support representative was a reminder. he said, "vintage flip phones do not have bluetooth". (I am so glad i kept my old flip phone). For us older folks, the idea of living without daily access to smart gadgets is a familiar one and most of us do not fear this lifestyle much. I feel bad for the younger folks and business types who may presume otherwise. The impact on some would be massive. For others, like me, a change like this feels doable. anyhow...i hope someone, somewhere finds a helpful bit of info within my experience. I intend to continue learning all i can because as technology grows, so do the methods of potential exploit.
Apr ’25