Post

Replies

Boosts

Views

Activity

Reply to Can someone review this log and tell me if suspcious
Dealing with same. Have attempted to sanitize, have quarantined all devices, changed router, changed devices x3, pre and post paid, changed device manufacturer, transfer provider, cancel cable, hell we even cut up and threw away all chip cards. After doing all the above in tandem was able to get a week or so of ”normalcy”. Have become much more educated over last 90 days for sure. All the above fits my description, however I believe that they are targeting crypto wallets. Agree that it’s a spy or malware, can’t agree enough that it’s more personal than financially motivated. Apple (especially Apple Community) act as though their first born will cease to function by admitting that a high school kid with a gaming computer can log into github and easily take ownership of any device. Swear you gotta be important and it takes millions of dollars to get into iPhones. So happy I found this thread, especially with an expert who’s at least willing to admit it’s possible. I’ve just started reading (and unzipping/translating the syslogs and have some interesting findings. I also found an article recently while researching that piqued my curiosity re: a Chinese malware that hides very well and rewrites standard apple functions to remain hidden. Not going to post a random link here for obvious reasons but the site was blackhat if you’d like to look for it. Look forward to hearing/sharing results and findings…
May ’25