Xcode? Hacking? Iphone11

I feel like Im loosing my mind and really could use some help to try and figure out what the H*** is going on.

Phone: iPhone11

Problem: It just started to flash the apple symbol (I’ve noticed it seems to be when the phone dies and I try to connect it to the charger.)

it flashes for a long time. I have tried to factory reset it.. but it will all the sudden start working again.

UNUSUAL-New-on phone: tried to go through setting and apps to back up so I can factory reset my phone and noticed something new under.. I think … it was per-app preview- xcodes preview

never seen that on my phone before and I have a crazy husband and have suspected him of hacking (and known he has had my messages sent to his iPad before-notn siren how) buuuut he is currently learning python.. and bought a watch looking device that is a mini motherboards or something and has to do with attacking Wi-Fi? In don’t know what its called.

sooo… I guess my questions are: Do you need Mac Tom install xcodes to an iPhone? is Xcode’s apart of an iPhone update? can xcodes cause my phone to flash the apple symbol?

side note: he has 2 iPads and an IPhone13 Apple Watch and 2 macs.. one of them is the newest box looking one.

And yes hen hasn had plenty of access to physically have possession of my phone and other devices (iPad) (iPods ) Oh and I noticed something under iCloud that says tracking in red, and has options for apps to request permission to track, and i think it has a tab that’s says ‘apps that have permission… and notification options, but can’t remember … I just don’t remember seeing that on my phone before either… in case someone knows if that is possibly something from hacking.

Uuuggghhh HELP please… !!!

I went to my cellphone provider and had them replace my SIM card. My phone behaved normally for a day or so then reverted. I eventually realized my ex had access to my online cellular provider account information and he had changed the password to it so I couldn’t make any changes online. After changing cell phone providers, changing all of my devices and email addresses, I finally rid myself of him. They can also hide apps on your device. I took my phone to the library and plugged it into the computer, typed “hidden” and was able to view all of the apps he’d downloaded to my phone. It does sound like your phone is hacked. The hacker has your imie, serial number, SIM card number, make and model of your phone so your best bet is to get a new device using a new Apple ID and strong password. Change all of your settings so that you aren’t even sharing information with developers. All developers are not good!

How did you eventually get round the persistent hacking. I have over £2000 worth of Apple devices and unable to replace them all!

hello,

first my disclaimer...I am very new to Apple products and my knowledge base is minimal. That said, I have immersed myself in an effort to learn all I possibly can about all topics related to being hacked, because I have also been invaded.

i will summarize my experiences and offer a nugget or two of gathered wisdom.

i believe the invasion (access to my device) was not physical, and i think it began through using information held only by my provider.

**Incidentally, in a separate though related research project, and with info gathered specific to corporate ownership, parent-child relationships, patterns found in company formation/agent for process data/physical addresses offered publicly through registration documentation, and probably more that I do not recall right now...I think I know the person who owns, or has financial control of, my cellular carrier. I will add that this person owns and controls many nationally known companies but disconnects himself by using proxy synthetic identities to hide his nefarious activities. So, his name is not connected as owner nor executive and his nefarious deeds are never connected to him. Because only one individual is ultimately in control of the naming of businesses and synthetic identities, patterns in naming are present and with diligence, anyone can find and see the same data I found. This has been a lengthy project now exceeding five years. i believe i now have adequate gathered data to support my beliefs but am striking out miserably with regard to the next step. If anyone knows what i should do next, please share.

once access was achieved, shortcuts were created to allow my hacker easy-peasy monitoring of my online activity. an example of a shortcut i found is one that copies any screenshots i take when on a specific governmental website where i find data supporting the presence of criminal activity. The screenshots are sent somewhere. I have found mystery activities with "auth" and "webkit" and "trusted contacts", to name a few. Regarding the last mentioned, research revealed a "trusted contact" is a person who Google will contact should my Google account ever stop showing activity for a specified length of time. this contact can be named by account holder within data and privacy section (i think:) when "legacy something" is tapped. But I visited this "legacy" section for the first time AFTER seeing "trusted contacts" in web and app activity. This is but one of a large quantity of activities on my accounts NOT done by me.

oodles of research have brought minimal fruit, though i have found a few others who have experienced unusual activity so similar to mine. Now, one commonality amongst so many of us is the fact that even with device replacement, switching carriers/sims, etc. the problem continues with rapid restart. One commenter spoke of bluetooth (specifically the bluetooth type with "wideband" in its name) being the method by which other devices in the home become infected. folks, THIS makes sense to me, but again, i am merely a novice. What the commenter recommended, actually he said it was "necessary", was (FIRST) removal of all household gadgetry with WiFi and/or Bluetooth capability. Think about it, because most of us have PUHLENTY of these items that include lightbulbs, vehicles, TVs, that little round tag that helps find lost items, and so many more we allow ourselves to acquire and forget. I myself have purposefully disallowed smart products in my home since smart products were created. Yet, a casual tally of WiFi and/or Bluetooth capable products in my home exceeds 20. After removing these items, and not returning them to the home (permanent removal is required), (SECOND) a sweep of home, cars, garage etc is recommended using a device that detects such items.basically during this phase one reverts back to a time, and way of life, reminiscent of our childhood where landline phones were the only type we knew of. In my own specific situation, i would also sweep the attic and area surrounding my home for maybe 50' to 100' on each side of home. Then, (THIRD and FINAL) acquire new gadgets and NEVER EVER REUSE PAST ACCOUNTS. all new everything is required. In my case, i would also employ Faraday bags for gadgetry when not in use and be wary of people being too helpful or owning cell phones that seem to not correlate with presumed income levels.

the other nugget i heard from an Apple support representative was a reminder. he said, "vintage flip phones do not have bluetooth". (I am so glad i kept my old flip phone). For us older folks, the idea of living without daily access to smart gadgets is a familiar one and most of us do not fear this lifestyle much. I feel bad for the younger folks and business types who may presume otherwise. The impact on some would be massive. For others, like me, a change like this feels doable.

anyhow...i hope someone, somewhere finds a helpful bit of info within my experience. I intend to continue learning all i can because as technology grows, so do the methods of potential exploit.

Xcode? Hacking? Iphone11
 
 
Q