INEEDA_SUPERPHONE_WIZARD wrote:
…I have had the phone 3 days but I’m going through a nasty breakup and I feel there is a bad actor somewhere. Thank you any info will be appreciated let me know what to show or point out please so I have hard proof.
Here is how to better secure your iPhone: Personal Safety User Guide - Apple Support
Use Safety Check for this case.
While compromises and exploits of iPhone are possible, all available evidence indicates they’re quite rare on current iOS versions, and usages are quite targeted. Usual security problems most of us will encounter are with phishing, and compromised passwords and passcodes, and locally compromised security such as known passwords or unencrypted backups and such, known social media passwords, maybe hardware keyloggers or other hardware installed on desktops or such when physical access has been available to your adversary, etc.
The situation here also matters: if you’re having a particularly bad breakup with a multi-millionaire or billionaire or otherwise with access to tooling worth and costing millions, or an investigative journalist or high-profile political dissident, yes, the calculations and risks for exploits can shift. Most of us, not so much.
If the situation has potentially been ongoing for a year or longer, then there is little or nothing that new that can be suggested, either. You will have already received what suggestions and help is possible via a forum, and suggestions and help which clearly did not work out for whatever the issue might be here. Which means more specialized assistance with whatever the problem might be here, whether technical issues with hardware or software, or otherwise.
If you’re interested in learning about digital forensics and incident response (it’s not at all what Hollywood shows), there are books and resources available, and you will want to learn about indications of compromise, about automated scanning tools, and also about the iOS kernel and about what is normal chatter. And also about not posting potentially or actually sensitive data.
Posting of screenshots of random reports found in telemetry and logs is not useful for detecting malware. No evidence of malware is shown here, either. Just the usual chatter. And across all of the folks and all of the screenshots of all of the telemetry that’s been posted around here, I’ve yet to see any evidence of iPhone compromises posted as forum screenshots. Buggy apps here and there, iOS bugs, and networking and hardware issues, sure. Malware, not so much.