you clearly did not actually read what I wrote , as you said all the blame the victim rhetoric I was speaking too, then you made assumptions , stated that as fact, you way off the mark. It’s not isolated to Apple, it’s accross the IoT , Apple ID also the targeted platform as is Google. Both Apple and Google have been Super supportive thru thus challenging endeavor, with could say the same for TMobile -ATT etc. you even told me how it happened??? I have been living this for almost 2years , I have a doctrine in Hacking survival, I was not caught in phishing expositions , would not matter if I was , as the code they used can be click free . It’s realeased thru animation they an email that goes to the cloud , the user does not even see it ,I was also using a secure ID , you are only as safe as the platform - you can made it more difficult , but if you’re targeted is easy and unavoidable, anyway my issue landed in my lap after a stayed in a Hampton In -and used my computer , logged into my TV apps and You tube, now they had my ID . Credit card , passcodes , their captive WiFi was a weapon of theft, that was the beginning and I did not discover that until 8 months after checked out, please re-read and see if you might have a question for me , know one can understand the full ramifications of this ordeal unless you have been in this situation.