Watchlistvictim wrote:
Will you explain what information needs to be presented from a device being managed beyond the cellular Wi-Fi and carrier settings—and what makes the information provided inconclusive?
Scroll up and read the posting I was replying to.
As part of acquiring evidence of compromise, that usually involves familiarity with the platform, familiarity with what is normal and expected (such as routine log chatter), and gathering details of what is not normal. There are books and classes on those topics; on the platform, and on forensics.
Will you explain what you mean when you say mysteriously managed?
Devices purportedly managed by unknown or unidentified or suspected others, while lacking visible installed profiles, and lacking carrier profiles. That would include the “hidden unremovable MDM profiles” mentioned earlier in this thread.
and what you mean by generic, ominous and scarily-worded details?
Misgivings manifesting from misinterpretations of the mundane, mostly.
What would make this a result of the information being in a log?
See the original post above.
Further complicating these discussions, iPhone, iPad, and Mac are most definitely not invulnerable, compromises can exist, and forensics investigations typically require direct device access, time and effort, and may well find no evidence, that investment may well not resolve anything.
In short: Proving a negative—that a device is not somehow compromised—is basically impossible.
Or sometimes there is some other security or privacy issue involved, such as concealed cameras or compromised passwords or cellular trackers or otherwise. Or the purported perpetrator is simply gaslighting their intended victim, possibly based on other sources of information.
While Apple products are not invulnerable, compromises are by no means easy. And that the exploits involved are exceedingly expensive—full exploits with persistence are worth a couple of million dollars each, and their usage is typically targeted, based on available info. If you’re being targeted by folks with the level of resources that entails, you’re probably going to have a bad day, and you’ll accordingly want and need personally-tuned and tailored help with your security.