My hand off gets turned on quite a bit also.
my new phone was taken over before I even added an Apple ID or an email.
check your Safari UA (user agent)
this is mine.
this UA (Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; GTB6; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; InfoPath.2; .NET CLR 3.5.21022; .NET CLR 1.1.4322; .NET CLR 3.5.30729; OfficeLiveConnector.1.3; OfficeLivePatch.0.0;) tells us that the visitor is using Internet Explorer 8, Windows Vista, has Media Center PC 5.0 installed, Office Live Connector, etc. So if we had a special section for Vista users, we could redirect this person based on the Windows NT 6.0 string to a sub section in our site related strictly to Vista. This User Agent on the other hand, Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 tells us the visitor is using FireFox 3.5.3 and Windows Vista. Not much else.
when I first signed in to yandex in Russia I said my IP address was x and my location was Alabama and ask for confirmation. I definitely agreed seeing how my sociopath ex (the one that brought about all this devastation and destruction for 12 years now) just happens to live in Alabama.
I tracked that IP address for a while. It was a Verizon wireless static ip that is now in Knoxville tn. Red herring no doubt. It drove through Alabama and made its way to Knoxville after a week and that’s where it is now.
to get the report of your ua
iptools.com I think is where I found that.
if you have gmail you can also find it listed on the web/desktop version of gmail and you can also see any ip addresses recently in your account.
it amazes me that someone can ssh into my ****. Destroy my devices. Take all my online accounts. Cause so much chaos stress and havoc in my life and nothing ever happens to this oxygen thief. My children 8/9 years old can’t have a working computer to do schoolwork or anything else with for that matter.
the last week of school they used my work phone. This phone. This monster can look the kids in the eye and swear to the kids that I’m crazy and she knows nothing about all that stuff. And goes merrily on her way knowing that I witnessed this first hand. Seen her notes. Seen all her wiki how screen shots on her google account. Kali Linux meterpreter sessions. Metasploit. Reverse tcp lhost etc etc. Had a photo copy of my phones screen showing she was in it on morning about 7 years ago had sha256
smtp
ftp
samba
mmwiley913@gmail
had another folder with “keys” to everything in it. I took this to the authorities and they did nothing. No one does nothing. No one will help you. No one gives a **** that you’ve spent a fortune replacing everything and it does no good. I have reached my limit.
the 2 iPhones I bought the other day was my had enough moment. It is time to switch tactics and reframe from my defensive approach and position and become amphibious and offensive. look out sourceforge
im gong incognito for real