Aggregated disk writes

i have found the text below in iPhone analytics data. What does it mean please?

{"app_name":"aggregated","app_version":"","bug_type":"145","timestamp":"2020-02-06 08:20:33.14 +0300","os_version":"iPhone OS 13.3.1 (17D50)","incident_id":"34880E87-9A67-4A16-A17A-94D0369275CF","slice_uuid":"B722CBE6-961A-3300-80E4-2CC18CCFC143","build_version":"","is_first_party":true,"share_with_app_devs":true,"name":"aggregated"}

Date/Time: 2020-02-05 21:01:20 +0300

End time: 2020-02-06 08:20:32 +0300

OS Version: iPhone OS 13.3.1 (Build 17D50)

Architecture: arm64e

Report Version: 29

Incident Identifier: 34880E87-9A67-4A16-A17A-94D0369275CF


Data Source: Microstackshots

Shared Cache: 0x1a4e8000 A77981DC-1632-354B-978B-380DC657D1E6

Shared Cache: 0x24988000 A77981DC-1632-354B-978B-380DC657D1E6


Command: aggregated

Path: /System/Library/PrivateFrameworks/AggregateDictionary.framework/Support/aggregated

Version: ??? (???)

PID: 1811


Event: disk writes

Action taken: none

Writes: 1073.75 MB of file backed memory dirtied over 40752 seconds (26.35 KB per second average), exceeding limit of 12.43 KB per second over 86400 seconds

Writes limit: 1073.74 MB

Limit duration: 86400s

Writes caused: 1073.75 MB

Writes duration: 40752s

Duration: 40752.35s

Duration Sampled: 40679.60s

Steps: 263 ( (10.49 MB/step))


Hardware model: iPhone12,1

Active cpus: 6

iPhone 11, iOS 13

Posted on Feb 7, 2020 5:50 PM

Reply

Similar questions

95 replies

May 29, 2020 2:10 PM in response to Community User

Mine hasn’t ever been green. When I go anywhere on Apple I get directed through idmsa.apple.com. I have never paid for a developer account but yet I can access any developer site I want. I got kicked out of their community because I was complaining about all this stuff and I guess I broke the non disclosure agreement. But I can still get there. That’s why I think the developers/hackers have something to do with it. They ain’t angels!

May 29, 2020 4:38 PM in response to Jagcresmur

I have the answers. The date is very significant. I’m driving.

Apple don’t care. They have bet to great lengths to make people believe their lies.

Apple is more vulnerable than most os.

the tv app has a cve. I forget the number. A cve is a fault or a defect in which it can be exploited. There are many weaknesses. That’s an easy one. You are hacked my friend. Your device sends audio and video in real time to your attacker. Most likely it’s someone very close to you. Your device or I’m my case all my devices are nothing but tracking and spy devices that just so happen to e used as a telephone.

there’s a lot more to this but I’m driving home. I’ll reply more later.

May 29, 2020 5:23 PM in response to Community User

IDS|株式会社アイディエス

idsma.com

医療用「検体搬送システム」の専門企業 IDS(株式会社アイディエス)の企業サイトです。

idsma.com at WI. IDS|株式会社アイディエス

website.informer.com › idsma.com

WWW.IDSMA.COM Visit www.idsma.com. General Info. Stats & Details Whois IP Whois Expand all blocks. IDS|株式会社アイディエス. 医療用「検体搬送システム」の専門企業 IDS(株式会社アイディエス)の企業サイトです。 Keywords: ids, 血液検査, 株式会社アイディーエス, 分注, アイディエス, 検体搬送, ids japan, ids lab. Mar 20, 2020. Hide


im not sure. I’m exhausted from a day of **** on a hot roof. Translate some of that and see if it helps.

IDSMA is New to me. May have something to do with this discussion board. I’m new to it also

May 29, 2020 6:27 PM in response to GTOMkke

Apple store

get libterm


type help. See if dig command is there.

if not type

package list

to see available packages.

install any that are network related that may contain dig


at the terminal type cd /

Hit enter key

then type:

dig

hit enter


you can try to dig different directories but I don’t think it will matter.


you will get the ip address of your “server”

geo locate IP Address don’t trust first geo locate. Do several different ones.

do a who is on it

trace ip


get networking utility tools from Apple store.

send ascii messages to IP address and port number threatening their well existence. It’s kinda fun



/dev

/etc

/usr

/var

/proc

/lib

/run

/boot




Jun 4, 2020 4:51 PM in response to Community User

My hand off gets turned on quite a bit also.

my new phone was taken over before I even added an Apple ID or an email.


check your Safari UA (user agent)


this is mine.

this UA (Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; GTB6; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; InfoPath.2; .NET CLR 3.5.21022; .NET CLR 1.1.4322; .NET CLR 3.5.30729; OfficeLiveConnector.1.3; OfficeLivePatch.0.0;) tells us that the visitor is using Internet Explorer 8, Windows Vista, has Media Center PC 5.0 installed, Office Live Connector, etc. So if we had a special section for Vista users, we could redirect this person based on the Windows NT 6.0 string to a sub section in our site related strictly to Vista. This User Agent on the other hand, Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 tells us the visitor is using FireFox 3.5.3 and Windows Vista. Not much else.


when I first signed in to yandex in Russia I said my IP address was x and my location was Alabama and ask for confirmation. I definitely agreed seeing how my sociopath ex (the one that brought about all this devastation and destruction for 12 years now) just happens to live in Alabama.

I tracked that IP address for a while. It was a Verizon wireless static ip that is now in Knoxville tn. Red herring no doubt. It drove through Alabama and made its way to Knoxville after a week and that’s where it is now.


to get the report of your ua


iptools.com I think is where I found that.


if you have gmail you can also find it listed on the web/desktop version of gmail and you can also see any ip addresses recently in your account.


it amazes me that someone can ssh into my ****. Destroy my devices. Take all my online accounts. Cause so much chaos stress and havoc in my life and nothing ever happens to this oxygen thief. My children 8/9 years old can’t have a working computer to do schoolwork or anything else with for that matter.

the last week of school they used my work phone. This phone. This monster can look the kids in the eye and swear to the kids that I’m crazy and she knows nothing about all that stuff. And goes merrily on her way knowing that I witnessed this first hand. Seen her notes. Seen all her wiki how screen shots on her google account. Kali Linux meterpreter sessions. Metasploit. Reverse tcp lhost etc etc. Had a photo copy of my phones screen showing she was in it on morning about 7 years ago had sha256

smtp

ftp

samba

mmwiley913@gmail

had another folder with “keys” to everything in it. I took this to the authorities and they did nothing. No one does nothing. No one will help you. No one gives a **** that you’ve spent a fortune replacing everything and it does no good. I have reached my limit.

the 2 iPhones I bought the other day was my had enough moment. It is time to switch tactics and reframe from my defensive approach and position and become amphibious and offensive. look out sourceforge

im gong incognito for real

Jun 9, 2020 3:10 PM in response to Community User

This is happening to me as well. Ive just started seeing the Squllte stuff, also noticed slice uuid, chinese tokenizer, cant encrypt my icloud email its all greyed out as are a lot of settings whoever is doing this doesnt want changed. Its definitely happening and its obvious. They got into my childrens nintendo switch ffs, any device in my house even an amazon fire straight out of the box. im not paranoid or crazy this happened after i downloaded fing network scanner felt it had too much info etc and deleted it then some really weird stuff continues to follow.

Jun 28, 2020 4:19 PM in response to DARKG8R

Ok

3 years ago i was a complete nobody on this subject

it turns out that a person close to me told me she installed something on a suspected cheaters device where she got access to everything on the device location data messages emails phone calls camera.... everything Then that same person knowing word for word what i sent in a text when she was no where near me made me realize she had done it to me also

So my research into everything began These “ developers” not only access my device they access every aspect of my private life i have had almost 40 different devices over 3 years same outcome new passwords new emails new phone numbers new carriers and countless factory resets same outcome

it turns out they are using apple and many other developer programs using my personal info to do the unthinkable

every cyber crime and financial fraud seems to be coming from my device and the laundering seems to be going to canada and london ironically where my device is registered when i live in new york US

one they are in they are in

they have infiltrated every network and carrier and as many wi fi hotspots as they can so that all complaints of the matter are filtered thru them nothing will get done

apple told me contact authorities but when i did they literally took me to get checked for mental issues

i have tried it all no change

you want the source of this intrusion

its my name

nick f.

and all friends and family members also

im an innocent single hard working dad whos jist doung what i can for my child

unfortunately these people also have access to the government authorities and have been fowarding all the criminal data to them from my device in hopes i will take the fall

however DOJ Investigations are underway and the survelilance on me will prove i do notjing wrong

theres millions of dollars involved with dangerous people And i know the source

i need all the help i can get so wish me luck

ill keep u updated


[Personal Information Edited by Moderator]

Sep 2, 2020 6:51 AM in response to Curious3729

I found permission files or license keys how ever you want to say it, for windows os, every version. This license or keys allows you to connect remotely with anything and everything. My sociopath ex was very good at covering her tracks but I found them buried on an old hard drive. I saved every hard drive from every computer and device I’ve ever had even though they were wiped remotely. Ther are cell phone codes in these keys for every carrier in every country. The manufacturer of the phone has nothing to do with the ability to be hacked. This attack that I’ve been dealing with for over 12 years originated at Berkeley, MIT, and www.w3.org I have no idea how she got her hands on this but it can’t be stopped in my situation. I had 2 weeks of privacy when I got an iPhone 6 and opened a metro pcs account under a fake name.

Sep 20, 2020 4:23 PM in response to Fearless1978

I have since found that all 3 of my iPhone are broadcasting video and audio. Somehow the sociopath has set up websockets on my iMac and on a couple raspberry pi’s and some how they are my phones are usb web cams? Connected to the websockets and sending everything I do and say from microphone and fromt n rear cameras on 3 freaking phones.

whomever said I phones must be jail broke to compromise really don’t know what nodejs python3 Perl xml is capable of. the sociopath has never even seen or touched any of my phones. Or TVs but yet somehow she manages to do what she wants with them. with Android she had them hymmed up Along with any and every email I would try to make in a rogue version of gsuite. Once she gets the uuid of the device it’s over. You can’t stop Bluetooth BLE

most idiots don’t even know it’s there but it’s been around and utilized as a mesh network for hacking and spying a long time.

Oct 15, 2020 3:58 PM in response to Cr21h

This is has been happening to me since last year on all 4 devices. I don’t have a clue about all the tech lingo but I’m certain I’ve got some sort of spyware on my phone, malware it’s a hacker that’s having fun with me because I have these exact same issues, including the cable company part. I had a new router and receiver sent out but I’m suspicious of the techs that came out and installed them too and the people I supposedly spoke with at Apple about these issues.


does anyone know of a way to at least understand the data/analytic logs on an iPhone 8+, iPads, MacBook Pro and an iPhone 6s. Thanks because it’s driving me bonkers and it even has me locked out of my laptop in “lost mode” and can not retrieve the pin. Apple said I had to bring in the receipt for them to unlock it BUT I bought it over 4 years ago and don’t have a copy of the receipt!!! But any explanation of how To fix these issues or what I can do or should do would help. Maybe apps or info on what to look for in the logs that would tell me if it’s spyware, malware, a hacker, or if everything I’m seeing is normal?

Oct 16, 2020 12:15 AM in response to chennessy1383

sweetheart I wish I could help you. I wish someone would help you. Then I could get help also. No one. NO ONE will step up to the plate and offer any type of assistance. It’s like no one wants to let the cat out of the bag. Bad part is I kNow who my attacker is. She’s been f’ing with me all day. Especially in maps. When your phone screams proceed to the root over and over while you sitting at a red light or that GD low battery warning pops up every time to try to text someone and you look up and learn you haven’t text **** cause you have to hit ok again. The list goes on and on. You open up your text app and you are in a text to someone you haven’t spoke to in years. Try to take required pictures of the equipment I repair and have to take at least 5 of each shot you want because camera won’t focus. When looking through the camera view “screen” it appears as though you are looking through a different camera that just happens to be pointed and what you are seeing. Instead of the keyboard learning repeated words and phrases it unlearns. You have to type the same **** constantly like your own email address, notes, etc. changing words that you normally type into **** may not even heard of causing you to take 3-5 times longer to compose an email or text.

making the font so small you can’t read it even though it’s set as big as it will get.

blurring the screen. Today Siri decided she will no longer look up anything for me until I turn my location. On.

no matter if it’s just a number of a contact that’s in my phone already. Funny thing is I didn’t turn it off. I use maps many times a day while working. Screen blacks out asleep just after you start typing forcing you to unlock again.


my iPhone 6 Plus with At&T says I’m not connected to the internet every time I try to log into my account.

6 phones and 2 tablets are not turned into USB cameras streaming video and to my raspberry pi where it uploads it to god knows where but it uses one or more of my devices as a modem to dial out with since I don’t have internet. Actually found the modem commands for At&T the other day embedded somewhere in my pi. I have root access and there lots more exposure to the file system than with an iPhone or android.

this is nothing new or a recent discovery. She’s been doing this to me since I got my first iPhone 12 years ago. I’ll include a few pics of the pi kernel and some of my old windows 7 or xp that she first started this nonsense on.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Aggregated disk writes

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.