blue tooth hacking

I have reason to believe that my blue tooth is being hacked both on my MacBook Pro and My iPhone 12 Pro Max. Has anyone encountered this issue and if so how did you know for sure and how did you erradicate the intruder. I believe it is happening from a Android user and that the person is completely monitoring my every move. I have found much literature and tutorials on line from Github and Android Communities including google, that all validate the symptoms I endure. Also the evidence I have procured from the suspected perpetrators own android and laptop coincide with the online information, that if this person was to do something like this to me, the means and tools they have on their devices in downloads and scripting history support this theory. As well as they may be also running a simulation of a iwatch operating system on the android, of which there is a app to help achieve this and it appears that this 'desktop monitoring' assistant from Samsung aids this process by connecting a android to any other OS via bluetooth. The narcissist that I am dealing with had me convinced for a very long time that I was losing my mind, and he couldn't do any such achievement. Today I know I have supported proof that this is real and it is happening to me. Can anyone help me to stop this?

MacBook Pro 13″, macOS 12.3

Posted on Apr 22, 2022 11:01 PM

Reply
Question marked as Top-ranking reply

Posted on Apr 24, 2022 7:51 AM

Bluetooth is relatively insecure. Switch to wired connections. If your suspected perpetrators are within Bluetooth range and if you’re still using Bluetooth (and, um, why?), there are also other and much more direct options for them to (potentially) cause problems.


If you don’t have robust and unique passwords including those passwords used on your password-reset paths including at your cellular provider, don’t already have two-factor authentication enabled, don’t have your Mac storage encrypted, current firmware and verified settings and a long and secure password on your Wi-Fi router, reviewed what all is connected to your local network, if your Mac might potentially have been locally compromised and hasn’t yet been reset and reloaded, checked for location-tracking devices, and other related steps…. then discussions of Bluetooth shenanigans are probably not your largest exposure. And shutting off Bluetooth makes that go away, save for any lingering problems.


If you are worth the effort involved here for your suspected perpetrators, you will want to obtain better and more tailored sources of information, too; suggestions and steps specifically tailored to your particular exposures and risks. And quite possibly also legal advice, whether from a victims’ rights advocacy, or direct legal representation, or otherwise.


For what Apple suggests: https://help.apple.com/pdf/personal-safety/en_US/personal-safety-user-guide.pdf


2 replies
Question marked as Top-ranking reply

Apr 24, 2022 7:51 AM in response to MRscorp69

Bluetooth is relatively insecure. Switch to wired connections. If your suspected perpetrators are within Bluetooth range and if you’re still using Bluetooth (and, um, why?), there are also other and much more direct options for them to (potentially) cause problems.


If you don’t have robust and unique passwords including those passwords used on your password-reset paths including at your cellular provider, don’t already have two-factor authentication enabled, don’t have your Mac storage encrypted, current firmware and verified settings and a long and secure password on your Wi-Fi router, reviewed what all is connected to your local network, if your Mac might potentially have been locally compromised and hasn’t yet been reset and reloaded, checked for location-tracking devices, and other related steps…. then discussions of Bluetooth shenanigans are probably not your largest exposure. And shutting off Bluetooth makes that go away, save for any lingering problems.


If you are worth the effort involved here for your suspected perpetrators, you will want to obtain better and more tailored sources of information, too; suggestions and steps specifically tailored to your particular exposures and risks. And quite possibly also legal advice, whether from a victims’ rights advocacy, or direct legal representation, or otherwise.


For what Apple suggests: https://help.apple.com/pdf/personal-safety/en_US/personal-safety-user-guide.pdf


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

blue tooth hacking

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.