Renewma1 wrote:
My goal is to verify a gut feeling I’ve had for a long time. I believe he had used a hak5 malicious cable previously to harass me, but could never prove it.
I guess I’m desperate for some validation and answers.
Again, what have you done to better secure your environment?
Any “gut feeling” and the possibility of O.MG cable involvement aside, if you don’t have—for instance—two-factor authentication enabled… there are areas of your security which can be hardened against exploits, spearphishing, and such.
If you suspect compromise, perform a factory reset, don’t restore your potentially-compromised backups, and make efforts to better lock down your environment including password changes including passw-rd-reset path passwords, enabling two-factor, verifying that all trusted devices are recognized, verifying trusted numbers are recognized, reviewing all that is connected to your newly-re-passworded Wi-Fi network is as expected, among other steps.
Exploits persistent past a factory reset are very rare.
Or, sure, you can look for an unknown number of unknown needles in an unknown number of unknown haystacks, or as we more commonly call that effort, “reading analytics logs”. Search which may or may not find compromises. Best to address the easier paths to causing persistent issues—easier paths to compromise or re-compromise—first. Before wading into the infinite haystacks.
Start here: https://help.apple.com/pdf/personal-safety/en_US/personal-safety-user-guide.pdf