UIKit RunLoop in Google Voice ananlytics

Hello. I am wrapping up a three year long cyberstalking and cyberattack against me to forward to law enforcement soon. I am working with a domestic violence advocate that has reviewed and agreed I am indeed a target of said issues. She is willing to help me provide my evidence to my local DA's office for review of criminal charges against my estranged abusive husband. I have some critical questions I can't find answers too and could use the assistance of finding out if specific information is valid or not in my case. First I need to stress I do not allow analytics other than critical crash reports. I also toggle off that feature in ALL my apps and accounts. #1- Is it normal to find UIKit RunLoop for Google Voice in my ios analytics? #2- For three years I have documented 95% of all my analytics are shared with a first party app dev, handle is the superuser symbol of "0". I cannot confirm with Apple. I have attempted to have them assist and last time I was told, "Your story sounds fantastical" and was hung up on. Odd that she would react that way without even remote viewing what I was concerned over. But alas, it is in all my analytics for anyone to see for themselves and it concerns me deeply that an app dev going by "0" is being forwarded just about everything that I don't think should even be available as these reports are not critical crash reports, they are wakeups, backboard, activity and seemingly nefarious in my opinion. Please help so I know if I should include my analytics in my research I will be giving to the district attorney's office. I'd like to avoid embarrassing myself submitting paranoia and not fact. I've attached screenshots of my potential issue.

Thank you


iPhone SE, iOS 15

Posted on Oct 30, 2022 10:52 AM

Reply

Similar questions

10 replies

Oct 30, 2022 4:20 PM in response to CyberTarget

CyberTarget Said:

"UIKit RunLoop in Google Voice ananlytics: [...]I have some critical questions I can't find answers too and could use the assistance of finding out if specific information is valid or not in my case. First I need to stress I do not allow analytics other than critical crash reports.[...]"

-------


Secure your Info:

Being concerned for device access, (A)verify your devices, and then (B)secure your account. Open a new eMail address and use that for your Apple ID.


A. Verify your Devices:

Verify that all devices are logged in to your account, by using this link: Check your Apple ID Device List to See where you're Signed in - Apple Support


then...


B. Modify your Credentials:

Having personal info been stollen, someone lily has your credentials. So, by all means, modifying them.

Oct 30, 2022 12:52 PM in response to CyberTarget

Given clear concerns around security, it’s odd that this device is seemingly running an older version; on 15.6.1. If that’s the case, I do wonder what else has been missed with security and passwords and related. This when iOS 16.1 is available, and with improved features targeting security area, for instance.


As for your question… best discuss this with whomever is providing forensics advice.


I don’t see any issues here. Other than what seems to be down-revision iOS, and such.


Pragmatically, analytics are typically of little value to search. Not without specific targets to search for, and a whole lot of work looking for evidence or issues given the ongoing flows of data and thus whole lot of work. There are no controls for turning off analytics, past (not) sharing those and which are undoubtedly already disabled on an iPhone that has undergone forensics investigation and been reset to factory. Analytics are intended for Apple and for third-party app developers, and processing tends to be automated—the contents aren’t intended to be all that readable by people, and messages can be cryptic, and ominous wording for entirely benign conditions is routine.


But again, that this still seems to be at iOS 15.6.1? If you do not consider the device to be secure, erase it and re-load current iOS (16.1), and follow the Apple recommended procedures for securing your environment (see link below), not the least of which is the much-hated global password change, enabling two-factor, identifying trusted devices and trusted telephone numbers, and verifying location sharing, etc.


This advice shifts if the purported culprit is a multimillionaire and with a willingness to spend immense amounts on this iPhone and not on vastly easier and unfortunately more effective means to cause trouble such as keyloggers and O.MG cables firewall settings shenanigans, and other such. Various culprits do routinely make claims in this regard, of course; claims that amount to gaslighting. iPhone exploits to the degree you’re considering here are expensive, and correspondingly rare outside of very specific targeting by very well funded adversaries.


What to do next? Start here, if not already reviewed: Personal Safety User Guide - Apple Support


Oct 30, 2022 4:07 PM in response to CyberTarget

If you have proof, that would best be presented to your victims’ rights and/or legal representation, or to police.


Given your stated experience with security, you know well that running old versions is unwise. Given the older iOS versions in use, the remainder of the security here is suspect. At best.


Resolution of purported civil or criminal matters and/or whatever else is happening won’t happen here.


Fix your security. Work with legal representation. Forensics as needed. Collect and present your proof where it matters.


PS: The reason you can’t connect to iCloud, BTW, is almost certainly that VPN. Remove it, and try iCloud again.

Oct 30, 2022 3:49 PM in response to MrHoffman

Thank you for your response. I don’t get many. I want to say I can also prove at least 2 people involved that know my husband and they absolutely have the ability and means. In particular is my former employer where I was the bookkeeper where all of this began. He spent 22 years in the army and was trained at the Aberdeen Proving Ground for international cyber security and warfare. I have that documented. I’ve had images merged into my phone that don’t belong to me. Someone left metadata and I looked up the geo coordinates on one and got an address. The resident at that address is PG&E’s head IT security expert. That person has ties to my old employer. Another a founding member of hurricane electric. maybe that qualifies the level of insanity I suffer. I’m attaching a couple more things to validate myself here. I receive copies of texts between people I don’t know. I have a ton of apps I did not download in the not on this device in account. Most are metadata recovery apps or apps used to access your location like car insurance apps that track you and you can get good driver discounts after so long. It isn’t an insurance company I’ve used. I get locked out of everything on occasion. I’ve even had a completely different ominously named Apple ID appear. Encryption keys embedded. I am very good about keeping my phone updated but it never works and reverts to what you see. When I sync phone to pc iTunes an account that isn’t mine comes up. But, the name of account is the nickname my ex calls our son. I realize that what I’m saying sounds completely unrealistic but I have all of this well documented. There’s even a record of a file belonging to vessel traffic services, a maritime geo location program our coast guard uses😕. I can’t seem to get anybody at Apple to review all of this. It’s maddening and now that I have a domestic abuse advocate helping me it’s of critical importance to validate what is going on for the courts. Even the FBI or local law enforcement refuse me. I don’t know what to do without any validation regarding this because it’s been going on for three years and counting and I can’t even have a bank account anymore and had thousands stolen. Bank reimbursed me but without any investigation as to who did it. Only that it was unauthorized. Please note that the super user symbol on several other places it should not be

Oct 30, 2022 4:15 PM in response to CyberTarget

CyberTarget Said:

"UIKit RunLoop in Google Voice ananlytics: Hello. I am wrapping up a three year long cyberstalking and cyberattack against me to forward to law enforcement soon.[...]"

-------


Thank you for the screenshot.


The SIM Card is Locked:

Contact the Carrier, requesting that they unlock it. They perform all of the services of configuring the SIM card. If it is locked, then you just cannot use it.

Screenshot of Top-Left Corner:


Oct 30, 2022 6:06 PM in response to MrHoffman

I will do that. I will contact my advocate tomorrow. I just attempted to update my phone back to the ios 16, which it did. But as I was going through the 16 set up it completely froze. I can't even turn it off with a hard reset. Wow. I'm no dummy. I have my own skills with devices and networking knowledge and experience. I worked a long time as a skip tracer for a lawyer and bondsman. I'm close to fifty and have been tinkering with computers since 1985 when I got a commodore 64 for my 10th birthday. So, I'm not ignorant. I gotta say, I've never ever seen or heard of anything like this outside of military or MIT/IBM MITRE ATTACK crap. This is even above what I can wrap my head around. I'm down to an unsupported Chromebook and a Moto 5G now. I'm not in a financial place right now for replacements and use the guest feature on the Chrome as often as possible for added security. Hey, you rock though for taking the time to even respond at all. Please send positive vibes that I can get some meaningful help soon. This can't continue as it's not only caused heavy damage in my life but everyday I feel vulnerable, watched, violated and insecure. I'm sure I come off crazy and paranoid but it's hard to not when this has been my life everyday for 3 straight years. I don't know how this will come to resolution but I need to put everything I have into ending it so I can move on and far far away. Take care and thanks again.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

UIKit RunLoop in Google Voice ananlytics

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.