You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

MDM on personal iPhone - Businesses, unauthorized developer activity HELP!

I am a personal 'User' I have cycled through many hours and days with support. No one knows what is going on. Most likely because I am never able to speak with someone that understands the Enterprise platform. I feel this is happening via my carrier- but Fraud sent me to Tech support. Tech support told me my phone is hacked and to file a police report.

In combination I suspect that MDM is a gateway for an external developer to access my phone via various methods: webkit, Xcode, Apple Store Connect, SDK

I am about 99.99% sure I know why, but that is something that I will not disclose because most likely all of my activity is monitored; despite the very strict privacy settings I try to maintain.


Symptoms:

  1. My apps will sometimes tell me they did not come from the App Store (Maps, FindMyiPhone, etc..)
  2. When I make an attempt to chat with Apple support I receive a message to Use Messages to Connect with Business. When I have my iPhone in LOCKDOWN mode I receive a message that I cannot use Messages for Business when my device is locked down.
  3. I only have one device. However, I am sharing across devices- many times or I have the option to. The choice is not grayed out.
  4. I am unable to perform an Emergency Reset because I am usually sharing something - Notes, Home, Health, Books....
  5. I do not use iCloud Drive due to multiple security concerns. Almost every time that I double check those settings apps show that they are using iCloud Drive. (Game Center, Health or Fitness, Notes, Books, Apple Support, Wallet) While clicking to turn OFF syncing I have had a battle with it changing right back before my eyes. (I have screen recordings)
  6. Game Center will come on even though I have strict Screen Time settings.
  7. I am generally either sharing, or my phone is gathering data from Health; even though that privacy option is supposed to keep that from happening.
  8. Sometimes I am unable to even sign out of my phone due to 'restrictions'.
  9. I have 'Share with Family' sometimes

*Those are only a few symptoms. That is minus the horror I see from the extraction of information I backed up into Kali Linux

As I have mentioned I have spent many many many hours with Support. One Senior Director did spend time Googling the services that show up in my Analytics. I have even uploaded screen shots and documents, but I never heard back.

I REALLY REALLY need help here.

I will add attachments. They won't be nearly the amount I have. I am begging!!!



iPhone 13, iOS 16

Posted on Apr 2, 2023 2:32 PM

Reply
Question marked as Top-ranking reply

Posted on Apr 3, 2023 6:45 AM

Sadly, there doesn't seem to be any help and the ones that will respond, will tell you you are either crazy or you can't be hacked unless you have your device to someone.


For what it is worth I have been dealing with this and here is what I have learned; you need to delete your old apple id's and confirm that they are deleted. You may not be logged in to any (neither was I) but it has something programmed into the IOKIT boot so you cannot reset the NVRAM properly, leaving find my process to look as if the activation lock is on.


Make appointments for each apple product to have a firmware/software update through DFU mode and make sure it is DFU because a factory restore will not remove the cache that is lingering in the files. This should all be done at the same time otherwise it will talk to the other device and reestablish itself.


The factor reset you are doing doesn't work because it does not empty the trash and it seemingly blocks any terminal command to do so as well.


Before you boot up your computer(s) & phone(s) delete and confirm you have deleted all of your previous apple id's. Write down the code it provided to delete the id because chances are you will have to call to

confirm its deletion.


If you have a google ID, check to see if you are enrolled in any trial based workspace or fire base programs. Workspace allows device control as well.


I have changed our TV's and printers but it still seems to latch on to any printer so now we do not print. Debilitating to say the least.


I believe that there are enough of us out there to confirm that this problem exists but apple will not respond until they have fixed it. I know it sucks. Two factor everything and I wouldn't suggest any external usb or thunderbolt security keys.


I also would not suggest any products other than apple. That will only make your situation worse.. even the keyboards because it will load a generic driver onto your device. Only use apple wires as well. I am definitely not an apple advocate, only sharing what I have come to accept and learn.


You may have to go line by line in settings on your iPhone to turn off everything that you do not use and if there is an arrow on it, click to make sure there is not an opportunity to bypass your defaults. The Mac computer is the same and there are probably about 100 Plists that will try to alter your default settings so do not take anything for granted until you have clicked through it all. Plists are just preference and apple will tell you that it does not mean that they are being used. That is absolutely correct but the Plists I have seen start with NVRAM and a fmm (find my

mac activation) which is huge problem.


for whatever reason it uses nfc and mdm BUT mdm does get removed later on during the process. It keeps respawning. So it isn't necessarily MDM as much as it is trying to be so I presume that there is some detail in the MDM program that helps it get what it needs.


The shared cache you are seeing is at best guess, all of the info it has collected on you and will keep looping together. This is just a guess but I have been watching it on mine as well. I could 100 percent be wrong but I believe the cache is what keeps this process communicating between devices.


There are enough of us out there with this problem. I am sure that we have a common thread but I have no idea what it could be. I just know that no one is going to help me or my family and I am just going to have to do my best to keep my kids safe.


I could bring a new computer into this house and within ten minutes watch it try to harvest my old apple ids, while Bluetooth sniffing and try to connect to something nonstop. Eventually, it gets back in and the new id becomes corrupt, I delete it and start again hoping the last apple update resolved this issue. Two years later and I am headed back to the Apple Store today to pick up a couple of devices.


I wish someone had better news for the both of us but this is the best advice I can give you.

Similar questions

160 replies

Jun 3, 2023 7:48 PM in response to Livingmare

What does the Cisco VPN tell/provide? I was in Security for decades until 25 surgeries took me out, but we had nothing like this. Look under shortcuts and check out you JavaScripts as well, I had 87. My email

on my devices is redirected to a fake site, but if I go to a different computer not near my home I can see real data that included auto deletion of email. All accounts compromised, Fraud, cyber stalking, equipment destruction, cancellation of need grocery delivery, froze all accounts. Many fraudulent apps downloaded and hidden, but if you go to the Apple site, they will let you see hidden apps for a few months back. It accessed my unplugged router/firewall! Using SSH, port 22, something like WRT? And it says root and password (hidden). They hacked my home alarm with a stolen device then came in my home per alarm report, and location services are in and won’t allow cutting them off. I’ve tried a few VPNs, but they get bricked. I also noticed my internal IP addresses show up as external addresses? Except when running JavaScript, which I know very little in this area. It’s all over the device, in the browser, likely turning off options (if not MDM), or maybe you need a Mac to see it? You must have a Mac to install and control other devices. And they say a FQDN and business email. So if you bought a Mac, and provided a domain, could we replace the MDM? BTW, when I went offsite to view real email, the pages I was viewing were copied to my phone? This stuff is so different, and I’m so slow these days. Last surgery for cancer, doc said there was a 50% chance of return in 3 years, everyone knows stress causes cancer. It’s been 1.5 years, and for a long time I was extremely stressed, until I realized this hateful person was intentionally out to hurt me. It’s not easier knowing that, but it’s obvious. I have no data, pictures, contacts, social network to keep in touch with ppl out of country. Yet multiple cloud services are added. I never kept data in the cloud before this started, now it’s all over. I read on one page that 90-95% of people that do this cyber stalking are extremely mentally ill. Why else would someone do this? If I come up with something, I’ll let you know. I know what does not work, reformatting, new accounts, new devices, different devices like Windows or android, upgraded firewall, Antivirus or even a VPN. Or, and begging, calling Apple. They know (some of them) much more than they are allowed to say. I don’t know how many ppl have the same issue, but they are huge. I guess they don’t care about a few terrorized people. They make so much money, they can afford to do without many customers vs the effort required to research and fix things. Maybe the DOJ will help with the antitrust issues with MDM.

Jun 25, 2023 8:51 PM in response to T3ddy19

Thanks for all the information. I've been calling apple

support for more than 40 days now.

i "repaired" everything to be able

and work, brought all my family's devices back and took 10 minutes

to start the nightmare again. Apple says I'm a paranoid, but losing my job, plus stolen money, is no joke.

Jun 30, 2023 10:06 AM in response to Community User

To Pia, I received info in my inbox sent by you, but attempting to use the link to your post was blocked, it included the wording “can lshow you a screen shot where the Mac “. I’d read that you must have a Mac to install this, I have no MAC. But I’ve received attacks and such from a MAC, web iCloud access with a Mac and more. I’ve lost a lot of $ due to equipment destruction, hiring ppl, software and much more, a lot of fraud, including Apple apps that were purchased then hidden. I also read that purchases only show on the device used to purchase, but sometimes I see these purchases, and some are free. When I searched on your name, only the above post showed up. I should mention the app is hidden. At one point, I decided to download the App, it was the only app I’ve seen to date that included a hide or hidden button on the shortcut. When I downloaded, it said I had to contact the administrator [of the Apple Configurator or MDM] to view anything. I have the usual symptoms of MDM plus many more at this point, lots of JavaScript on websites, 87 JS under shortcuts in one day. Getting new everything has not helped. I completely disconnected my Internet weeks ago, but they are using a rogue Wi-Fi router. I’ve found 3 other routers, but not this one. It turns on Bluetooth then the router, all devices have been compromised. Resetting network made no difference. Turning off settings, no difference as they get turned back on. Only my iPhones have connectivity. A lot of data transfers in the background, and my devices had data offloaded to a cloud service, about 9 were installed. Simple settings, like only use the current number for messages does not work, they are broadcast across devices. Also, I recently found out that ppl were coming in my home when I’m not here. Ok, I don’t recall the last time I went to iTunes, I used to avoid all apps on phones, at least no third party apps. The other thing, the beta site, I’ll have to try to find that. But there is no MDM under VPN settings, there is a link to work or school but the Apple ID does not work there. Must you have a Mac to view this information? It’s been a long time since I’ve used one. And I don’t recall, but it seems like you can’t search MDM on IOS, found many entries on Windows PCs, 1,000+. Then strangely enough, if I start out with a new PC or reformatted device, settings are changed within 3 minutes, permissions, accounts deleted, restricted to C drive, restricted on everything I look at! All with no Wi-Fi network (except the rogue). Same thing happens in router/firewall. When I reset, or buy another they jump in, change admin password and throw me out. This app is one of many that were installed and hidden, like 2 remote access apps, a screen recorder (which I can view but without any controls), it even created and mailed a link of the recording to me and company (someone else?).


I”m certain I’ll have to get rid of all equipment again, but the MDM scans for all devices, phones, PCs, iPads, IoT, everything.


ok, did your actions get rid of this? Must I get a MAC computer? There have been many attacks on Apple lately, one called VastFlux and it used JavaScript, 11 million phones! Plus, 1,700 apps on the App Store were infected, even viewing the ad for these apps caused infection, dubbed the largest attack in history. More on Human Security, point is, I think the flood gate is open. Antivirus has been no help on the iPhones.


I have to remove the MDM, I even asked if I could install it on a new set of devices, but was told “NO” because I’m not a company! This is not a third party app, it indicates it was developed by Apple.


so, would getting a MAC work or help? Are the MAC devices able to be protected with AV? Can you see installed files? I’m seeing something new now, attempts to install a “WebKit” which some sites indicate has been compromised, but this activity is not very visible. Could I use an iPad to view anything? We have public places where you can go and use computers, but no MACs, and you can’t install anything. I’m going to look for the beta site. Thanks so much for your info. This has been going on for 2 years now.



Jul 4, 2023 4:06 AM in response to AgentDragonfly

Been experiencing the same since Jan 2023. But it’s from a private source, not business. I’m pretty sure I know who it is. It’s crazy to see so many replies of others dealing w this too. It’s such an invasion of privacy! My hacker started out using the Home app and bluetooth devices to listen and record my conversations, control center to enable assistive touch and control my device, wiped out my entire photo library and all of my contacts, changed my settings. Then as they got sharper they migrated to coding and scripts using GitHub, Xcode, and all Developer Forums on all platforms now that they put them out for anyone to join. I’ve learned A LOT about technology and apps trying to stop this source from accessing my iPhone. They are also proficient on both Apple and Android so getting a new phone did nothing. This is the 5th one I’ve had and I gave up. It’s still accessible no matter what. And it’s not detectable because it’s being accessed from the inside (codes). I also see the scripts on my analytic reports. I’ve started to educate myself on coding now because I’m determined to figure this out and no one else seems to know that any of this is possible. When I’ve reached out for help, ppl think I’m crazy and paranoid. Little do they know it’s very real and absolutely possible these days. Good luck! I’ll let you know if I come across any solution or help w this problem.


Some observations: In Settings, Accessibility…go through all of those options for voice access, touch, etc. I’m sure you will see certain options turned on. In Settings/Safari at the bottom there’s a setting for Advanced, make sure Web Inspector and Remote Automation are turned off. Click on Experimental Features and turn them all off. Everything that is accessed by a “developer” has an “Advanced” setting or option. My source has even joined Meta Developers and coded their FB. I’m setting up shortcuts to alert me when a Bluetooth tries to connect or they auto join me on a compromised/strange Wi-Fi connection. That’s some of what I’ve figured out so far.

Jul 11, 2023 2:01 PM in response to gravityfed

Yes, I do have a hidden hotspot! I found 3 or 4 with very active Wi-Fi signal, one an older hotspot reactivate, another older version of a smart light bulb, it almost looked home made, not like the ones I’ve seen today that are flat and round on the inside of a bulb. And my doorbell was converted to a Wi-Fi hotspot (it does not require Wi-Fi to work!


Most of the “tools” used have been either native apps, like accessibility apps and a switch that permits 2 way communications (it can both make calls and receive PINS or authentication codes using my number!). Imagine what that does for banking and such!


Many “hidden” apps have been downloaded. Most say for Corps or companies only, completely hidden MDM that does not show under VPN, 2 banking apps, 2 email manipulation/deletion apps ( they are for organizing email) but used to delete info on password resets or security vender info, one app includes a screen recorder and it grabs text from whatever you look at. It shows symbols when it’s used, a random eyeball, and another symbol that looks like a screen or window with bars. If you click on it, text is selected. I logged into that app, but had no options, it created a 45 minute screen recording, then sent an email to me and the vender (who knows who else).


Fake emails created from shortcuts/scripts, also, it uses SSH remote access. Most of the actual coding is stored in the cloud, so you can’t see the full script, JavaScript. Turning it off makes no difference. Also, I went to another computer and found my email was going to another fake site, the name was the same, but it removed a lot of activity that was going on, hidden email, auto deletion of mail, no ability to view source of emails.


Most web sites are redirected the same way as email, yesterday, it was my banking site!


Before, you could not ssh on Apple, but now “there’s an app for that”.


One thing that is required for the MDM is “web clips”. According to Apple, you go through web clips for internet, not safari! You can’t uninstall it. When I attempted to download the MDM on a device, it said “contact your administrator, you don’t have permissions”. And it was the only app I’ve ever seen that came with a “hide” button on download.


The MDM uses the serial number, which is also the Wi-Fi address, so no matter what you do, they can find you. It also scans your network for any new devices of any kind.


Bluetooth is also used in many instances (idk if MDM related or not), but Bluetooth can connect to 8 devices at once. So anything especially IoT can (and did) get compromised. Alarm system, streaming video devices, certain TV sets, headsets, some remote controls, almost all TV sound bars. I’ve read these must be isolated in the guest network. Any device in your network is trusted by default, leaving you wide open.


reformatting, new devices, renaming, changing user name, all does nothing. It also “broadcasts” leaving you open to more hackers! And Android can get bricked immediately. I’m thinking the hackers must have compromised the MDM, I know it’s supposed to show up. But, they had a huge attack with 13 million devices compromised around 2015, that came from using or looking at apps in the Apple Store, and JavaScript.


I keep hoping it will stop. In my case, it’s a local person, as they came into my home after compromising my well known alarm system. And, there is so much more.


Mine seemed to happen after I had an extended hospital stay.


I’ve learned you can’t get rid of it. I’ve bought new devices that are compromised before I get them out of the box!

Jul 24, 2023 12:57 PM in response to AgentDragonfly

Skywalker is a key logger! I think that was mentioned in the Hinchy document I mentioned. Info can be found at Sophos (spelling?) as well.


Not surprised, I had a key logger added as well. You should search each item. Although we know the main issue is the MDM which allows remote install of anything, including fake maps! I just saw your services listed. Is your MDM hidden? When it was downloaded, it was the only icon I’d ever seen that included a “hide option”! More of these services look very familiar, as in MDM or Malware. Is “Passcode Settings Provider” something you installed?

Jul 24, 2023 3:17 PM in response to IdrisSeabright

It does not remove it from your iphone. A subpoena tells you who/what/when/where. Based on state, you might be able to get a subpoena from the sheriffs dept, or DIY, I don’t recall saying court? It’s not taking someone to court. You could get a restraining order (and request removal). The details would show who installed it.


I was also not aware Siri could do such things, I tried it myself with no results, but the search showed in history? And, Siri does provide web searches, since it was done, yes it can if you have the skill. But I’m not interested in Siri.


But the MDM and compromise has also done many things previously thought impossible.


I’ve already been told considerable information. I’ve not researched Siri or how it conducts web searches, but have received web sites when I tried it. But I’m really not interested in learning how to do web searches using Siri, I’m trying to remove the MDM.


what helpful info have you provided on how to remove the MDM? I thought you requested help, as others have.

Jul 24, 2023 3:54 PM in response to Community User

I found a managed hotspot that is somewhat hidden, now, it is nearly always on. It connects to other devices using Bluetooth. I can’t delete it. It resolves to Apple (the IP changes). I searched MDM and hotspot on Apple, and it’s an option. I’ve unplugged my network completely, but devices kept communicating, and they still are even though not used in months.

Jul 25, 2023 2:41 PM in response to AgentDragonfly

Questions:

I understand the monitored issue as everything I do is monitored as well. I disconnected my Wi-Fi and an unauthorized “managed” hotspot was added that resolves to Apple, a feature of the MDM. But, I don’t know if you can say, but why would you think this is a developer? The ability to use all the programming methods you mentioned can be downloaded from the App Store! I was surprised to see ssh commands used to hack network when I still had one. In many instances based on reading comments and research it is likely someone you know who has had access to your device, physically in hand, and they know the PIN. Once it’s installed on one device, it can remotely monitor new devices of any type. I found the list somewhere, but it seems to randomly appear. Is there anyone that had access to your device?


Second question, did you get the info on apps listed by making a copy of the device? Or is that something directly from your phone? I’m just curious.


After everything I’ve read and tried, unless Apple will remove (and they won’t) or the installer removes it, I’ve yet to see anything that works. A factory reset does not work. One device was reformatted so many times that it no longer came on. I’ve lost $30k between replacing all equipment, paid “experts”, mitigation and detection techniques, monitoring for fraud, unauthorized software purchases and much more. It did not occur to me that it was an MDM until I found out that purchases could be hidden! Several downloads were “free”. Check your “hidden” purchases asap! They only show history for a few months.


I also changed my Apple ID, no activity for several days, then it started all over. Then they use Family Sharing to spread the other apps around.

My Windows PCs all destroyed, and like other posts, it happens within 3-5 minutes, permissions changed, accounts changed or deleted, ability to view event manager removed and so on. Same on brand new devices, I have no Wi-Fi except the “managed hotspot” that can’t be deleted. When it connects, I can view more data, like I normal web page. And likely the scanning list.


I likely mentioned it, but when I was in the hospital an older iPad mini went “missing” another iPad went missing this month. I’ve found the location of both devices. I did not realize how dangerous it was to save passwords, all unencrypted. Now I can’t say that the person that has my devices is the person who installed the MDM without more data, as the subpoena would required to determine The Who that is doing this. I’m disabled from multiple surgeries, now, no TV or Internet to order necessary items. My grocery delivery service was cancelled, and much more. But I’ve seen no evidence of it stopping. This “hope” and the fact that I cared for the person who I suspected. I’m no longer employed due to ongoing hospitalizations. One person mentioned that if $ was involved, Apple would help, NO. It seems as if Apple would have compassion for such an issue, but they don’t.


One thing they said was that “they don’t help with third party apps, but this is an Apple product per the App Store.


And I’ve had and enjoyed my Apple devices since the iPods and the 1st Apple iPad!


I’m not sure if you remove everything (although I’ve tried) if that would help? And I’m not certain what “everything” includes? TV? Printer? Router? The firewall/routers get compromised as soon as I reformat and I’m setting them up offline. I guess that’s the “hotspot”. I can’t even use a Windows PC that is completely offline (or I think it’s offline). They connect with the hotspot, then use Bluetooth to traverse the network. Bluetooth can connect to 8 devices at a time.


Ive also been cyber stalked. Location is turned on, and if I leave my home, people break in the house, even after a lock change. I’ve seen this as well (offline recording devices). It’s been a challenge, especially when trying to recover from multiple surgeries!


I had an MDM once before, in IT, some ppl tend to want to spy on others. But once I found the company name in the Windows file system and called them, they removed it while I was on the phone. A reformat, and no more issues (about 10 years ago). So it is possible to remove it!


I tried writing to the security department, most emails never went through, but this one did. They responded it was not a security issue. The DOJ and FBI disagrees and they are trying to stop it. Thus the importance of submitting a report to IC3. The MDM will likely prevent you from submitting, so you can use a public PC or write by hand. But this product should not be available to the general public!


Ive rambled on too much and had to delete info, so parts may appear broken. Like you, I know they are watching. I also saw a Siri search on my posts (despite what another person said).

Jul 26, 2023 2:04 PM in response to AgentDragonfly

Second attempt to post. I’d found Termius as another app that was downloaded and hidden. It’s on the App Store, more details on the actual site. A most interesting IT network tool. It’s obviously for IT, and works on anything. I gather since you have a Linux box that you know IT fairly well. Another user pointed out something I said. To clarify, the subpoena will not remove the app, but it should let you know who is connecting. Then you could ask them to stop or get a restraining order to stop. BTW, I have about 30 years of Information Security experience, certified and so on. Corporate systems helped identify things like this and as a Corporate Info Sec Manager, with a dotted reporting line to legal it’s much easier to get help.

Aug 3, 2023 3:17 PM in response to GSS_544

I’ve seen much of the same activity. I had 87 scripts listed under “shortcuts” using JavaScript. There is an app in the store that enables or provides these various coding methods (not the library). That was downloaded and hidden on my device. Same here with “options” cut off, no web tool bar, no email headers…unless you go to a public computer, then you can see much otherwise hidden info, in my case, for email and other accounts.


Be careful if you look at scripts not to execute, a simple single word may be associated with dangerous code that is apparently stored in the cloud, not iCloud, but other installed cloud services. Mine has a “managed hotspot” that resolves to Apple. According to MDM documentation, you have the option of getting a managed hotspot with the MDM. It uses this Wi-Fi connection, then can connect up to 8 devices with Bluetooth provided they are within range. And, it or other hidden downloaded apps are capable of impacting every operating system I’ve seen, Windows (an MDM wildcard search will show MDM files. Keep in mind that MS Office uses it, but I’ve seen nothing that indicates this MDM is dangerous. I have an inexpensive Wi-Fi detector that will pick up the signal when it’s on, and it’s always on lately. It has been coming more into the “light” lately as a dangerous app if in the wrong hands. I was actually told who had 2 missing devices, and which accounts were installed on them!


it is likely the person you suspect, and it’s so easy to make a full copy of your device if someone shoulder surfs your PIN and has access to your device for a few minutes! This person wants me to know it’s them, based on some info that appears on my device, like their name! This past week I had two more apps installed (they showed under the App Store as purchased, then disappeared. You can search on Apple on how to see hidden purchases, but many don’t show up. Several are free, provided you agree to allow access to all data. My hacker even did a Siri Search to find my posts. Continued…

Aug 9, 2023 3:06 PM in response to -Hey-You13-

MDM is the starting point of the hack, it takes complete control of devices within the geofenced area, for me; downloads hidden apps and hides them, screen recorders, remote access, banking apps, spyware, and much more. replaces web sites with fake ones, collects data, often sent to another cloud service. Runs malicious JavaScripts and other programming tools under “shortcuts”, hides headers on web pages and hides email headers as it impersonates you email account,

Aug 29, 2023 7:55 AM in response to AgentDragonfly

Some of your particular symptoms here are different to mine but let me just say this.


I have had MDM’s deployed by apple

over all the devices I’ve purchase over the last 3 years that I know of.


Apple will NOT admit to you if this is the case. I even called JAMF, who provide MDM services For Apple. The guy said to me that maybe Apple “accidentally” took a device from the pile which have MDM deployed on them. I laugh because it’s every single device I buy and it’s inescapable.


As much as I love their products and fantastic service, as a company, they can’t be trusted. Their devices are backdoored to provide access

to the major US spy agencies and they have to. Apple execs would be prohibited from ever revealing this to the public or face criminal charges.


Perhaps you’re a person of interest

more so than others I’m not too sure but your MDM here is very obvious. Hopefully you can attempt to have it “removed” or at least the hard core restrictions.


I hate to break it to you but this is the way things are now due to Mass Surveillence. I don’t like it either but we simply don’t have a choice.

MDM on personal iPhone - Businesses, unauthorized developer activity HELP!

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.