I_see_green_elephants wrote:
lol. You wanna see analytic logs ? Encryption files? Email logs? Phone records? My home security footage? Router logs? iCloud login history? What would you like me to post here? Come see me or better yet I’ll come to you
All that tells me is that you have suspicions, or maybe have circumstantial evidence at best, have a wide range of alleged compromises across a variety of products, and have not identified anything conclusive.
And until you can wade through and distill all that—until you can provide better evidence of a breach—these discussions go nowhere.
Forum postings seeking free remote forensics help puts you in competition with everybody else with nothing past suspicions and the ability to post screenshots, and most of us already suspect our own gear might be compromised. Assemble your evidence. Build your case. That evidence might be based on canary trap, or might be a canary token, or might something else entirely. Otherwise, the same feedback you’ve been getting will likely continue: update, reset, re-secure, etc.