You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

đź’ˇ Did you know?

⏺ If you can't accept iCloud Terms and Conditions... Learn more >

⏺ If you don't see your iCloud notes in the Notes app... Learn more >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

IOS SYSTEM LOGS | CONTAINER MANAGER

Hi All.


I was wondering if any one

could let me know what the below log is outlining what happened in the backend of my phone. I have googled Container Manager and it seems to be linked to Apple IDS and phones that are used for business / school purposes.


it seems to be from the APP which I don’t have on my phone, a remote user logged in and done whatever those logs are outling - I also looked at user 501 and it seems to be a remote log in from what I understood.


Any help would be appreciated.


Thanks,


J.

iPhone 13, iOS 17

Posted on Nov 11, 2023 10:55 PM

Reply
Question marked as Top-ranking reply

Posted on Nov 12, 2023 8:10 AM

Apple doesn't provide customized iOS distributions to schools and institutions and carriers. It's the same iOS distribution, with certain features potentially disabled or enabled from Apple servers, or from locally-installed profiles used by schools and institutions and a few individuals, or from carrier-provided profiles. o


u'll routinely see chatter for features you don't have enabled.


You'll also see myriad ominously- and scarily-worded and utterly benign messages in the logs, too. Log chatter is undocumented, and subject to change, too.


I've yet to see any of these screen shot postings show anything.


Logs and log chatter comprise infinite haystacks, with unknown numbers and quite commonly no needles to be found, and no certainty what the needles will even look like.


Interested in the internals? Get the three volumes of the new OS X Book, and have a look. The volumes of that book covers macOS, iOS, and iPadOS.


Interested in your own security and privacy? Personal Safety User Guide - Apple Support (there's a PDF there, too.)


PS: iOS and iPadOS are not completely immune to problems; there can be and have been exploits. All available evidence indicates the exploits are exceedingly expensive—full-stack exploits are worth a million or variously more USD$—and their usage very much targeted. If you're a person of interest to somebody exceedingly rich—political dissident, senior in politics or some large organization, with access to sensitive or classified or national defense data, investigative journalist, or with access to great wealth yourself, or similar, these risk calculations shift. For most reading here, the risk of encountering these exploit tools is very low.

2 replies
Question marked as Top-ranking reply

Nov 12, 2023 8:10 AM in response to _JhnDe_

Apple doesn't provide customized iOS distributions to schools and institutions and carriers. It's the same iOS distribution, with certain features potentially disabled or enabled from Apple servers, or from locally-installed profiles used by schools and institutions and a few individuals, or from carrier-provided profiles. o


u'll routinely see chatter for features you don't have enabled.


You'll also see myriad ominously- and scarily-worded and utterly benign messages in the logs, too. Log chatter is undocumented, and subject to change, too.


I've yet to see any of these screen shot postings show anything.


Logs and log chatter comprise infinite haystacks, with unknown numbers and quite commonly no needles to be found, and no certainty what the needles will even look like.


Interested in the internals? Get the three volumes of the new OS X Book, and have a look. The volumes of that book covers macOS, iOS, and iPadOS.


Interested in your own security and privacy? Personal Safety User Guide - Apple Support (there's a PDF there, too.)


PS: iOS and iPadOS are not completely immune to problems; there can be and have been exploits. All available evidence indicates the exploits are exceedingly expensive—full-stack exploits are worth a million or variously more USD$—and their usage very much targeted. If you're a person of interest to somebody exceedingly rich—political dissident, senior in politics or some large organization, with access to sensitive or classified or national defense data, investigative journalist, or with access to great wealth yourself, or similar, these risk calculations shift. For most reading here, the risk of encountering these exploit tools is very low.

Nov 12, 2023 4:51 AM in response to _JhnDe_

_JhnDe_ wrote:

I was wondering if any one could let me know what the below log is outlining what happened in the backend of my phone.

Nope.


It's not that we don't know or can't tell you. It's that we won't bother. No one who has ever posted one of these messages has ever accepted the truth - not even once.

I have googled

There's your problem right there. Nothing you find on the internet is true. No matter what crazy conspiracy theory the Internet has led you to believe, if you Google it, you will find confirmation. That's because none of it is true.

it seems to be from the APP which I don’t have on my phone, a remote user logged in and done whatever those logs are outling - I also looked at user 501 and it seems to be a remote log in from what I understood.

Nope. Nope. Nope. And Nope.

Any help would be appreciated.

Again, nope. I've seen so many of these posts. They are all identical. The only "help" that would be appreciated is confirmation of whatever hacker is harassing you across 9 different devices for 11 years.


If I tell you the boring, harmless truth, you'll turn into a stalker who will harass me across all my devices for the next 11 years. And no, I'm not joking or being satirical on this point.

IOS SYSTEM LOGS | CONTAINER MANAGER

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.