Fullstopping wrote:
well actually i think they are just using developer setting and apps and potentially created an app themselves with how helpful apple is to assist in creating very unhelpful apps that do this sort if thing. there ia coding, hex, ascii, beacons, contactless connections (udp/tcp), gestures, shortcuts etc and now i find just being on the same ip by placing me on a managed network that they manage will alow them to get into my apple ID with certain websites. i expected other developers would kniw how to do this considering thats what developers do is it not?
this is a rarher huge scale i agree but its so big no one will have all the answers and the only way out is to do it myself stage by stage.
if anyone has any idea how to stop ANY of this can you please reapond to this message.
it could be as easy as blocking ports 80 and 443 but im not able to. probably because im prohibited by them or just apple. these are the ports they are getting in on as my research on their activity clearly states.
thank you
What you claim to have happened here is analogous to or is actually espionage-grade tooling.
Clearly not Developer mode, as Developer Mode does not offer additional access past the ability to run locally-created and side-loaded apps, does not bypass the in-built sandboxing, and does not bypass security past loading locally-created apps directly, and does not involve TCP 80 nor TCP 443.
To get from Developer Mode access to what you claim is happening here involves physical access, and espionage-grade tooling. Way past “hex, ascii, beacons, contactless connections (udp/tcp), gestures, shortcuts etc”.
Again, what you are claiming here is an attack by tooling worth millions of dollars. Not by developer mode. Not with Bluetooth and related connectivity, and not with gestures or the rest.
No one here can assist with espionage-level attacks, or with the sort of personal risks review and security review and the rest of the processes requested here.
Again, if what you are reporting here is true, this is all well past what anyone in any forum can assist with. After sixteen months of reporting this, and undoubtedly with the same catalog of responses then undoubtedly offered in response, that much should be clear.