What are the ways in which people can legally remotely connect to an apple device and how is this accomplished.

I have come to believe that the persons that have taken control of my devices have permission. They have all my personal information and are notified in various ways when I get a new device. Some are accessed remotely during the set up process I know when the device is vulnerable. I’m sure there is not only one way they have been doing this hack. However, once they have entered , they are able to operate my devices with almost complete immunity. They can see everything I do and I can see nothing they do in my device. I can see settings that have been changed and applications that they download usually,however, I have no way of knowing how they do this. They definitely have more privileges than I on my devices. How can this happen? There are many other events occurring that I know nothing about on my devices that they initiate. I am not able to understand device logs which could explain a lot of what is happening with my devices, nor can I get anyone to explain them to me. The causes of these intrusions I can only speculate. Logic tells me that what ever it is that they do, it is something that is allowed by the operating system and that they have permission to do these things. I know that devices can be managed by a company. All the things that I see happening a company can do lawfully with the devices it manages. I think somehow they are using my information and assigning my devices to their fake company. After that everything else falls in place. It would explain a lot of what is going on. I also think that they have added my profile to a mass gaming application that allows many people to see where I am at all times if I have my device with me. I am followed . This is not speculation. The question is of course why am I being followed, for this conversation I am more concerned about how did they get the permission to track my device. There are more activities and events that I could write about but thenI would start sounding like a paranoid schizophrenic, so I will not trouble you with any more details. I am very unfamiliar with apple devices. They say they are more secure than any other device. For me this has not been the case. They are able to access remotely my devices just as easy as when I used Android devices. This leads me to believe that they rouge developers who have contracted with Apple and other companies to make application or something of that nature. These companies then give them the privilege escalation needed to take over my devices. Again speculation, but I have real reasons to think this might be the case. That is why I ask: what are the legal whys in which a device could be accessed remotely, I’m using an apple product so I do not need to say that I concern about apple policies and device settings. My lack of knowledge about this product , I believe , has allowed these persons to use Apple services and device mechanism against me.

Posted on Aug 5, 2024 5:05 AM

Reply

Similar questions

13 replies

Aug 6, 2024 6:46 AM in response to TheLeader707

TheLeader707 wrote:

What if your device is managed? Those settings would not be able to sever those ties to the entity that manages the device. That would not be good for those managers and employees would run off with their devices. How are those devices configured.

I thought the goal was to see if your device is being managed. That will show you if it is being managed. You are correct that if your device is being remotely managed that you will have a profile on your device that may not be able to be removed with Safety Check, but if it does not have the profile installed in the first place, then you have nothing to worry about and your device is not being remotely managed.


Apple allows a device to be remotely managed by an employer or school installing this profile. It is not hidden from you. There is no secret way to manage your device without you knowing about it. I think you will find that after running Safety Check, that your device is not being remotely managed.


With that said, of course your accounts can be compromised if someone knows your Password. Changing your Password will solve this problem. No one will be able to request your password to start using it, the only option is to reset it, which would lock you out of your account since you would not know what it is. Changing your Passcode on your device should also be done to prevent physical access to your device. Your Passcode is not saved anywhere and if anyone attempts to guess it incorrectly too many times, then your device will lock. Changing your Passwords should be done on:

  • Apple ID
  • Email accounts
  • All Social Media apps
  • Any other website where you have an account

Aug 6, 2024 5:52 AM in response to TheLeader707

Devices can only be managed by companies (your employer) that assign a piece of equipment to you or by a profile that you install that is given to you by an organization. Unless you have a corporate device, it's unlikely that your device is managed; navigate to System Settings > Privacy & Security > Profiles. Any installed profile is there. No profile = no management. If you purchased then device yourself for personal use, you would not have a profile installed and only you would have access to the device. Your device is not being remotely controlled.


If you've been hacked in the past, change your passwords and add two-factor authentication to your accounts if available.

Aug 17, 2024 10:49 PM in response to muguy

Honestly only way I can see anything like this happening is that another Apple device is logged in under the same Appleid. I had an issue once that when I set up another family member iPhone I entered my appleid and password setting it up. Phone calls and iMessages where going to both phones even though they where assigned different numbers. Final after about a week I finally figured it and created a new Appleid for the other phone. Then I bought a iPad that I use the same id with as my iPhone I can receive FaceTime calls and I messages on that device and if add a new app it will appear on both devices change settings in safari the settings will change in the other device pictures show up on both devices. It’s separate from family sharing which I do with another iPhone settings on that device doesn’t change it shares purchases like Apple Music fitness iCloud and other services and subscriptions. Maybe that is your problem. Unless you’re trying to figure out how to do this yourself legally because hackers would probably be doing this illegally. I don’t think that you or a person of high interest like a politician for someone to install Pegasus spyware on your device.

Aug 6, 2024 9:49 AM in response to TheLeader707

Perhaps rather than widely speculating the impossible you might want to provide one item for which we can assist. It would be far more productive to indicate what issue you are having; what did you do, what was expected, what actually happened.


TheLeader707 wrote:



Sir if someone can turn your settings on or off, I think that would be called controlling the device. If said person does not have the device in their hand and can change the settings on your device, that would be called remotely controlling your device. If they can prevent you from downloading anything or slowdown the rate that your device downloads without having your device in their hand, that too would be considered remotely controlling your device. If they can change your passwords and sign you out of your account without having the device in their hand, again, I would call that remotely controlling your device. If they can down load applications on to your device without your permission and without the device in their hand , would you not call that managing and remotely controlling your device?

This is not possible without having the device in hand and knowing your device passcode or without having a device given to you by your company/school that is actively managed.


If they can do all of those things without your knowledge ,and no extra devices are showing up on your device, what would you call that? Maybe I am not using the right term , but what ever you call it , it is not suppose to happen without your permission on your device.

This is simply not possible.


You do not know if they are a corporation or not. Any body can set up a fake business online if they have those skills. They can then convince Apple and other corporations that the devices they have hacked into our their devices. That being established, they can then be given the permission to manage those devices.

Again, this is not possible. Apple does not decide whether a device is managed. Your company/school does when they give you a device. And, any installed profile is available for your to see, they cannot be hidden.


I do not know what criteria has to be met in order to be allowed to manage a device, but I am 100% positive that something of that nature is occurring.

Managed devices are provided to your by your employer or school or administered by such. And, any such management is known to you. There is no other way to have a device managed and it is fully transparent to the user.


I know by the files I have seen that they are using Google, Apple, Microsoft, and other companies services for developers.

These companies offer tools for developers, yes. But, that is not the issue here.


That much I know is true. They are on the payroll at some level.

No.


You live in a perfect world where everybody follows the rules and plays fair. In that world all of Apple’s settings do exactly what they are suppose to do. I don’t happen to know what that world looks like.

No, we all. live in the same world. Your device is secure.


In my world Apples settings become tools that are used to take over my device , take my information ,and make it impossible to eradicate the villains from my devices.

Simply not possible. You control your settings.


Again , I am only interested in knowing the ways in which a person can legally (or illegally) remotely control your device. It goes without saying that if you know how to prevent that from occurring, I would appreciate that information also.

This has been provided to you in numerous links. Your device can only be administered by your company/school or organization if they gave you the device or if you install a profile supplied by said organization.


If you don’t believe that these things are possible, that is okay by me. Everybody can have an opinion. Your opinion is absolutely wrong in this case, but everybody has the right to wrong too. At least, that’s what I think. Thank you for sharing.

You have not indicated anything that would suggest your device is managed. You have not indicated a profile installed on the device. You have not indicated that your company/organization is managing said device. Any such management is know to you in your settings. There can be no hidden management profile nor hidden app on your device. Did your IT department set up the device for you? Did they provide you with a profile to install?


Again, it will be far more productive to provide an actual issue that you are having with your device than to speculate the fantastic. The simplest solution is the correct one.

Aug 5, 2024 7:22 AM in response to muguy

First , I want to say that I did not give any entity the permission to access my device remotely. I don’t know what that entails but I think I would remember it. Now the permission may have been given ,but I am not the one who gave it. Since you know so much about this device, please be helpful and tell me where this permission is so I can revoke it. Should not there be some type of record of this transaction. Or are you saying it is not possible for my device to be remotely controlled. Do you believe that I am mistaken? Then how would I know that those things can happen if it were not happening with my device. Go ahead and look it up, and you will see that everything I wrote is possible. I don’t have to convince you that these things are true. Who are you? I know , and really that is all that matters. If you don’t believe me, I don’t care. I asked a question ,and if you have no answer, I am not sure why you commented. My question was not asking people if they believed what I wrote. Please, read the question again?

Aug 6, 2024 5:33 AM in response to muguy

I did not mention or maybe I did , that I was hacked about 5 years ago. My personal information was stolen and has been used many many times. Therefore many individuals are able to authentic themselves online, and over the phone in my name. Not being in possession of my phones has not been an obstacle. They have somehow been able to access my devices remotely. All of them. I know they use various means to accomplish their goals. They have even broken into my apartments. At least some of them can write code for electronic devices. Or maybe they just know how to use these codes. So they circumvent the security of these devices. What should normally prevent a person from accessing these devices does not work for them. This is one of the reasons I think that they are accessing my devices legally. They use my personal information and the information that they know about my devices to trick these companies into giving them permission to control my devices. All phones and computers have the ability to be controlled remotely. Apple devices are no exception. It is built into every operating system. That seems to be what is happening with my devices. They are being managed. That is why I need to know how accessing a device legally is accomplished. As you believe , Apple products are unhackable. That all the different settings and mechanism that are built into the operating system prevents that type of nefarious activity. Well in my case, none of those things work. So I am agreeing with you. Please let me know how they can legally manage my device. What does that process look like. Those settings you mention only temporarily stop them from getting my information, but eventually they fail. If you can direct me in the right direction , I will do the research.

Aug 6, 2024 5:43 AM in response to Mac Jim ID

Thank you sir. One of my devices has that setting. I will find out how to use it. I don’t think it will completely wipe these characters off the map but it may help me reach that goal. What if your device is managed? Those settings would not be able to sever those ties to the entity that manages the device. That would not be good for those managers and employees would run off with their devices. How are those devices configured. How does the manager acquire those permissions and how is it implemented? How does Apple allow a device to become managed? I really believe that therein lies the solution to my dilemma.

Aug 6, 2024 9:26 AM in response to muguy

Sir if someone can turn your settings on or off, I think that would be called controlling the device. If said person does not have the device in their hand and can change the settings on your device, that would be called remotely controlling your device. If they can prevent you from downloading anything or slowdown the rate that your device downloads without having your device in their hand, that too would be considered remotely controlling your device. If they can change your passwords and sign you out of your account without having the device in their hand, again, I would call that remotely controlling your device. If they can down load applications on to your device without your permission and without the device in their hand , would you not call that managing and remotely controlling your device? If they can do all of those things without your knowledge ,and no extra devices are showing up on your device, what would you call that? Maybe I am not using the right term , but what ever you call it , it is not suppose to happen without your permission on your device. You do not know if they are a corporation or not. Any body can set up a fake business online if they have those skills. They can then convince Apple and other corporations that the devices they have hacked into our their devices. That being established, they can then be given the permission to manage those devices. I do not know what criteria has to be met in order to be allowed to manage a device, but I am 100% positive that something of that nature is occurring. I know by the files I have seen that they are using Google, Apple, Microsoft, and other companies services for developers. That much I know is true. They are on the payroll at some level. You live in a perfect world where everybody follows the rules and plays fair. In that world all of Apple’s settings do exactly what they are suppose to do. I don’t happen to know what that world looks like. In my world Apples settings become tools that are used to take over my device , take my information ,and make it impossible to eradicate the villains from my devices. Again , I am only interested in knowing the ways in which a person can legally (or illegally) remotely control your device. It goes without saying that if you know how to prevent that from occurring, I would appreciate that information also. If you don’t believe that these things are possible, that is okay by me. Everybody can have an opinion. Your opinion is absolutely wrong in this case, but everybody has the right to wrong too. At least, that’s what I think. Thank you for sharing.

Aug 21, 2024 1:06 AM in response to TheLeader707

Thank you for you reply, sir. I’m not an expert , but it sounds like ur on to something. I know only a little bit about iPhones and their services and settings so part of my problem just might be solved by getting a fresh Apple ID. I know that they have accessed my accounts . I change my passwords often, but they somehow get in to my accounts. I should not say some how because I know some of what they are able to do. They can operate the device remotely for the most part. So when change my pw they enter by other means or , if that is not possible, they change the setting to there benefit aaathemselves when they can. I have to constantly check my settings and the services that I am aware of on this device. There is another issue also , and that is there activities remain hidden from me the system and Apple. I never show extra devices. Some how they can mimic my device. Or maybe apple thinks it is their device. I don’t receive onetime codes often. It’s really is a mess ,so I think I need to regroup. This issue is just one of many. I don’t know how they can control my device without apple having any hint that this is occurring. That is why I am very curious about remote connections. What you say I know is true as far as the devices syncing info.. they love to set share and location to positive values. They know so much more than I do ,so the have been using apple setting and service to get my info and make it difficult for me to eradicate them from my device. I’m gonna fine a clean device and have that id changed. Thanks.

Aug 5, 2024 7:32 AM in response to TheLeader707

See the link provided for allowing remote access. Settings > general > sharing. Only you can grant permission. There his no other means by which someone can gain access unless you give it to them.


See, Allow a remote computer to access your Mac - Apple Support

If you think your Apple ID has been compromised - Apple Support


You can also see any device attached to your Apple ID at appleid.apple.com. Only those devices are logged into your Apple ID account.

Aug 5, 2024 7:43 AM in response to TheLeader707

For an iPhone, run Safety Check. This will let you:

  • Change Apple ID Password
  • Change Passcode on device
  • View and remove others using your Apple ID
  • View and stop sharing any information with others
  • View if anyone has access to your location
  • View/Change Trusted Phone numbers on your account

How Safety Check on iPhone works to keep you safe - Apple Support


That should cover anything that you are worried about.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

What are the ways in which people can legally remotely connect to an apple device and how is this accomplished.

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.