What are the ways in which people can legally remotely connect to an apple device and how is this accomplished.
I have come to believe that the persons that have taken control of my devices have permission. They have all my personal information and are notified in various ways when I get a new device. Some are accessed remotely during the set up process I know when the device is vulnerable. I’m sure there is not only one way they have been doing this hack. However, once they have entered , they are able to operate my devices with almost complete immunity. They can see everything I do and I can see nothing they do in my device. I can see settings that have been changed and applications that they download usually,however, I have no way of knowing how they do this. They definitely have more privileges than I on my devices. How can this happen? There are many other events occurring that I know nothing about on my devices that they initiate. I am not able to understand device logs which could explain a lot of what is happening with my devices, nor can I get anyone to explain them to me. The causes of these intrusions I can only speculate. Logic tells me that what ever it is that they do, it is something that is allowed by the operating system and that they have permission to do these things. I know that devices can be managed by a company. All the things that I see happening a company can do lawfully with the devices it manages. I think somehow they are using my information and assigning my devices to their fake company. After that everything else falls in place. It would explain a lot of what is going on. I also think that they have added my profile to a mass gaming application that allows many people to see where I am at all times if I have my device with me. I am followed . This is not speculation. The question is of course why am I being followed, for this conversation I am more concerned about how did they get the permission to track my device. There are more activities and events that I could write about but thenI would start sounding like a paranoid schizophrenic, so I will not trouble you with any more details. I am very unfamiliar with apple devices. They say they are more secure than any other device. For me this has not been the case. They are able to access remotely my devices just as easy as when I used Android devices. This leads me to believe that they rouge developers who have contracted with Apple and other companies to make application or something of that nature. These companies then give them the privilege escalation needed to take over my devices. Again speculation, but I have real reasons to think this might be the case. That is why I ask: what are the legal whys in which a device could be accessed remotely, I’m using an apple product so I do not need to say that I concern about apple policies and device settings. My lack of knowledge about this product , I believe , has allowed these persons to use Apple services and device mechanism against me.