Investigating “xpc.roleaccountd.staging” on shutdown log, is this a Sign of a sofisticated attack? Help me understand why this happened
I had not came here searching for validation, I appreciate that if you believe that I’m wrong you can explain with forensic methodology however you like otherwise if you can’t then avoid comments . I started to have very strange behavior across devices and accounts around April, I was not maybe a regular/normal person but I promise Im not relevant for you, my life changed and I know exactly who and why and I might be just another girl but yes I had a terrible habit to date people who can afford this attacks, about July I decided I could get trough it, I started studying forensics did mvt (9devices-iocsdetected), yara etc stopped using iPhones because I was not able even to keep one without this problem, when I said this problem I mean, my iPhones will act incredibly abnormal and whenever I wanted to show somebody else it would be gone, yes nobody believed me till I started using qube os airgapped and will fail to run whenever doing forensics then never run again, tails (version debug even though I try downloading from distinct devices and locations ) at some point I was by device 20 and tired of not finding any solution even graphene os with efani was irrelevant when you have SS7 attacks, the phone never worked again till complete restoration but still in my case, graphene is more secure than iOS sorry. I’m working on proof of this now ; that lockdown mode can be used arbitrarily. I don’t gonna explain why this is relevant or Why this is part of a sophisticated APT if you understand why “xpc.roleaccountd.staging” in the shutdown log on iOS is relevant we can talk more, I was just a normal girl before this now I’m a freaky who speend all the time learning about this, I don’t mind it, I actually liked it even tought being in this side of the attack isn’t cool. btw I’m ready to discuss this with someone who wants the truth and maybe a bounty Hunter Id be here waiting. This photos are from a sysdiagnose taken from a iPhone 16plus and 14promax using the latest iOS version at the moment
I have a couple of hypotheses about the chain of exploit they have used, however when talking about SE you think if you get permanent failure then not communication should be established, so I found very interesting how it still happened
at this point I will say it’s hard to believe anything when I see logs I have to look for multiple connections and map them out in real time device activity, so it has been very interesting to see how before and after dfu in real time console(streaming to Mac)it was constantly being captured Apple threat notification but never showed any signs on the device itself so I’m guessing btw it’s made up by the attackers or it’s being hidden by them any way possible to explain this happening for me could no be considered as harmless however will like to hear your explanation
iPhone 16 Plus