is it possible to have a remote user on your iphone if you never set on up?

My Iphone over the last couple of months has been acting very weird- I can not turn it off, my battery dies in 2 hours, it switches screens on me in the middle of me doing something.


i have both "user processes and root user processes running all of the time


i have never set up a root user


I live with my boyfriend who has a mac - ipad and iphone- we use the same wireless network

He has vuze and bit torrent which both i cant seen to run properly as the way they are safed or locked i can not access the files - he also has vmware fusion- again i am unable to run it -


I was told by a friend to turn on my data and watch it to see which programs or applications that I have could be possibly malfunctioning- since then I have notices in my data the following:


there are ports on my connections which i have looked up and are all associated with hacking - 5353-5433-6401-5223--80- so many more I cant bare to look through all the data I have saved- I am not technology savy - the whole process of trying to figure out if this is true or even possible is emotionally and mentally draining-


in my data there are key logs some short some long- some private some public?


key logs

which have information such as -

encodin=UTF-8"?><DOCTYPEplist PUBLIC"-aplle//dtdplist 1.0//EN


key com.apple OTAcrashcopier.successfulSubmissionTime<\key>

array

after multiple list with temperature 1 through 8- which each have a list

<real>a number<real>


it says key com.apple.springboard.thermallevels key array


<key> adlogcreation date</key>


<key>metadata</key>

<dict>


<key>ADuserIntefaceLanguage<key/>


<string> en </string>

<key> adusersetregionformat<key/>

<stiring> US </string>

<dict/>

then a list of

<Key>ad scalars<key/>

<dict>

<key/> appActivationCount.com.apple.ApStore<key>

integer 1 interger

and it then does that for each one of my applications including

count maps

mobilesms

preference

mobilemail

mobilephone

mobilesafari

key appbackgroundactive time

integer 0 interger

and goes through a list of keys associated with again each of my apps


and so on and so on


another key log-

7deviceid- a bunch of letters and numbers

then

isAnonymous:True

deviceConfigID:152

trigertime: numbers

trigger ID-655363

profileld:152998

investigation ID: 0

location udatesession

timestamp:numbers

timestampend:numbers


desired accuracy:-1

cellavilable:true

wifiavailable:true

passcodeLocked:false

airplanemode: false

ttff:0

ttffGPS:0

accessoryused:false

reachability: 1

power : true


there are bunch of key logs all different


system data logs with the following

JS:its.sf6.Bootstrap.init:initialize

JS:its.defer.bootstrap._renderpage component render complete


I have in data reports and connection the words :


local remote peer

Hash



my external IP changes constantly even at home -


ROOT usr- (never mad one)

keybagd running on my root user processes- PID 1455 PPID 1 priority : 17

sandboxd- PID 1452 PPID 1

filecoordination - PID 103 PPID 1

networkd?privile PID 72 PPID 1

Syslogd PID 18 PPID 1

usereventagent PID 13 PPID 1

kernal_task PID 0 PPID )
launchd PID 1 PPID 0

plenty more


in routing tables internet (10)

destination :127 gateway:127.0.0.1


destination:192.168.1.1 gateway:0:18:39:7c:46:d9


destination:default

gateway - 192.186.1.1


gateway pdp_ip0




internet(6) which will have about 150 destinations and gateways listed at once sometimes -


destinations can be fe80::f2dc:e2ff:fe20:e5e7%en0 flag- UHLWLi gateway f0:dc_e2:20:e5:e7 (these are always changing ) sometimes they say link7 sometimes fe80::1%Io0 or 98:d6:bb:751a:f3 or b8:17:c2:28:d6:90 or 4c:b1:99e8:26:21 linl#1 0:26:8:a2:8:2f c:77:1a:a5:4:2f 6c:c2:6d:b0:21:c2



connections on my phone: I have the following categories-

in each one the number of connections constantly changes - tcp4 running the most -

udp6 and udp4 mostly look as typed below but occastionally if i check at the right time - there are multiple- and rarly have the remote port

icmp66 - even more rare that i catch that

never port numbers


These change even while i have close all apps- and am doing absolutely nothing with my phone


tcp4


remote user 17.172.232.133.442

remote user 173.194.74.121:80 -


remote user- 17.172.232.166 : 5225


udp4- local not list - *;*

remote *:*

hostname: n/a


local: *:5353

remote: *:*

hostname: N/A


udp6

local *:5353

remote *:*

hostname- N/A


local: *:55543

remote:*:0



icmp66 local *:0 and remote *:0

with hostname N/A


data logs -

localpeer ID: mobile. 1FDC29D7-2B67-5231-9375-3BDC30E405F, store name:userdictionary, modelversionhash: SAIQVUhF7208e6_gvZx_zdKx1UAzKGem3HO2pLKjgY=ubiquityrootlocation: pfubiquitylocation: 0x1ed87c50 mobile documents/com-apple[textinput/dictionaries


springboard

bbbehavioroverride :transition date should be after provided date


searrchd

indexed all records


searchd

finished getting all applications






remote hostenames from akamaitechonlogies

so much more crap but im not sure what would be more useful to get my answer- i know some of this suff is totally normal from all the research i did but i also found a lot which i am very uncomfortable- i have updated my phone and everything - it continues

iPhone 4S, iOS 6

Posted on Sep 28, 2012 5:10 PM

Reply
60 replies

Sep 26, 2013 1:22 AM in response to OriginalLP

I am in the same situation as all of you. I have had 6 iPhones since Feb 2011 and NOBODY can help me. I've talked to Apple Care 100 times, Apple store, my cellular providers, IT guys, my ISP's, the state police and the attorney general. I have gained contact people at Apple but they always end up failing me in the end. The best place to start if you REALLY want to know what these logs mean, is iOS Developer Library. ANYTHING to do with developers is where your answers are, regardless of Apple, Microsoft, etc. It is the MOST FRUSTRATING thing I've ever been through because I KNOW there are people that can help and know this stuff and I just DO NOT understand why the cries for help are ignored! I LOVE my iphone, but instead of enjoying all of its features, I shut most of it down and use my phone to do IT research so I can someday stop this MONSTER that might as well live with me for how much of my personal life they invade. I've been at this for 2 1/2yrs...it's not just our mobile devices in my case, they hack every computer I buy, every company I switch to, I can't stop them....YET! Some of the posts above I scanned through and recognize 3/4 of what I see. I would be more than happy to help anyone with what I have learned, but I am no expert....if I was, I wouldn't still have a creeper! :) good luck to all of you!

Aug 31, 2016 6:34 PM in response to ChrisJ4203

A number of things clued me in to the probability of Lawful Intercept interfering with my device:

*The most telling incident happened an hour or so after I updated to 9.3.5. Somehow the name under settings>general>about changed from "Rebecca's iPhone" to "TOP Station 2's iPhone"

*'Pegasus' is on my device. Pegasus is sold to law enforcement agencies and the like. Not the public.

* They accidentally sent to my voicemail a recorded conversation between myself and two other people.

* all of my accounts have been hacked, yet none of my money has been stolen or used.

* and one other thing that happened at 3 am today - something that I don't care to disclose - confirmed it.

* IP addresses in my diagnostics logs trace back to the DoD network information center in Columbus OH.

* Entries in my diagnostics include: 'gas-gauge meter' (iodb2 device), fingerprint storage and enrollment info, cellular LacTac Change logs, FUD state entries, RATs, bird, Pegasus...

I can keep going with the list of symptoms and manifestations for quite a while, but off the top of my head those are the ones that relate to surviellance and L.I.

Sep 6, 2017 7:59 AM in response to IdrisSeabright

I'm afraid this is a useless thread, and the poster you responded to has been posting absolute nonsense about hacking phones and other conspiracy theories in other threads.


Suffice it to say that if the poster's allegations are true then the FBI wasted over $1 million hacking one phone. And that somehow the general and trade press has been bribed to not report the fact that iOS can be easily hacked by any script kiddie.

Sep 6, 2017 1:50 PM in response to aluze44

aluze44 wrote:


Conspiracy theories? Why dont you learn a bit and then come talk me. Using a mac and certain tools anything is possible. I encourage you to read up on some of whats contained within this link. Dont you have anything better to do if your not going to be helpful. Thank you Ma'am and have a nice day.


http://www.newosxbook.com/index.php?page=notes

I didn't see anything at that link explaining how steganography could be used to remotely access anyone's computer. It seems to mostly be information on previous versions of iOS and Mac OS. It wasn't particularly edifying.


Do you have links to information that will explain how steganography can be used to remotely access someone's computer?

Sep 6, 2017 1:54 PM in response to aluze44

What's contained in that link has nothing to do with anything on an iPhone and nothing to do with hacking anything. I assume you either didn't read any of it, or didn't understand what you read. A couple of the links even say that an unjailbroken iPhone cannot be hacked, which has already been said in this thread. And the NSA and FBI have confirmed that they cannot hack iPhones unless they have physical possession of them AND they are unlocked. If you know something that the FBI and NSA don't know you should most certainly tell them, as it is a matter of national security.


Both Idris and I understand what is possible. My work includes cybersecurity on a daily basis, and Idris has 20 years experience in cellular communications.

Sep 15, 2015 3:47 AM in response to 19Split47

19Split47 has the right idea for a good starting point especially if someone had physical access to your device. If your decide has Cydia or appears to be jail broken, it's safe to assume you are 100% compromised. See also Cellebrite https://en.m.wikipedia.org/wiki/Cellebrite and Fin Fisher for NSA/FBI grade surveillance tools. But that's not all- apple itself provides a few very worrisome back doors to your IDevices as well! Research iOS port 62078 & com.apple.pcapd or simply read this article http://m.theregister.co.uk/2014/07/21/ios_firmware_contains_packet_sniffer_and_h ost_of_secret_spying_tools/ if you really want to start losing more sleep at night.

In addition, bad guys can get in by hacking your home network router if it hasn't been properly secured (by changing the default login to the generic router setup page or not using Wpa2 eas wifi security protocols, etc (see http://hackersdontwin.com/?cat=139). Ditto if your laptop, desktop, printer or really ANY ELECTRONIC DEVICE that is not properly secured or that contains a security hole or weakness (and there is not a device in the world that DOESN'T), your entire network and everything attached to it can be accessed. That is the reality of the connected world we live in. Even newer cars these days are coming with factory installed internet access, and yes they can and already have been hacked fairly easily and remotely (without ever being anywhere near the vehicle in the physical sense of the word). Personally, I have tried to learn to accept these realities as circumstances which are far beyond my ability to control them for the most part. So I take reasonable precautions to try to mitigate the risks, but I don't obsess over it nearly as much anymore because it is a losing proposition and a sanity and life-sucker if you allow it to be!!!

But having said all of that, here are a few links for those of you who may prefer to press on in a quest for a better understanding of the situation at hand:

Demystifying iOS Crash Logs- http://www.raywenderlich.com/23704/demystifying-ios-application-crash-logs

iOS Developer Library- https://developer.apple.com/library/ios/navigation/index.html?filter=bonjour

Acronym Definitions- http://www.rfc-editor.org/rfc-style-guide/abbrev.expansion.txt

I wish you to best of luck but remember, the best way to beat these people at their own game is to live a happy and fulfilling life DESPITE their ridiculously invasive attacks and actions!

Sep 29, 2012 7:06 AM in response to Ocean20

He has cydia on his ipad- I cant seem to figure out if mine is- I dont think so because I was able to upgrade my phone recently. But I recently noticed I have lost my "itunes" account? Im am not currently "subscribed" anymore- it tells me register with my computer-

I dont think its possible my phone is jailbroken if I was able to update to IOS6.0-


but im not sure-


Is it possible that if he had all my phone information - model numbers- and wifi address - that he could remote log in with vuze/bit torrent? what ever that stuff is -

Sep 29, 2012 10:16 AM in response to nep157

What is this-


timestamp: 1348891259532

crashReporterKey: "444e8c999e3fedcd4afa8992d20b93e3ee4a6a67"

isAnonymous: true

deviceConfigId: 152

investigationId: 0

model: "iPhone4,1"

softwareBuild: "10A403"

firmwareVersion: "iBoot-1537.4.18"

basebandVersion: "3.0.04"

buildtype: "User"

metriclogs {

triggerTime: 1348891259482

triggerId: 458758

profileId: 152043

metricCCDiagnosticsAllowed {

allowed: true

timestamp: 1348891259539

}

}

metriclogs {

triggerTime: 1348897145134

triggerId: 524308

profileId: 152035

metricCCAirplaneMode {

airplaneModeEnabled: false

timestamp: 1348897145128

}

}

metriclogs {

triggerTime: 1348897142970

triggerId: 458758

profileId: 152043

metricCCDiagnosticsAllowed {

allowed: true

timestamp: 1348897142989

}

}

metriclogs {

triggerTime: 1348903567922

triggerId: 458758

profileId: 152043

metricCCDiagnosticsAllowed {

allowed: true

timestamp: 1348903567944

}

}

metriclogs {

triggerTime: 1348903567969

triggerId: 520196

profileId: 152005

profileId: 152014

profileId: 152032

profileId: 152034

profileId: 152040

profileId: 152044

metricCCDiagnosticsAllowed {

allowed: true

timestamp: 1348903567990

}

metricCCAirplaneMode {

airplaneModeEnabled: false

timestamp: 1348903568411

}

metricCCHAC {

enabled: false

timestamp: 1348903568427

}

dataSentOnInternetCtxCount {

count: 8974220

startTimestamp: 1348785853895

timestamp: 1348903568460

}

dataRecvedOnInternetCtxCount {

count: 36199566

startTimestamp: 1348785853902

timestamp: 1348903568467

}

wifiPowerState {

timestamp: 1348903568414

powerState: true

}

wifiHardwareVersion {

timestamp: 1348903568500

hardwareVersion: "vendorid: 0x14e4\ndeviceid: 0x4360\nradiorev: 0x2066000\nchipnum: 0x4330\nchiprev: 0x4\ncorerev: 0x19\nboardid: 0x600\nboardvendor: 0x14e4\nboardrev: 0x1301\ndriverrev: 0x55acf41\nucoderev: 0x2e4006f\nbus: 0x0\n"

}

wifiNetworkPrefs {

atjEnabled: true

atjCanceledCount: 17

atjUsedCount: 0

adhocNetsCount: 4

prefNetsCount: 24

captiveNetsCount: 7

applePersHotspotNetsCount: 0

wapiNetsCount: 0

mostUsedCount: 3

mostUsedNetworks {

securityType: 2

ap_oui: "d\017("

timeUsedMinutes: 37476

}

mostUsedNetworks {

securityType: 0

ap_oui: "\000\0309"

timeUsedMinutes: 22548

}

mostUsedNetworks {

securityType: 0

ap_oui: "\000&amp;>"

timeUsedMinutes: 21649

}

timestamp: 1348903568437

hiddenNetsCount: 0

wepNetsCount: 0

wpaNetsCount: 3

eapNetsCount: 0

openNonCaptiveNetsCount: 14

}

wifiMetricInterfaceStats {

timestamp: 1348903568487

wifiA2dpRxBytes: 0

wifiScoRxBytes: 0

wifiRxBytes: 108960

wifiHidRxBytes: 0

cellularDataRxBytes: 27676

wifiA2dpTxBytes: 12

wifiScoTxBytes: 0

wifiTxBytes: 5726

wifiHidTxBytes: 0

cellularDataTxBytes: 6776

statsCollectionMinutes: 1440

wifiAssocMinutes: 525

a2dpAssocMinutes: 0

scoAssocMinutes: 0

hidAssocMinutes: 0

}

locationServicesState {

timestamp: 1348903568428

enabled: true

bundleid: "com.apple.locationd-queried"

event: -1

}

motionState {

timestamp: 1348903568429

bundleid: "com.apple.locationd-queried"

motionType: 0

enabled: false

}

bluetoothPowerState {

timestamp: 1348903568454

powerState: false

}

bluetoothPairedDevices {

timestamp: 1348903568460

}

cellularCdmaTxRxHistV2 {

timestamp: 1348897168101

duration: 6400

}

cellularWcdmaOutOfService {

timestamp: 1348898847853

}

cellularWcdmaTxRxHistV2 {

timestamp: 1348897168103

duration: 6400

hist_per_band {

wcdma_band: SYS_BAND_WCDMA_V_850

min_rx_level_dbm: -87

rx_bins: 87

rx_bins: 675

rx_bins: 165

rx_bins: 10

rx_bins: 257

rx_bins: 59

rx_bins: 5

rx_bins: 4

rx_bins: 8

rx_bins: 35

rx_bins: 527

rx_bins: 2000

rx_bins: 2448

rx_bins: 1777

rx_bins: 2947

rx_bins: 2664

rx_bins: 1334

rx_bins: 1150

rx_bins: 595

rx_bins: 151

rx_bins: 7

min_sec_rx_level_dbm: -89

sec_rx_bins: 25

sec_rx_bins: 419

sec_rx_bins: 152

sec_rx_bins: 6

sec_rx_bins: 451

sec_rx_bins: 1164

sec_rx_bins: 1358

sec_rx_bins: 817

sec_rx_bins: 1217

sec_rx_bins: 595

sec_rx_bins: 1089

sec_rx_bins: 1602

sec_rx_bins: 1578

sec_rx_bins: 1274

sec_rx_bins: 549

sec_rx_bins: 186

sec_rx_bins: 74

sec_rx_bins: 78

sec_rx_bins: 9

min_tx_level_dbm: -55

tx_bins: 1

tx_bins: 1

tx_bins: 1

tx_bins: 2

tx_bins: 2

tx_bins: 6

tx_bins: 1

tx_bins: 0

tx_bins: 3

tx_bins: 4

tx_bins: 2

tx_bins: 2

tx_bins: 1

tx_bins: 3

tx_bins: 2

tx_bins: 1

tx_bins: 2

tx_bins: 3

tx_bins: 4

tx_bins: 2

tx_bins: 7

tx_bins: 5

tx_bins: 2

tx_bins: 5

tx_bins: 12

tx_bins: 12

tx_bins: 9

tx_bins: 9

tx_bins: 21

tx_bins: 16

tx_bins: 15

tx_bins: 24

tx_bins: 21

tx_bins: 13

tx_bins: 61

tx_bins: 19

tx_bins: 34

tx_bins: 37

tx_bins: 63

tx_bins: 79

tx_bins: 110

tx_bins: 86

tx_bins: 98

tx_bins: 99

tx_bins: 110

tx_bins: 164

tx_bins: 227

tx_bins: 438

tx_bins: 610

tx_bins: 855

tx_bins: 981

tx_bins: 996

tx_bins: 1123

tx_bins: 994

tx_bins: 986

tx_bins: 763

tx_bins: 674

tx_bins: 425

tx_bins: 378

tx_bins: 237

tx_bins: 216

tx_bins: 126

tx_bins: 94

tx_bins: 71

tx_bins: 44

tx_bins: 36

tx_bins: 14

tx_bins: 8

tx_bins: 1

min_rx_level_idle_dbm: -89

rx_bins_idle: 1

rx_bins_idle: 1

rx_bins_idle: 5

rx_bins_idle: 22

rx_bins_idle: 34

rx_bins_idle: 55

rx_bins_idle: 37

rx_bins_idle: 6

rx_bins_idle: 14

rx_bins_idle: 3

rx_bins_idle: 0

rx_bins_idle: 3

rx_bins_idle: 10

rx_bins_idle: 40

rx_bins_idle: 104

rx_bins_idle: 119

rx_bins_idle: 151

rx_bins_idle: 196

rx_bins_idle: 159

rx_bins_idle: 95

rx_bins_idle: 82

rx_bins_idle: 57

rx_bins_idle: 22

rx_bins_idle: 11

rx_bins_idle: 1

min_sec_rx_level_idle_dbm: -92

sec_rx_bins_idle: 1

sec_rx_bins_idle: 0

sec_rx_bins_idle: 0

sec_rx_bins_idle: 0

sec_rx_bins_idle: 3

sec_rx_bins_idle: 3

sec_rx_bins_idle: 16

sec_rx_bins_idle: 12

sec_rx_bins_idle: 41

sec_rx_bins_idle: 38

sec_rx_bins_idle: 13

sec_rx_bins_idle: 13

sec_rx_bins_idle: 19

sec_rx_bins_idle: 16

sec_rx_bins_idle: 24

sec_rx_bins_idle: 50

sec_rx_bins_idle: 73

sec_rx_bins_idle: 114

sec_rx_bins_idle: 79

sec_rx_bins_idle: 23

sec_rx_bins_idle: 2

sec_rx_bins_idle: 4

}

hist_per_band {

wcdma_band: SYS_BAND_WCDMA_II_PCS_1900

min_rx_level_dbm: -84

rx_bins: 2

rx_bins: 2795

rx_bins: 3000

rx_bins: 865

rx_bins: 56

rx_bins: 15

rx_bins: 2

min_sec_rx_level_dbm: -85

sec_rx_bins: 651

sec_rx_bins: 2786

sec_rx_bins: 1101

sec_rx_bins: 941

sec_rx_bins: 112

sec_rx_bins: 15

sec_rx_bins: 8

min_tx_level_dbm: -28

tx_bins: 3

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 1

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 2

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 2

tx_bins: 1

tx_bins: 1

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 1

tx_bins: 0

tx_bins: 2

tx_bins: 0

tx_bins: 2

tx_bins: 1

tx_bins: 7

tx_bins: 8

tx_bins: 70

tx_bins: 132

tx_bins: 323

tx_bins: 480

tx_bins: 628

tx_bins: 681

tx_bins: 613

tx_bins: 381

tx_bins: 247

tx_bins: 192

tx_bins: 167

tx_bins: 176

tx_bins: 98

tx_bins: 75

tx_bins: 50

tx_bins: 40

tx_bins: 31

tx_bins: 14

tx_bins: 7

tx_bins: 1

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 0

tx_bins: 1

tx_bins: 0

tx_bins: 0

tx_bins: 11

tx_bins: 37

tx_bins: 53

tx_bins: 107

tx_bins: 122

tx_bins: 75

tx_bins: 47

tx_bins: 9

tx_bins: 7

tx_bins: 9

tx_bins: 7

tx_bins: 7

tx_bins: 8

tx_bins: 7

tx_bins: 3

tx_bins: 0

tx_bins: 1

min_rx_level_idle_dbm: -85

rx_bins_idle: 1

rx_bins_idle: 52

rx_bins_idle: 600

rx_bins_idle: 1501

rx_bins_idle: 1175

rx_bins_idle: 277

rx_bins_idle: 48

rx_bins_idle: 14

min_sec_rx_level_idle_dbm: -84

sec_rx_bins_idle: 11

sec_rx_bins_idle: 16

sec_rx_bins_idle: 8

sec_rx_bins_idle: 0

sec_rx_bins_idle: 1

}

}

cellularCallCount {

timestamp: 1348897168103

period_seconds: 6400

}

}

metriclogs {

triggerTime: 1348920337253

triggerId: 458758

profileId: 152043

metricCCDiagnosticsAllowed {

allowed: true

timestamp: 1348920337266

}

}

metriclogs {

triggerTime: 1348922269370

triggerId: 458758

profileId: 152043

metricCCDiagnosticsAllowed {

allowed: true

timestamp: 1348922269433

}

}

Oct 9, 2012 9:59 AM in response to nep157

nep157 I'm not sure if anyone has been able to help you with this situation yet or not. I was looking for some way to contact you more privately than just replying to this thread but I don't see anyway too.

I have te exact same situation going on here &amp; have found it impossible to find anyone to help me. If you do find a way to get this all to stop or if someone is able to help you please let me know!!! This is emotional &amp; physically draining &amp; it has wrecked me!

Good luck to you!

Nov 30, 2012 4:51 PM in response to nep157

The same exact thing is happening to me.. I tried looking up things on my laptop and found history from someone else.. I never use my regular laptop just my iPhone. This has been happening to me for months and I've tried every solution I could.. I think a hacker gets into your phone either through wifi, or an application like Facebook. I've told Apple numerous times and they say they have never heard of such a thing and iPhones can't be hacked! Well I know mine is because my boyfriend heard a mans voice on then phone line after I hung up. So he was still on the line even when I hung up. Also when I make a phone call and look under recent calls it will have 2 times next to it for the same conversation. I know I was on the phone for 5 mins while the other said 3 mins for the same call.. it happens all the time.. It's creepy and I hate it! Wish I never got an iPhone cuz I never had these problems and worries:(

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

is it possible to have a remote user on your iphone if you never set on up?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.