Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

is it possible to have a remote user on your iphone if you never set on up?

My Iphone over the last couple of months has been acting very weird- I can not turn it off, my battery dies in 2 hours, it switches screens on me in the middle of me doing something.


i have both "user processes and root user processes running all of the time


i have never set up a root user


I live with my boyfriend who has a mac - ipad and iphone- we use the same wireless network

He has vuze and bit torrent which both i cant seen to run properly as the way they are safed or locked i can not access the files - he also has vmware fusion- again i am unable to run it -


I was told by a friend to turn on my data and watch it to see which programs or applications that I have could be possibly malfunctioning- since then I have notices in my data the following:


there are ports on my connections which i have looked up and are all associated with hacking - 5353-5433-6401-5223--80- so many more I cant bare to look through all the data I have saved- I am not technology savy - the whole process of trying to figure out if this is true or even possible is emotionally and mentally draining-


in my data there are key logs some short some long- some private some public?


key logs

which have information such as -

encodin=UTF-8"?><DOCTYPEplist PUBLIC"-aplle//dtdplist 1.0//EN


key com.apple OTAcrashcopier.successfulSubmissionTime<\key>

array

after multiple list with temperature 1 through 8- which each have a list

<real>a number<real>


it says key com.apple.springboard.thermallevels key array


<key> adlogcreation date</key>


<key>metadata</key>

<dict>


<key>ADuserIntefaceLanguage<key/>


<string> en </string>

<key> adusersetregionformat<key/>

<stiring> US </string>

<dict/>

then a list of

<Key>ad scalars<key/>

<dict>

<key/> appActivationCount.com.apple.ApStore<key>

integer 1 interger

and it then does that for each one of my applications including

count maps

mobilesms

preference

mobilemail

mobilephone

mobilesafari

key appbackgroundactive time

integer 0 interger

and goes through a list of keys associated with again each of my apps


and so on and so on


another key log-

7deviceid- a bunch of letters and numbers

then

isAnonymous:True

deviceConfigID:152

trigertime: numbers

trigger ID-655363

profileld:152998

investigation ID: 0

location udatesession

timestamp:numbers

timestampend:numbers


desired accuracy:-1

cellavilable:true

wifiavailable:true

passcodeLocked:false

airplanemode: false

ttff:0

ttffGPS:0

accessoryused:false

reachability: 1

power : true


there are bunch of key logs all different


system data logs with the following

JS:its.sf6.Bootstrap.init:initialize

JS:its.defer.bootstrap._renderpage component render complete


I have in data reports and connection the words :


local remote peer

Hash



my external IP changes constantly even at home -


ROOT usr- (never mad one)

keybagd running on my root user processes- PID 1455 PPID 1 priority : 17

sandboxd- PID 1452 PPID 1

filecoordination - PID 103 PPID 1

networkd?privile PID 72 PPID 1

Syslogd PID 18 PPID 1

usereventagent PID 13 PPID 1

kernal_task PID 0 PPID )
launchd PID 1 PPID 0

plenty more


in routing tables internet (10)

destination :127 gateway:127.0.0.1


destination:192.168.1.1 gateway:0:18:39:7c:46:d9


destination:default

gateway - 192.186.1.1


gateway pdp_ip0




internet(6) which will have about 150 destinations and gateways listed at once sometimes -


destinations can be fe80::f2dc:e2ff:fe20:e5e7%en0 flag- UHLWLi gateway f0:dc_e2:20:e5:e7 (these are always changing ) sometimes they say link7 sometimes fe80::1%Io0 or 98:d6:bb:751a:f3 or b8:17:c2:28:d6:90 or 4c:b1:99e8:26:21 linl#1 0:26:8:a2:8:2f c:77:1a:a5:4:2f 6c:c2:6d:b0:21:c2



connections on my phone: I have the following categories-

in each one the number of connections constantly changes - tcp4 running the most -

udp6 and udp4 mostly look as typed below but occastionally if i check at the right time - there are multiple- and rarly have the remote port

icmp66 - even more rare that i catch that

never port numbers


These change even while i have close all apps- and am doing absolutely nothing with my phone


tcp4


remote user 17.172.232.133.442

remote user 173.194.74.121:80 -


remote user- 17.172.232.166 : 5225


udp4- local not list - *;*

remote *:*

hostname: n/a


local: *:5353

remote: *:*

hostname: N/A


udp6

local *:5353

remote *:*

hostname- N/A


local: *:55543

remote:*:0



icmp66 local *:0 and remote *:0

with hostname N/A


data logs -

localpeer ID: mobile. 1FDC29D7-2B67-5231-9375-3BDC30E405F, store name:userdictionary, modelversionhash: SAIQVUhF7208e6_gvZx_zdKx1UAzKGem3HO2pLKjgY=ubiquityrootlocation: pfubiquitylocation: 0x1ed87c50 mobile documents/com-apple[textinput/dictionaries


springboard

bbbehavioroverride :transition date should be after provided date


searrchd

indexed all records


searchd

finished getting all applications






remote hostenames from akamaitechonlogies

so much more crap but im not sure what would be more useful to get my answer- i know some of this suff is totally normal from all the research i did but i also found a lot which i am very uncomfortable- i have updated my phone and everything - it continues

iPhone 4S, iOS 6

Posted on Sep 28, 2012 5:10 PM

Reply
Question marked as Best reply

Posted on Aug 31, 2016 6:34 PM

A number of things clued me in to the probability of Lawful Intercept interfering with my device:

*The most telling incident happened an hour or so after I updated to 9.3.5. Somehow the name under settings>general>about changed from "Rebecca's iPhone" to "TOP Station 2's iPhone"

*'Pegasus' is on my device. Pegasus is sold to law enforcement agencies and the like. Not the public.

* They accidentally sent to my voicemail a recorded conversation between myself and two other people.

* all of my accounts have been hacked, yet none of my money has been stolen or used.

* and one other thing that happened at 3 am today - something that I don't care to disclose - confirmed it.

* IP addresses in my diagnostics logs trace back to the DoD network information center in Columbus OH.

* Entries in my diagnostics include: 'gas-gauge meter' (iodb2 device), fingerprint storage and enrollment info, cellular LacTac Change logs, FUD state entries, RATs, bird, Pegasus...

I can keep going with the list of symptoms and manifestations for quite a while, but off the top of my head those are the ones that relate to surviellance and L.I.

60 replies
Question marked as Best reply

Aug 31, 2016 6:34 PM in response to ChrisJ4203

A number of things clued me in to the probability of Lawful Intercept interfering with my device:

*The most telling incident happened an hour or so after I updated to 9.3.5. Somehow the name under settings>general>about changed from "Rebecca's iPhone" to "TOP Station 2's iPhone"

*'Pegasus' is on my device. Pegasus is sold to law enforcement agencies and the like. Not the public.

* They accidentally sent to my voicemail a recorded conversation between myself and two other people.

* all of my accounts have been hacked, yet none of my money has been stolen or used.

* and one other thing that happened at 3 am today - something that I don't care to disclose - confirmed it.

* IP addresses in my diagnostics logs trace back to the DoD network information center in Columbus OH.

* Entries in my diagnostics include: 'gas-gauge meter' (iodb2 device), fingerprint storage and enrollment info, cellular LacTac Change logs, FUD state entries, RATs, bird, Pegasus...

I can keep going with the list of symptoms and manifestations for quite a while, but off the top of my head those are the ones that relate to surviellance and L.I.

Sep 26, 2013 1:22 AM in response to OriginalLP

I am in the same situation as all of you. I have had 6 iPhones since Feb 2011 and NOBODY can help me. I've talked to Apple Care 100 times, Apple store, my cellular providers, IT guys, my ISP's, the state police and the attorney general. I have gained contact people at Apple but they always end up failing me in the end. The best place to start if you REALLY want to know what these logs mean, is iOS Developer Library. ANYTHING to do with developers is where your answers are, regardless of Apple, Microsoft, etc. It is the MOST FRUSTRATING thing I've ever been through because I KNOW there are people that can help and know this stuff and I just DO NOT understand why the cries for help are ignored! I LOVE my iphone, but instead of enjoying all of its features, I shut most of it down and use my phone to do IT research so I can someday stop this MONSTER that might as well live with me for how much of my personal life they invade. I've been at this for 2 1/2yrs...it's not just our mobile devices in my case, they hack every computer I buy, every company I switch to, I can't stop them....YET! Some of the posts above I scanned through and recognize 3/4 of what I see. I would be more than happy to help anyone with what I have learned, but I am no expert....if I was, I wouldn't still have a creeper! :) good luck to all of you!

Feb 4, 2017 11:15 PM in response to MickDKaye

I have had this problem a year now and Apple just resets the phone and tells me iPhones don't get hacked, but they never answer any of my questions about the proof I have. Verizon had 1 person find where my phone was being accessed remotely, but when he couldn't disable that he transferred me to higher level tech with the same response everyone gives... iPhones don't get hacked. Apple is not spelled GOD, Apple isn't perfect and has many flaws mainly hearing real concerns.

Is there a program or anything you suggest to remove the unauthorized remote super user?

Apr 25, 2017 4:37 AM in response to Rdeselle1975

I cannot see your email address but I would LOVE to discuss all of this with you. I have had these same problems for almost two years and need help... People do not understand because they do not understand how someone can have such access to your devices and well that is easy if it is your spouse that is the perpetrator... Please email me @ *******
<Email Edited by Host>

Apr 25, 2017 10:23 AM in response to Sarah Watkins

Sarah Watkins wrote:


I cannot see your email address but I would LOVE to discuss all of this with you. I have had these same problems for almost two years and need help... People do not understand because they do not understand how someone can have such access to your devices and well that is easy if it is your spouse that is the perpetrator... Please email me @ *******
<Email Edited by Host>

Accessing your device is not easy if you have the passcode enabled. Even the FBI was stymied by that. If your Apple ID passcode is something that your spouse knows or would find easy to guess, they would be able to access a lot of your information, some of which is also on your phone.


Put a 6-digit passcode on your phone. Change your Apple ID passcode to something that other people would find difficult to guess and then enable two-factor authentication on the account. Your spouse will not longer be able to access anything on your phone.

Jun 10, 2017 6:08 AM in response to Br3ndab

Br3ndab wrote:


I have tried restoring my iPhone to new many times and changing my password and using 2 factor authorization. Yet, there is still weird stuff happening with my phone.

I use the same laptop to restore it, could this be the problem?

You should start your own thread. Explain what the "weird stuff" is. Do not post endless log files. Do not assume that the cause is a hacker. Just explain what's happening. You're far more likely to get the help you need that way.


Best of luck.

Sep 5, 2017 8:58 PM in response to nep157

People-do you think that Apple really regulates the App Store apps? If it's a free app can you download it you are susceptible to whatever code is within that app. With the right commands executed remotely and with the right type of platform to execute the code it is absolutely possible that the remote user Tom other way into your iPhone and use steganography or other methods two completely compromise your apple iTunes account. What happens is this: once again access to your account they take every file in it or almost every file in it and slightly alter it with malicious code using steganography. Once this is backed up to the cloud, whenever you hook up to your account from whatever device you were on your essentially give them access to your phone and everything again they just wait for you to get back online. There are software in the program to use will have some sort of built-in signal to let them know you're active again. Do not be fooled but he claims that Apple software or their programs for the devices are on hack a bowl and that people are unable to gain access to your info. There are multiple multiple sources that are putting things on the Internet and creating sites with **** simply from sucking the files off of people's phones. People do not realize somebody out there created the code that makes your iPhone work those same people know how to get around it if they should stop working for Apple or sell their knowledge to someone else. Think about it if you're an anti virus company... Will it be in your best interest to create some sort of virus that you could essentially "provide the solution for?" I mean if these people are writing programs to illuminate now where do you think you'll be able to create it as well? There is no such thing as privacy and merely the illusion of it. I don't need time for any reason the camera in your phone the phone itself GPS location on the phone is on can be accessed by the NSA or any hacker with reasonable knowledge of computer science coding and commands. End of story. If you want to get really deep look up "steganography" and "gaining remote access to peoples computers" on google.

Sep 6, 2017 7:59 AM in response to IdrisSeabright

I'm afraid this is a useless thread, and the poster you responded to has been posting absolute nonsense about hacking phones and other conspiracy theories in other threads.


Suffice it to say that if the poster's allegations are true then the FBI wasted over $1 million hacking one phone. And that somehow the general and trade press has been bribed to not report the fact that iOS can be easily hacked by any script kiddie.

is it possible to have a remote user on your iphone if you never set on up?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.