I can't figure out how the iPhone is monitored
by Poster
Apr 29, 2025
53
Background
It is currently known that A is monitored by B. During April 2025, B acquired multiple historical and recent personal chat records of A, including:
1. Information content mastered by B
WeChat chat history between A and C
Time covered: 2023 and 2024 or more
Anomaly point: A has deleted C's contact and chat record from WeChat in August 2024 (this B also knows when it was deleted), but B can accurately tell the content and time of the past chats between the two.
A Other WeChat chat records with multiple people
The content is detailed, and B has a wide range of mastery.
A's iMessage chat history
Include conversations in recent days, and even know what messages A sent and which messages A deleted locally.
Anomaly: A's iMessage does not enable iCloud synchronization, nor is it logged in to other devices (such as iPad, etc.) to sync this information.
II. Equipment and safety status of A
Device model: iPhone 16 Pro Max
Operating System: iOS 18.4.1 (latest)
Not jailbroken
There is no abnormal device in WeChat login device management
iCloud sync for iMessage is not turned on
Not using another device to log in to WeChat or Apple ID (I don't know the ID password, the ID has enabled secondary login)
No signs of spyware found by iMazing checks
3. About B's ability and behavior
B once mastered A's unlocking password, but it can't unlock A's mobile phone at present.
B is not technologically proficient, but within the system, it is possible that JC or relevant insiders have entrusted to retrieve network or cloud records?
The information held by B is not only accurate to the time point and specific content, but even the deletion operation is clear
4. Existing doubts and doubts
Why can WeChat chat records deleted in 2024 still be obtained in 2025?
The WeChat terminal has been deleted, and there is no abnormal login or backup device;
It stands to reason that the chat history has been cleared locally and cannot be recovered.
Why does B know the most recent messages and deletion records accurately when iMessage is not synchronized?
B even knows the delete operation
Does spyware implantation exist?
Not found using tools such as iMazing;
。
Why is the information held by B concentrated in April 2025 revealed?
If B had always held A's data, it should have been disclosed long ago;
Replies
-
Anonymous2062 Apr 29, 2025If you don't reply directly to the topic, you just remind everyone: Set the PIN code correctly on the mobile phone SIM card! Do not use the initial PIN code! It is recommended to physically destroy the SIM card substrate containing the PUK code directly!
-
Poster Apr 29, 2025What's the saying @ Anonymous2062
-
Anonymous2062 Apr 29, 2025B has mastered A's unlocking password https://support.apple.com/zh-cn/109054
-
Anonymous8564 Apr 29, 2025@ Anonymous2062 means to change your sim card for your mobile phone to log in to WeChat?
-
Anonymous8565 Apr 29, 2025Unencrypted backup of iPhone. Plug it into the computer and automatically unencrypted backup. Then read the backup file. You can do what the poster said. You can even tamper with the chat record. You can't see it in the APP
-
Anonymous1989 Apr 29, 2025It is not difficult to back up and then extract
-
Anonymous4632 Apr 29, 2025PM16 was only released last year, what do you say?..
-
Anonymous3001 Apr 29, 2025I just saw it on tg yesterday, there is a monitoring program, Android and ios can be used, and it can directly display the content of the other party's mobile phone in real time
-
Anonymous1711 Apr 29, 2025It's not so mysterious. It's just the password or backup A large company has a legal adviser, and the public security goes to adjust the data and asks you for a warrant. If it is a senior operation, it is hard to say. Just enter the database and drag it out. After all, it has internal authority
-
Anonymous1982 Apr 29, 2025So powerful
-
Anonymous2020 Apr 29, 2025Are A and B husband and wife? Maybe N years ago, B used a password to unlock A's mobile phone and take pictures to keep evidence. Regarding imessage in recent days, Settings-Apple ID-icloud-Message-Synchronization This iphone is in the "off" state, multiple iphones use the same icloud account, and multiple iphones can receive imessage in real time, because the imessage push itself supports multiple devices, not using icloud's synchronization mechanism. Settings-Apple ID, see how many devices Apple ID is logged in, and log out of phones that you don't control (especially spare phones). Otherwise, the permissions of the backup mobile phone are super large, and you can remotely see a lot of information about the main mobile phone.
-
Anonymous2020 Apr 29, 2025There is a forensic tool for iphone. Connecting the usb to the computer can completely export all the contents of the phone, but you need to enter the password of the phone before forensic export. imessage is peer-to-peer encrypted, Settings-Apple ID, see how many devices Apple ID is logged in.
-
Anonymous8041 Apr 29, 2025It's more like A's own mismanagement. For example, when AB contacts, B catches a glimpse of A's password and writes it down.
-
Anonymous8566 Apr 30, 2025@ Anonymous8041 This is the greatest possibility, husband and wife are originally birds in the same forest
-
Anonymous5836 Apr 30, 2025The network police can get these things, combined with B's identity, this possibility cannot be ruled out
-
Anonymous8567 Apr 30, 2025I seem to have seen someone selling this information on tg.
-
Anonymous3156 Apr 30, 2025iCloud in the United States, the only trusted devices are notebooks and mobile phones, and imessage enables advanced security. I think it should be fine except for artificial extraction of brain information. This one seems to have logged into the same icloud account, or B used his identity to retrieve the data. Enterprises cannot refuse to store domestic data when relevant departments access it according to law, which is written into laws and regulations.
-
Poster Apr 30, 2025Surprisingly, WeChat chat records are stored in plain text in the Public Security Bureau. As for the imessage you mentioned, you should first find out whether it is an imessage or an ordinary text message. imessages are sent to each other through Apple accounts. If it is an ordinary text message, it is the same as WeChat, and there is no privacy at all
-
Anonymous2696 Apr 30, 2025I have a digression, what is the relationship between a and b, and what is the relationship between you and a
-
Anonymous480 Apr 30, 20251. Backup after unlocking and then get the backup file, and the deleted chat record is also in the backup. 2. The internal authority is high enough to see it. Check the internal identity of the other party to judge it. 3. You can buy it with money. You have all the basic information for about 1,000 yuan. You can see more by adding money, and there is no cap.