|
Not directly...
If the iPhone has been configured for it - it's location can be tracked.
If the iPhone is configured to upload videos and photos to iCloud (or some other cloud storage system) they can be accessed on another device provided the name / password in known.
If the iPhone is using iMessage this can be accessed by another device (iPhone, iPad, iPod or Mac) that is logged into the same account.
No idea about the health data stuff.
In this present crisis, government is not the solution to our problem; government is the problem. ~ Ronald Reagan
|
|
|
|
|
Thanks. Roughly what I thought.
|
|
|
|
|
Your question matches just in time. Yesterday I recognized an unsecured WLan in my neiborhood, showing the router's providor
Ok, Google for the router Default user/pwd... and yes it works
Now I see there are three Units connected
1. a Windows phone
2. a Android
3. a PC
How should I go Forward to get some detailed Information?
It is not a joke, but I can feel with the "owners" of the Connection if you are not edjucated in this field!
Only to say: We should be allowed here at CP to discuss about "hacking". Knowledge is the only way for defense....
... because same can happen to me on an other Level...
modified 19-Jan-21 21:04pm.
|
|
|
|
|
0x01AA wrote: Only to say: We should be allowed here at CP to discuss about "hacking". Knowledge is the only way for defense.... It is allowed to discuss about it.
It is not allowed to explicitelly ask for or to show how to do it.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Nelek wrote: to show how to do it. Except for sql injection.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
mandatory[^]
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: It is allowed to discuss about it.
My experience here is: No it is not!
Quote: It is not allowed to explicitelly ask for or to show how to do it.
Q/A will be downvoted/removed if not exactly enough. How you will get some knowledge without explicitelly discuss about it?
[Edit]
If we can discuss this open and this includes also how to attack we can also discuss about how to defend!
Statements like "this is dangerous" Looks like "we don't know" anything about it! And this "we don't know anything/not really much" is I think the truth.
Why should we leave this field to the opponents?
...when copy paste here on CP still not works
modified 19-Jan-21 21:04pm.
|
|
|
|
|
In the latest boxing round with the mother of my children, she has accused me of accessing her phone remotely, and reported me to the police.
I completely sympathize with you, as this is something my ex would do as well. What the police could do is all going to depend on custody, but not placement; as well as the ages involved
Details are sketchy as I've only had her and a friend shouting abuse at me down the phone about it, but apparently I accessed her messages, her health data app and videos and pics.
I was actually cooking lasagne at the time and my current girlfriend is a witness to this. But my question is, is this even possible?trying to work out if it's a blatant lie or someone did and it's a case of mistaken identity. Don't want to google it for obvious reasons!
I suppose if you had access to her iTunes/iCloud account you could access the cloud saved data, and possibly lock/secure the phone.
FitBit, Facebook, and that would be separate accounts; however they could use the same credentials.
Director of Transmogrification Services
Shinobi of Query Language
Master of Yoda Conditional
|
|
|
|
|
I wonder if she has the iCloud enabled and maybe she or child did something on her macbook then it changed the phone. Someone at work enbled Parental controls and it changed all of his iDevices because iCloud syncs everything, so it seems.
|
|
|
|
|
If you don't know how it could be done, but you're being accused of doing it by someone who thinks you have the technical know-how, the last thing you should inquire about on a public forum is how it could be done.
|
|
|
|
|
I'm not enquiring how. I'm enquiring if it's possible.
Also I'm doing it after the event.
Thanks for your input anyway Sherlock
|
|
|
|
|
Pom Pey wrote: I'm not enquiring how.
But you can't pretend you wouldn't expect any response to lead to discussions on exactly how, even if it's just speculation. Or were you honestly expecting everybody to answer with a simple Yes/No and leave it at that?
Pom Pey wrote: I'm enquiring if it's possible.
Two words: The Fappening. Ultimately whether the data is stored on the phone itself or on something like iCloud - does it really make a difference here?
Pom Pey wrote: Also I'm doing it after the event.
Which is not relevant when you can feign ignorance.
Pom Pey wrote: Thanks for your input anyway Sherlock
You're welcomed, my dear Watson. Anything else I can help you with?
|
|
|
|
|
Yep a clear Statement you are also not know how to
modified 19-Jan-21 21:04pm.
|
|
|
|
|
Sounds like the phone wasn't hacked, but someone used her credentials to log in elsewhere.
That's a piece of piss, if you know the user name and password, but I believe that where you log in from is recorded (it is on android, a least, and I can't see it not being logged on itunes).
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Let's assume the phone was hacked or maybe someone logged in to whatever account iPhone uses. Wouldn't it tell you the IP and location?
I would be worried if police is involved because general consensus, I assume, is that they are not really that technology savvy.
"It is easy to decipher extraterrestrial signals after deciphering Javascript and VB6 themselves.", ISanti[ ^]
|
|
|
|
|
Sure, there are multiple ways to do it (remotely accessing the phone itself is one way, but it could be as simple as accessing her cloud data, for which one will just need to know her credentials).
Depending on whether or not the phone has been jailbroken, the phone itself could be controlled remotely, but I suppose that's not the accusation here?
Even if it were, given that you were actually cooking lasagna, the chances of someone proving you guilty of such an act, is anywhere between "haha lol" to "hell, no".
|
|
|
|
|
It may be difficult to prove, but having the police ask you all sorts of awkward questions is still not very pleasant.
The police and sanitation workers are both essential for modern life, but that does not mean I want either of them in my living room.
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Which would leave you suing for the legal expenses involved in not being found guilty. Getting back legal expenses is not so easy. If it's in criminal court, rather than civil, you're basically screwed.
The use of the courts to rack up expenses is a known way of harassment. Someone with enough money could impoverish you with lawsuits that just don't quite qualify as 'frivolous'.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
That's a very good point.
|
|
|
|
|
At work, working on work stuff: Argh, 3 more hours.
At home, working on a pet project: What, it's 10PM already???
Now granted, many of the things I've done at work over the years have been really interesting. This is not one of those times.
Marc
Latest Article - Create a Dockerized Python Fiddle Web App
Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny
Artificial intelligence is the only remedy for natural stupidity. - CDP1802
|
|
|
|
|
At work, fighting with ssrs 2014 since this morning. What is it, past lunch already?
The good news is that I think I have figured it out...won't know until SP2 is installed. It'd sure be nice if ssrs would work 'out of the box'. I'll be glad to actually get back to some development!
"Go forth into the source" - Neal Morse
|
|
|
|
|
I've added a daily event in Outlook to make sure I get out of work, and pick up the kids in time.
My boss was mightily amused first time he saw it. (no sarcasm)
|
|
|
|
|
Marc Clifton wrote: many of the things I've done at work over the years have been really interesting. This is not one of those times
Just don't let it get to you.
I'm the guy who couldn't wait for 5:00pm to come by so I would happily put in more hours evenings and weekends on my own pet projects than I would all week at work. Ultimately, the boring work stuff completely killed the motivation I had for my pet projects. The work's gotten more interesting again, but I can't be convinced to fire up a compiler outside work hours anymore. I still love to code--but I guess that's the risk when work and hobby intersect. I couldn't imagine working for myself.
|
|
|
|
|
dandy72 wrote: I couldn't imagine working for myself.
I love working as a remote contractor (the current gig is an on-site contract.) Even horribly boring work is mitigated by taking the laptop out on the porch or having a cat curled up on the lap.
Marc
Latest Article - Create a Dockerized Python Fiddle Web App
Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny
Artificial intelligence is the only remedy for natural stupidity. - CDP1802
|
|
|
|
|
I had a similar case. Work got so interesting that my pet project went over a year without any work on it.
Now I have started on it again and have decided to take a different direction with the client side, writing a WinForm client instead of fighting with web pages, leaps and bound of productivity instead of hours on Google figuring out weird sh*t, yay!
- I would love to change the world, but they won’t give me the source code.
|
|
|
|