🌚🙏🏾Good evening everyone!! Today I want to talk to you about the security of your devices. A year ago, I started trading on the stock exchange due to a change of residence, I had to study a new profession, as I basically did. I was very attracted to futures trading in crypto, and I am quite good at it. In the first 3 weeks of futures trading, I managed to achieve 300% on a 20x leverage. Then I started noticing that the whole game was going against me as if on purpose, and then I noticed that my traffic was being stolen and they were trying to bankrupt me. As you all understand, my traffic was controlled by certain people. After 12 months of investigations, I identified ways you can be hacked, specifically traffic theft. I work with an iPhone 14 Pro.

1. I took my phone to the App Store in the Philippines, and they jailbroke it without my knowledge. This can be removed using the iTunes restore function.

2. Using exploits, a virus is inserted into your phone via the GSM signal. The solution is to close all applications and use a password during screen time. And install antivirus software.

3. They catch your mobile signal with an IMSI CATCHER.

4. Constantly monitor the calendar, disable iMessage, and remove events from photos. If you have applications installed that have a calendar, remember they can also be hijacked. Such applications as Gmail. In notifications, remove notifications from the calendar. And in calendar settings, allow only invitations by notifications. Use antivirus that takes control of the calendar.

5. Disable automatic software updates and everything related to it.

6. If you are using an iPhone, disable 'Content Update' in the settings for each application. If hackers are stalking you, they forge the security certificate of the application, and there is a small update with malicious code.

7. Electrical outlets. My advice is to never charge your device from a cable. The electrical panel is modified by an automatic controller from a Smart Home, and your phone is compromised while charging. They modify even the outgoing cable to you in the electrical panel. So, when you open your panel, you will see nothing. The solution is to reset network settings after each charge. A request to antivirus and gadget manufacturers to control the charging process.

8. Don't forget if you charge your phone via USB cable, remember one thing. The USB cable may contain information. If your gadget was infected, it infected the cable as well. When you remove the virus on the gadget, it goes back into the gadget through the cable during charging. My advice is to use wireless charging. The solution is to reset network settings after each charge. A request to antivirus and gadget manufacturers to control the charging process.

9. Occasionally asks for the phone password instead of Face ID. The hack occurs because: When you enter the password, control over the device passes into the hands of the villain. The same happens on Windows 11; after waking from sleep mode, a virus is activated. But Windows security does not allow connecting to the internet. Restart the device. You need to reset; otherwise, you are on a local network. All applications go through the local network, and all traffic is under control. Disable all notifications on your phone from all applications. They also pull into the calendar.

10. If you have caught a virus in the cache and cannot get rid of it. How to detect it? When on the IPv4 IP address, find a site to check your IP. If it says there is a proxy server without a VPN, you are being monitored by special services; this virus has already been detected with a journalist. How to fight? Manually authenticate in the cellular network with your operator and keep an eye on this. Work on the internet only through the IPv4 protocol. Also connect antivirus. Remember this virus modifies itself, and if it is not blocked, it updates itself.

11. Do not use Telegram; through it, villains upload spyware to the device. Telegram is a very powerful tool for hacking.

12. Do not connect your phone to a computer you are not sure about its reliability. Even if you use iTunes, a computer with a virus will introduce a virus into your phone through iTunes.

13. Exploit attack via GSM signal. SMS, even passes through 'You have received a call.' The essence of the exploit is this: It combines all applications into one network and controls the traffic - outgoing and incoming, and also blocks the capabilities of applications, including antivirus. Treatment on Android - reset the network and do not have a SIM card from where the exploit hits. On iPhone, I described this method with a reset of access through settings item #10. They can also hack the phone just through the SIM card even if you are roaming.

14. When you are in the Philippines and do not use a VPN, but you need to pay in Yuan for a subscription. That's already a question. And do they swim well in China?

15. If you are using an iPhone and it was purchased from an official store. Install a VPN on it to encrypt traffic. If the villains know where you live, they will not be able to hack your traffic using a top VPN.

16. Binance square, if hackers are stalking you. Do not open photos from posts. They also carry malicious code. An appeal to the exchange management. Make it safe. Even just opening a post and commenting on it. The exploit gets inserted into Binance. Immediately clear the app cache. Otherwise, it won't save you from the exploit.

17. There is one antivirus. I've been using it for just under a month; the results are great. I will give the name later. But unfortunately, for more effective operation, the application must be kept open constantly. All the best, guys!!

18. This is the last stage from which I got rid of a few hours ago. Here in the application settings, there is an option to clear the cache. In just a few hours of work, it became 560 megabytes. Hackers insert settings with exploits, and the application itself retransmits traffic data. Also, do network testing.

19. If you are on WiFi, set the DNS. If you have money, I recommend Cisco. If not, then quad9.

20. Do not buy phones from unofficial sources!!! These are fakes; you pay insane amounts just for the imitation of a great brand. The Face ID has been hacked; the hardware module has been installed. When you log into your phone using Face ID, the villains gain access to all accounts where you have Face ID set. I have never opened my phone. If necessary, I will gladly give it to the FBI for analysis and contact with its manufacturer.

21. In the notes, turn off everything and the item connection with the calendar

22. Disable all functions and blitz applications in Siri.

23. Do not use email applications. Emails come, and even if they are not opened, they introduce a Trojan into the phone.

24. If you are using Google Authenticator, remember you should also log out of your account there. Otherwise, you will be invited via the calendar. This applies to all applications where you are logged in to an account that has this calendar.

25. To summarize how this virus works. I will tell you how I am personally hacked on iPhone and Windows 11. My neighbor jams my connection, and I have no mobile connection on my mobile. I have to open a hotspot on my second Android phone and connect through it. They intentionally lead me to sit through WiFi; this is the essence of the hack. When I connect to WiFi, I am effectively connecting to a local network. The villain captures outgoing communication on Honor via imci catcher on his computer; he already accesses iTunes under my account. And using iTunes, he synchronizes the calendar with mine on iPhone; when you get a prompt on iPhone to enter the password manually, at that moment, a connection with the villain occurs. Also, on Windows 11, if I install Outlook, I log into my gmail.com email account, the hacker also breaks the calendar through Gmail. The solution on iPhone: Be sure to disable VPN, close everything in the calendar even if you see nothing. Disconnect from the network and change the passcode, and don't forget to invalidate the old passcode because when you entered the code on the phone, the villain already gained access to the phone using this password. Of course, this calendar situation is chaotic. And no antivirus helps with this, even the one that controls the calendar.

A weakness was identified in the iPhone - in the background mode, when notifications from any application come, this application is captured by a virus, and the traffic of this application goes under control. Disable notifications.

How did you overcome the problem with the calendar? Remember, through the calendar, using malicious code, your connections were infected, and after every restart of the phone. Update the WiFi network and reinstall the VPN profile.

I have been hacked for about 2 years. They use newer and newer methods. I constantly update this information. It's not even military, but demons in uniforms. They await a fate worthy of them.

From my experience, I use antivirus software, as APPLE's security is not enough (Norton, Avast - GEN-SYMANTEC corporation). I DO NOT RECOMMEND USING THEM AS THEY ARE SPYWARE, they enter and create a local network and redirect traffic to themselves. I recommend VPN NORDVPN... The most reliable protocol OPENVPN TCP/IP. For now, I seem to have escaped from them. But we remain vigilant.

Wishing everyone safe work!! 👽🛸

#BTC #BNB #Bitcoin $BTC $BNB