I’ve on quite a few events discovered my Bluetooth switched on once I have not achieved this. I by no means use BT. I perceive the distinction between the Management Panel setting (lasts a day) vs the Basic Setting, correctly off. I do know it can’t be on account of an ioS replace, as I manually replace & this has occurred while I’ve nonetheless but to replace & the replace notification setting continues to be seen.
Extra just lately I’ve turn out to be conscious of it being on when a sure individual comes close by. This week I occurred to have the Basic Settings open infront of me once I noticed it swap on (with out me touching it!) & he had come into the room. I can solely presume this was to facilitate stealing my recordsdata (thank absolutely only a few) & probably malware data recordsdata.
How do I disable BT completely to stop a hacker from utilizing it?
e.g. I’ve been capable of disable the BT adapter on my Home windows laptop computer through the Machine Supervisor. Is there an equal for iPhone?
Would they nonetheless be capable of entry the BT on this approach even when my iPhone is
– on standby?
– powereddown?
How can I make my iPhone undetectable?
There does not appear to be a selection in Basic settings > Bluetooth
How do I catch a bluesnarfer within the act?
Is there any approach of getting an ‘intruder alert’ which detects details about the machine (cellphone make, Mac addr, IP and many others)
And in addition what recordsdata taken?
Home windows printers typically have a ‘print job’ queue to be considered on reflection.
Would this solely be accessible on an iPhone after a digital forensics obtain?
I’ve additionally been questioning how this individual might need downloaded malware onto my iphone (he might not, however it’s doable). I had just lately erased all information & settings which I presume would have worn out any earlier malware, & additionally any information log recordsdata (please appropriate me if I’m fallacious about this).
I then had a considerably distorted dialog with him (which aroused my suspicions earlier than any technical points) & he had given me his web site which I duly regarded up on my iPhone (after the complete erase). I used to be additional suspicious because it did not appear to realize a lot – it simply appeared prefer it was there for a bit of data (^& he had beforehand instructed me he acquired enterprise by phrase of mouth, so the web site appeared superfluous except it was to only get me to click on on it.
So I questioned if one thing may have been downloaded on account of me simply viewing the web site (I did not truly select to obtain something). I’ve just lately learn one other put up about canary tokens so unsure if he was utilizing one with me, or whether or not I may use this someway.
Any recommendations gratefully obtained!