Exploit was via Apple's own iMessage app, as a non-clickable received message.
This installed a whole surveillance platform 'Triangulation' on the phone.
This exploit has been in the wild at least since 2019, so it's a long game.
Leads point to NSA.
You can check whether your iPhone is infected (up to some version of Triangulation , at any rate) by using the free python script from Kaspersky to check your iOS back up file (the only way to forensically analyze the contents of your iPhone for mere mortals):
Mobile phones have been for decades now fundamental tools for work. Depending on what you do for a living not having one is a show stopper. That's why I suggested in the title getting a degoogled phone so you can reap the benefits without the enslavement downside. But just having such phone is not a replacement for good opsec.
Given that your old boss paid for your work and your phone subscription it was his right to track your progress during business hours. But we're not talking about lawful tracking here. What we should avoid is unlawful tracking performed by three letter agencies, big tech and ad tech.
With the spy tech thats out and whats yet to come or we dont know thats out that they have, why would we assume any type of phone would have privacy? If they want information and ur on the internet, it is available to them
Also Network Chuck has good videos on securing home networks and running virtual machines and other newbie stuff for us non-nerds trying to learn enough to stay relatively safe on the interwebs and on networks.
Exploit was via Apple's own iMessage app, as a non-clickable received message.
This installed a whole surveillance platform 'Triangulation' on the phone.
This exploit has been in the wild at least since 2019, so it's a long game.
Leads point to NSA.
You can check whether your iPhone is infected (up to some version of Triangulation , at any rate) by using the free python script from Kaspersky to check your iOS back up file (the only way to forensically analyze the contents of your iPhone for mere mortals):
https://github.com/KasperskyLab/triangle_check
How about throw your sim card away and stop paying for your own enslavement?
Mobile phones have been for decades now fundamental tools for work. Depending on what you do for a living not having one is a show stopper. That's why I suggested in the title getting a degoogled phone so you can reap the benefits without the enslavement downside. But just having such phone is not a replacement for good opsec.
Some people work for themselves with no master.
Skype can dial any phone number.
But i appreciate your point.
That's a palliative solution. It means you were tracked only on business hours.
Well, he's probably also segregating work related communication with non-work related communication.
If they are spying on that phone, they're only spying on how many toilet leaks the guy fixed.
Given that your old boss paid for your work and your phone subscription it was his right to track your progress during business hours. But we're not talking about lawful tracking here. What we should avoid is unlawful tracking performed by three letter agencies, big tech and ad tech.
With the spy tech thats out and whats yet to come or we dont know thats out that they have, why would we assume any type of phone would have privacy? If they want information and ur on the internet, it is available to them
Check out Rob Braxman. He has videos on Odysee and youtube. https://odysee.com/@RobBraxmanTech:6
Also Network Chuck has good videos on securing home networks and running virtual machines and other newbie stuff for us non-nerds trying to learn enough to stay relatively safe on the interwebs and on networks.