🌚🙏🏾Good evening everyone!! Today I want to talk to you about the security of your devices. A year ago, I started trading on the stock exchange due to a change of residence; I had to learn a new profession, which I did. I was very attracted to trading futures in crypto, and I do quite well at it. In the first 3 weeks of trading futures, I achieved up to 300% on a 20x leverage. Then I began to notice that the whole game was going against me as if it were intentional, and I realized that my traffic was being stolen and attempts were being made to bankrupt me. As you all understand, some people were controlling my traffic. After 8 months of investigations, I identified such methods of how you can be hacked, namely, through traffic theft. I work with an iPhone 14 Pro.

1. I took my phone to the App Store in the Philippines, and they installed a jailbreak on it without my knowledge. This can be removed using the iTunes restore function.

2. With the help of exploits, a virus is introduced to your phone via the GSM signal. The solution is to close all applications and set a password during screen time. And install antivirus software.

3. They catch your cellular signal with an IMSI CATCHER, and if you have a VPN on your devices, and hackers have done what I mentioned above to your device. Do not even think about the help of a VPN. To get away from this problem, you need to eliminate the previously described issues.

4. Constantly monitor the calendar, disable iMessage, and remove events from photos.

5. Disable automatic software updates and anything related to it.

6. If you use an iPhone, disable 'Content Update' in the settings for each application. If hackers are stalking you, they counterfeit the security certificate of the app, and a small update with malicious code occurs.

7. Electrical outlets. My advice is never to charge your device from a cable. The electrical panel is modified by a controller from a Smart Home, and your phone is compromised while charging. They even modify the cable going to you in the electrical panel. Therefore, if you open your panel, you will see nothing.

8. Don't forget if you charge your phone via USB cable, remember one thing. The USB cable may contain information. If your gadget has been infected, the cable is also infected. When you remove the virus from the gadget, it re-enters the gadget via the cable during charging. My advice is to use wireless charging.

9. Occasionally, when unlocking the phone, it asks for the phone password instead of Face ID. The hack occurs due to: spyware being introduced into the phone cache, and when you enter the password, control over the phone is handed over to a device nearby, and the password for your Apple ID is hacked. Villains access your Apple ID through a Mac, install a video replay app on their Mac, and at the moment you enter the passcode for your phone, you inadvertently grant access to this app, and your screen is viewed. For example, by a neighbor. Through the HOME app, they connect Binance to the TV and sniff the Binance screen. SOLUTION - never delete the HOME app. Set synchronization with iCloud. Go to security and perform an emergency reset (do this with the VPN turned off; otherwise, you won't reset). My advice: clean the cache; look for instructions on YouTube on 'how to clear cache by changing dates.' NEVER do a hard reset of your device. When resetting, the exploit reappears in the cache. REQUEST - developers at APPLE, please fix this. Implement a manual cache reset. Or at least control over the cache. ALSO, pay attention to Safari; make sure to set security permissions. First, they hack the browser, and then as I described above.

10. Do not use Telegram; through it, villains upload spyware to the device. Telegram is a very powerful tool for hacking.

11. Do not connect your phone to a computer that you are not sure of its reliability. Even if you use iTunes, a computer with a virus will transfer the virus to your phone via iTunes.

12. This is the last step that I got rid of a couple of hours ago. In the app settings, there is a clear cache option. Mine had become 560 megabytes in just a couple of hours of work. Hackers use exploits to introduce settings, and the app itself retransmits traffic data. Also, conduct network testing.

I have been hacked for about 2 years. They use newer and newer methods. I constantly update this information.

In my experience, I do not use antivirus; Apple has enough of its own security (Norton, Avast - Symantec Corporation). I DO NOT RECOMMEND USING IT, AND IT HAS SPYWARE; they infiltrate and create a local network and divert traffic to their side) I recommend NORDVPN VPN. The most reliable protocol is OPENVPN TCP/IP. So far, it seems I’ve gotten away from them. But we are keeping our ears open.

Wishing everyone safe work!! 👽🛸

#BTC #BNB #Bitcoin $BTC $BNB