Ther'es technologies out there that allows others to remotely access your computer, everything you type in and all your files.
same thing with ipHONE.
Let's say you suspected someone SPECIFIC not a group agoing after mass amounts of people/comptuers ,etc
but let's say someone specific that didn't like you. and you had reason to suspect they were accessing your phone somehow.
how in the hell would you even know?
same thing with ipHONE.
Let's say you suspected someone SPECIFIC not a group agoing after mass amounts of people/comptuers ,etc
but let's say someone specific that didn't like you. and you had reason to suspect they were accessing your phone somehow.
how in the hell would you even know?
could be a virus too.