Know If Your iPhone Has
Been Compromised
Upload a sysdiagnose. Get evidence you can verify yourself — not a trust-us verdict. No account. No subscription. Your data never leaves the analysis window.
Your messages are NOT encrypted
[PCStatus] encryption certificate missing — texts can be intercepted
What We Check For
We analyze the diagnostic files your iPhone already collects. These files contain evidence of what apps have access to, network activity, and whether anything has been tampered with.
Timing Integrity
Checks if boot records and timestamps are consistent — manipulation here can indicate forensic tampering
App Permissions
Shows which apps have access to your microphone, camera, location, and contacts
Network Activity
Reveals which apps are sending data over the network and how much
Network Connections
Lists IP addresses and domains your phone has connected to
App-Website Links
Shows which websites are associated with which apps — can reveal hidden connections
Device History
Tracks device activations and certificate events — useful for detecting unauthorized resets
Message Encryption
Checks if iMessage end-to-end encryption is enabled — if disabled without your knowledge, your texts may not be private
From Upload to Evidence
No account required. No ongoing subscription. Upload, analyze, get answers.
Export Backup
Create a standard backup using your device's built-in tools. We provide step-by-step guides.
iOS sysdiagnose archives
Secure Upload
Transfer over encrypted connection. We compute SHA-256 hash before any analysis begins.
Hash verification for chain of custody
Deep Analysis
Automated scan across 8 artifact families. No human ever sees your data.
16 deterministic checks
Evidence Report
See exactly what was found with file paths, evidence snippets, and clear explanations.
Plain English + technical details
Evidence You Can See
Other tools give you a green checkmark or red warning. We show you the actual artifacts — file paths, configuration data, timestamps. Evidence you can verify yourself.
- Exact file paths where threats were found
- Raw evidence snippets you can inspect
- SHA-256 hashes for integrity verification
- Plain English explanations alongside technical details
Why this matters
The timesync and Info.plist files are written by different iOS subsystems. Zero UUID overlap means they reference completely different boot sessions — they cannot both be authentic.
Evidence
Boot records: 138 UUID overlap with Info.plist: 0 (0.0%) Expected timebase: 41.667 ns Derived timebase: 41.667 ns (valid)
Not Another Black Box
Other security tools hide behind vague reassurances. We believe you deserve to see what we see.
Find Out for Yourself
Whether it's a work phone you don't fully trust, a device that's been acting strange, or you just want to know for sure — get answers in minutes.
Analyze ArchiveFree tier shows top findings. Full report with forensic documentation available.