OPERATIONAL
ZERO RETENTION

Know If Your iPhone Has
Been Compromised

Upload a sysdiagnose. Get evidence you can verify yourself — not a trust-us verdict. No account. No subscription. Your data never leaves the analysis window.

Free
No account needed
Private
Zero data retention
Proof
Evidence you can verify
b2b-forensic-engine
CRITICAL

Your messages are NOT encrypted

[PCStatus] encryption certificate missing — texts can be intercepted

Scroll to explore
How It Works

What We Check For

We analyze the diagnostic files your iPhone already collects. These files contain evidence of what apps have access to, network activity, and whether anything has been tampered with.

Timing Integrity

Checks if boot records and timestamps are consistent — manipulation here can indicate forensic tampering

Boot historyTimestamp consistencyEvidence of tampering

App Permissions

Shows which apps have access to your microphone, camera, location, and contacts

Microphone accessCamera accessLocation accessContacts access

Network Activity

Reveals which apps are sending data over the network and how much

Data usage by appBackground activityUnusual traffic

Network Connections

Lists IP addresses and domains your phone has connected to

Active connectionsUnknown serversCellular vs WiFi

App-Website Links

Shows which websites are associated with which apps — can reveal hidden connections

Domain associationsRelay serversUnusual registrations

Device History

Tracks device activations and certificate events — useful for detecting unauthorized resets

Activation eventsCertificate changesReset history

Message Encryption

Checks if iMessage end-to-end encryption is enabled — if disabled without your knowledge, your texts may not be private

iMessage encryptionIdentity certificatesKey status
Process

From Upload to Evidence

No account required. No ongoing subscription. Upload, analyze, get answers.

01

Export Backup

Create a standard backup using your device's built-in tools. We provide step-by-step guides.

iOS sysdiagnose archives

02

Secure Upload

Transfer over encrypted connection. We compute SHA-256 hash before any analysis begins.

Hash verification for chain of custody

03

Deep Analysis

Automated scan across 8 artifact families. No human ever sees your data.

16 deterministic checks

04

Evidence Report

See exactly what was found with file paths, evidence snippets, and clear explanations.

Plain English + technical details

Transparency

Evidence You Can See

Other tools give you a green checkmark or red warning. We show you the actual artifacts — file paths, configuration data, timestamps. Evidence you can verify yourself.

  • Exact file paths where threats were found
  • Raw evidence snippets you can inspect
  • SHA-256 hashes for integrity verification
  • Plain English explanations alongside technical details
Timing Infrastructure Manipulation
CRITICAL

Why this matters

The timesync and Info.plist files are written by different iOS subsystems. Zero UUID overlap means they reference completely different boot sessions — they cannot both be authentic.

Evidence

[timesync/0000000000000003.timesync]
Boot records: 138
UUID overlap with Info.plist: 0 (0.0%)
Expected timebase: 41.667 ns
Derived timebase: 41.667 ns (valid)
Finding IDF-030
Comparison

Not Another Black Box

Other security tools hide behind vague reassurances. We believe you deserve to see what we see.

Other Tools
Back2Baseline
Trust our score
See the actual evidence
Proprietary detection
Transparent methodology
Generic alerts
Specific file paths + proof
Monthly subscription
Pay per scan
Your data stored
Zero retention policy
Free analysis, no account required

Find Out for Yourself

Whether it's a work phone you don't fully trust, a device that's been acting strange, or you just want to know for sure — get answers in minutes.

Analyze Archive

Free tier shows top findings. Full report with forensic documentation available.