![]() ![]() ![]() ![]() |
|
maclongshanks: @SpartanVXL
Thank you :)πΎππ½
snj has commented this on the first page of the thread:
'The Mail app checking accounts will obviously ping the servers regularly, which would mean connecting IP would show in logs.
This turned out unintentionally handy when my dad's iPad got stolen from hospital when he was dying, it checked in just before Find My locked it, so was able to give the police that info in addition to everything else.'
Does that show any location data?
(and if it does, can we stop that from being accessed by another person?) πΎππ½
Again, Apple keeps the Mail app logs, and It does not share them with any private person.
Emails might contain a "beacon," an invisible image hosted by someone. When that image is loaded, the server logs the IP address (not location).
Pretty much everyone in tech uses beacons. Marketing companies use them to see if an email is opened and to determine whether an investment in a campaign is worthwhile.
The Mail App itself is not the problem.
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
maclongshanks: @SpartanVXL
That's right. Because............ that's what we need to know.
So everything others say is always 100% true and correct is it?
DO NOT CHECK ANYTHING.
Right π
Seriously, and to the others who have also done this, if you have a problem with people asking questions and getting information just scroll on.
No one is making you read or comment on anything.
Your problem with normal communication is not my problem. I don't need to hear it.
Something for you to think about. When i type "can i be tracked on my iphone" this Geekzone thread is high on 2nd page of results. Add NZ to the search query and the Geekzone thread is 1st result. If i had a similar problem outside my understanding i think id approach somebody like Netsafe rather than potentially advertise on an open forum.
I agree with the other respondents that the simple solutions already provided (make sure no Life360 or similar apps installed, double-check location permissions, sign out of other devices etc) would end the possibility of tracking in basically every standard scenario.
The reason I'm commenting, is that although I'm definitely not saying it is the case in this instance, this topic reminds me strongly of the time a relative contacted me because I was "tech-savvy" and they were concerned that their partner (who had some IT knowledge) was tracking/spying on their phone. I gave similar responses to this topic, giving solutions from the easy-to-accomplish right up to resetting their phone or obtaining a new one and not reusing accounts or numbers, but nothing I suggested seemed enough for them to be convinced it would work. Turns out they had developed schizophrenia, and no suggested solutions would put their mind at ease.
I suppose it is just a reflection of the fact that when technology is seen as a non-understandable multi-functional "magic box", it can be very difficult for non tech-literate people to distinguish between what can be easily accomplished and what are extremely unlikely edge-cases. Almost every civilian case of phone tracking/spying is accomplished by simply installing an app or enabling location sharing and not advanced NCIS-style hacking, but many people don't have the awareness of just how much more unlikely the second option is.
maclongshanks:
The words of people are not verified facts. Every comment in this thread - and anywhere - is not a verified fact until it's been verified.
You can't tell people to accept what is said because other people have said it.
It becomes a verified fact when someone provides a link to the manufacturer's documentation. This has been posted twice in this thread, and it's not clear whether you have read it.
Fundamentally this isn't a technology problem - it's a social engineering problem whereby a bad actor is manipulating you into believing they can do something to harm you. The best thing you can do is to cut off all communication with them as they are clearly causing you a lot of anxiety.
maclongshanks: We had a person say here that they were able to give data from the Mail app to the police that helped find their family member's iPad when it was stolen.
Obviously I had to find out how that works, if it was useful enough to find their iPad.
Just so you realise that data given to the Police would have been used by them with a search warrant. It would have been useless to someone without those powers.
|
![]() ![]() ![]() ![]() |