<object class="wp-block-file__embed" data="https://timinhonolulu.files.wordpress.com/2023/04/20230426-19-supplementaal-motion-for-detention-attachment-a.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="20230426 (19) Supplementaal motion for detention <strong>Attachment A20230426 (19) Supplementaal motion for detention Attachment ADownload
In the #JackTeixeira classified information leak case, USA filed supp motion for detention incl evidence he’d been denied state firearm permits, searched for violent extremist files and made violent threats. Link to motion and Exhibits.

Chilling about spying
” https://discussions.apple.com/thread/254760317 ”
So you people think iPhones are more secure ? The lack of transparency combine with the power of technology makes it all but impossible to have a secure device.
Do people think that vendors are concern with security?
Please delete this after reading but notify the others in the resistence that their iPhones may not be secure!
There is an Exploit in the wild that can bypass iPhone security through an exploit that gives Admin rights over your phone through Apple MDM.
Found 1 keys in domain ‘com.apple.stockholm’: {
RemoteAdminV2 = 1;
}
ppleBCMWLANBusInterfacePCIe skywalk….
Skywalk showing up in logs
http://newosxbook.com/bonus/vol1ch16.html
The SkyWalk subsystem is an entirely undocumented networking subsystem in XNU. It provides the interconnection between other networking subsystems, such as bluetooth and user-mode tunnels. Although built-in to XNU, its source remains closed,
The mysterious Skywalk, and its nexus and channel objects. This is an entire subsystem which is not only undocumented, but intentionally left out of XNU’s public sources.
These are common to a JavaScript exploit used against a Bluetooth attack vector. They are usually installed with jsgreeter44 or 44CALIBER. These binaries are on github and used in the United States by USPIS.
The short range radio exploit comes from the NSO Group, an Israeli company.
You can tell by the integer sequencing and some other sources.
In short, this allows for the creation of an xpc bundle.
These are common to a JavaScript exploit used against a Bluetooth attack vector.
They are usually installed with jsgreeter44 or 44CALIBER. These binaries are on github and used in the United States by USPIS.
The short range radio exploit comes from the NSO Group, an Israeli company.
You can tell by the integer sequencing and some other sources.
In short, this allows for the creation of an xpc bundle.
Apple Security is aware of the issue