β Back to Overview
π± Device Analysis Tools
2.1 Security Check
Services: DeviceSecurityCheckerService, PrivacyLeakDetectorService, ThreatIntelligenceService
What it does: Consolidated security check combining device security, privacy leaks, and threat intelligence in one view. Scans automatically on startup and supports pull-to-refresh.
Jailbreak Detection (Comprehensive)
- 40+ known jailbreak files and folders (Cydia, Sileo, Zebra, Unc0ver, checkra1n, etc.)
- Symbolic links (common in jailbroken devices)
- Write access to system folders (should fail on normal devices)
- Jailbreak URL schemes (cydia://, sileo://, zbra://, filza://, activator://)
- Suspicious environment variables (DYLD_INSERT_LIBRARIES, MobileSubstrate)
- Access to restricted paths
- Suspicious dylibs in app bundle (substrate, substitute, cycript, frida)
Passcode & Biometrics
- Passcode enabled (
LAContext.canEvaluatePolicy)
- Face ID / Touch ID / Optic ID available and enabled
- Biometric type identification
Additional Checks
- Proxy configuration (HTTP/HTTPS/SOCKS/PAC)
- Developer mode and debugger detection
- Disk encryption and Data Protection status
- Network status (WiFi/Cellular/Ethernet)
- Privacy leaks with severity levels
- Threat intelligence and security alerts
Security Score: 0-100 based on number of passed/failed checks.
2.2 Bluetooth Scanner
Service: BluetoothDiscoveryService
What it does: Discovers Bluetooth devices nearby with advanced device classification, tracker detection, and ability to monitor any device to see if it's following you.
Technical Implementation
- Uses
CoreBluetooth (CBCentralManager)
- Embedded database with 170+ verified Bluetooth SIG Company IDs
- Smart tracker detection with service UUID verification
- 50+ device categories for classification
- Apple-specific device identification (iPhone, iPad, Mac, AirPods, etc.)
- Find My tracking capability detection for AirPods and Beats products
Device Classification
- Phones, tablets, computers
- Smartwatches and fitness trackers (Polar, Garmin, Suunto, etc.)
- Headphones, earbuds, speakers
- TVs and entertainment equipment
- Gaming controllers (Nintendo, PlayStation, Xbox)
- Smart home devices
- Medical equipment (Dexcom, Omron)
- Vehicles and accessories
Trackers Detected
- Apple AirTag / Find My (0x004C + service UUID 7DFC9000/FD6F)
- Unpaired AirTags (setup mode, payload patterns)
- Samsung SmartTag/SmartTag+ (requires FD5A/FD69 service UUID)
- Tile (FEED, C001 service UUIDs)
- Chipolo (FE33 service UUID)
- Pebblebee (FEE7 service UUID)
- Eufy SmartTrack (FDB2)
- Cube Tracker (FE61)
- Moto Tag, Huawei Tag, Baseus (FE2C Google Fast Pair)
- Nut Find (FFE0, FFE5)
Find My Tracking Capability
- AirPods (all generations)
- AirPods Pro / AirPods Max
- Beats Studio / Beats Flex / Beats Solo / Powerbeats / Beats Fit Pro
- Apple Watch
- Shows "Has Find My tracking" badge in UI
Manufacturers Identified (170+)
Tech: Apple, Samsung, Google, Microsoft, Intel, Qualcomm, Broadcom
Audio: Bose, Beats, Sonos, JBL, Sennheiser, Bang & Olufsen, Jabra, Audio-Technica
Fitness: Garmin, Fitbit, Polar Electro Oy, Suunto Oy, Huawei
Gaming: Nintendo, Sony Interactive Entertainment, Microsoft (Xbox), Razer, Logitech
Smart Home: Philips, LG, Panasonic, TCL, Sharp
Medical: Dexcom, Omron Healthcare
Trackers: Tile, Chipolo, Pebblebee, Anker/Eufy, Rolling Square
Monitor Device (Following Detection)
- Can monitor ANY Bluetooth device (not just trackers)
- RSSI tracking over time
- GPS location correlation
- Signal stability analysis
- Following detection with scoring system
- Uses existing
TrackerMonitoringService
Device History & Tracking Detection
- Device History Tracking β Stores last 5 sightings per device with location
- Following Detection β Detects if a device is following you across locations
- UUID Rotation Detection β Fingerprinting to identify devices that change their UUID
- Whitelist ("Mark as Mine") β Ignore your own devices in tracking analysis
- Location History Map β View where a device has been seen on a map
- GPS Fallback β Uses last known location if GPS is unavailable
2.3 Tracker Monitoring
Service: TrackerMonitoringService
What it does: Monitors Bluetooth devices over time to detect if they're following you. Can be used on ANY Bluetooth device, not just known trackers.
Technical Implementation
- Continuous RSSI measurement with timestamps
- GPS location correlation via
CLLocationManager
- Signal stability analysis with moving average
- Following detection with scoring system
- Oversensitivity protection (averaging over multiple measurements)
Following Detection Algorithm
- Tracks RSSI values over time
- Correlates with user's GPS movement
- Calculates "following score" based on:
- Consistent signal strength over distance
- Device seen at multiple locations
- Time correlation between sightings
- Signal stability (stable = following, variable = random)
Locate Device Feature
- Real-time RSSI-based distance estimation
- Visual proximity indicator (closer = stronger signal)
- Audio feedback option for hands-free locating
- Works with any Bluetooth device
What is Checked
- Devices seen at multiple locations
- Time correlation between sightings
- Movement pattern analysis
- RSSI stability over time
- Distance vs signal strength correlation
2.4 Clipboard Monitor
Service: ClipboardMonitoringService
What it does: Inspects your clipboard contents and detects sensitive data that could be exposed to other apps. Any app on your device can read the clipboard without permission β this tool shows you exactly what's at risk.
Sensitive Data Detection
- Passwords (8+ character strings with mixed letters and numbers)
- Credit card numbers (16-digit patterns with optional separators)
- Email addresses
- Phone numbers
- URLs and website links
- Images and screenshots
What Apps Can See
- Everything you copy β text, images, links, documents
- Passwords copied from password managers
- Credit card numbers and banking details
- When and how often you use the clipboard
- Apps can read clipboard in the background without notification
- No permission is required to read clipboard contents
Privacy Risks
- Apps can read clipboard WITHOUT any permission prompt
- Clipboard persists across app switches
- Sensitive data remains after pasting
- Universal Clipboard syncs across all your Apple devices
- Malicious apps can steal credentials from clipboard
One-Tap Clear
Clear your clipboard instantly to remove sensitive data. The app also provides protection tips including using auto-fill instead of copy-paste for passwords, and disabling Universal Clipboard when not needed.
2.5 Device Info
Service: DeviceInfoService
What it does: Shows device information and fingerprinting data.
What is Displayed
- Device model and iOS version
- Screen size and resolution
- Language and region
- Timezone
- Network status
2.6 HomeKit Inventory
Service: HomeKitDataService
What it does: Shows what smart home data apps with HomeKit access can see on your device.
What is Displayed
- Connected HomeKit homes and rooms
- Accessories and their types (lights, sensors, locks, cameras)
- Accessory manufacturers and models
- Room assignments and zones
- Service types exposed by each accessory
Privacy Education
- Shows how much an app with HomeKit access can learn about your home
- Highlights sensitive accessories (locks, cameras, sensors)
- Recommendations for managing HomeKit permissions
π‘ Privacy Reminder: Apps with HomeKit access can see your entire smart home setup β room names, device types, and configurations. Be selective about which apps you grant this permission to.
2.7 Speech Transcription
Services: SpeechTranscriptionService, SensitiveInfoDetector, TranscriptStorageService, AdaptiveLMSFilter
What it does: Real-time speech-to-text transcription with sensitive data detection and noise reduction.
Technical Implementation
AVAudioEngine for audio capture
SFSpeechRecognizer for on-device transcription
- Adaptive LMS Filter β 64-tap FIR filter (~2.9ms at 22kHz) for background noise cancellation
- Voice Enhancement EQ β 6-band parametric equaliser (80Hz, 220Hz, 700Hz, 1kHz, 2.8kHz, 8kHz)
- Sensitive data detection with regex patterns
- Local storage with export options
Audio Processing
- LMS Noise Reduction: Adaptive 64-tap FIR filter (~2.9ms at 22kHz) that learns and removes background noise in real-time
- Voice Enhancement EQ: 6-band parametric equaliser targeting speech clarity at 80Hz, 220Hz, 700Hz, 1kHz, 2.8kHz, and 8kHz
- Combined Mode: EQ and LMS can run simultaneously β processing order is EQ first, then LMS noise reduction
- SNR Calculation: Signal-to-noise ratio displayed in real-time
Sensitive Data Detection
- Credit card numbers
- National ID numbers (Norwegian fΓΈdselsnummer)
- Email addresses
- Phone numbers
- Passwords mentioned in speech
Export Formats
- Plain text (.txt)
- Markdown (.md)
- PDF document
- JSON with metadata
2.8 Meeting Transcription
Services: MeetingMinutesService, TranscriptExportService
What it does: Record and transcribe meetings with automatic meeting minutes generation.
Features
- Real-time transcription during meetings
- Animated audio waveform visualisation
- Meeting metadata (title, participants, location)
- Recording modes: Standard, Meeting, Interview, Lecture
- Keep screen on during recording
Meeting Minutes Generation
- Summary: Automatic meeting summary
- Key Points: Important topics discussed
- Decisions: Decisions made during meeting
- Action Items: Tasks with priority and assignee
Export Options
- PDF document with formatting
- Markdown for documentation
- Plain text
- Share via system share sheet
π‘ Privacy Reminder: This feature demonstrates what's possible when an app has microphone access. It's a practical tool, but also a reminder to be mindful of which apps you grant this permission to.
2.9 Keyboard Extension Detection
Service: KeyboardExtensionService
What it does: Detects installed third-party keyboards and educates you about the severe privacy risks they pose. A keyboard with "Full Access" enabled can capture every single keystroke you type.
What is Detected
- All installed keyboards (system and third-party)
- Third-party keyboard identification via bundle identifier
- Full Access status for each keyboard
- Active input modes and languages
What Keyboards Can Capture
- Every keystroke you type β passwords, PINs, credit card numbers
- Private messages, emails, and search queries
- Banking credentials and account numbers
- Typing speed, behaviour patterns, and timing
- Context of what you're typing (which app you're in)
- Can send all captured data to remote servers
Privacy Risks
- Keyboards with "Full Access" can transmit everything you type
- Keyboard can log passwords even from secure password fields
- Keyboard can access clipboard contents
- Free keyboards often monetise by selling typing data
- Keyboard company data breaches expose all your typed data
Protection Tips
- Use Apple's system keyboard for maximum privacy
- Never enable "Full Access" for third-party keyboards
- Remove keyboards you don't actively use
- Switch to system keyboard for banking and sensitive apps
2.10 Advertising & Tracking Identifiers
Service: AdvertisingTrackingService
What it does: Shows your device's real advertising identifiers (IDFA and IDFV) and App Tracking Transparency status. Explains exactly what advertisers can learn about you based on your current tracking settings.
Identifiers Displayed
- IDFA (Identifier for Advertisers) β The unique ID advertisers use to track you across apps
- IDFV (Identifier for Vendor) β Per-developer identifier that persists across their apps
- IDFA status: available, zeroed out (protected), or restricted
- App Tracking Transparency (ATT) authorisation status
Tracking Status
- Authorised: Apps can track you across other apps and websites, build detailed advertising profiles, and link your activity across services
- Denied: IDFA is zeroed out, cross-app tracking is blocked, advertisers cannot build a profile
- Restricted: Tracking disabled at system level (parental controls or device management)
- Not Determined: Permission not yet requested β you can trigger the ATT prompt from within the app
What Advertisers Can Track (When Authorised)
- Which apps you use and how often
- How long you spend in each app
- Your in-app purchases and spending habits
- Your interests, demographics, and lifestyle
- Your location combined with app usage
- Activity linked across different apps and websites
Device Fingerprint Data
- Device model, system version, and screen resolution
- Timezone, language, and region settings
- Screen scale factor