1 pointby aurelianware12 hours ago1 comment
  • aurelianware12 hours ago
    Author here. On January 26th at 4:24 AM, I discovered my iPhone was compromised at the carrier level. UDP was blocked, forcing my VPN to TCP. Location APIs were rate-limited. My phone hopped between 4 VPN servers in 7 minutes.

    Three commercial security tools ($120/year total) completely missed it.

    So I spent 6 weeks building PrivaseeAI.Security - an open-source iOS threat detection system with:

    • 9,879 lines of Python code • 196 tests (100% passing) • 4 concurrent monitors (VPN integrity, API abuse, carrier compromise, cert validation) • Real-time Telegram alerts • 100% local processing (no cloud, ever)

    Every detection rule is based on the actual attack logs from my phone. Not theoretical - battle-tested.

    The code is Apache 2.0 licensed and available here: https://github.com/aurelianware/PrivaseeAI.Security

    We're seeking beta testers with different iPhone models, iOS versions, and carriers: https://github.com/aurelianware/PrivaseeAI.Security/discussi...

    Happy to answer any questions about the attack, the detection techniques, or the architecture.