Author here. On January 26th at 4:24 AM, I discovered my iPhone was compromised at the carrier level. UDP was blocked, forcing my VPN to TCP. Location APIs were rate-limited. My phone hopped between 4 VPN servers in 7 minutes.
Three commercial security tools ($120/year total) completely missed it.
So I spent 6 weeks building PrivaseeAI.Security - an open-source iOS threat detection system with:
• 9,879 lines of Python code
• 196 tests (100% passing)
• 4 concurrent monitors (VPN integrity, API abuse, carrier compromise, cert validation)
• Real-time Telegram alerts
• 100% local processing (no cloud, ever)
Every detection rule is based on the actual attack logs from my phone. Not theoretical - battle-tested.
aurelianware•1h ago
Three commercial security tools ($120/year total) completely missed it.
So I spent 6 weeks building PrivaseeAI.Security - an open-source iOS threat detection system with:
• 9,879 lines of Python code • 196 tests (100% passing) • 4 concurrent monitors (VPN integrity, API abuse, carrier compromise, cert validation) • Real-time Telegram alerts • 100% local processing (no cloud, ever)
Every detection rule is based on the actual attack logs from my phone. Not theoretical - battle-tested.
The code is Apache 2.0 licensed and available here: https://github.com/aurelianware/PrivaseeAI.Security
We're seeking beta testers with different iPhone models, iOS versions, and carriers: https://github.com/aurelianware/PrivaseeAI.Security/discussi...
Happy to answer any questions about the attack, the detection techniques, or the architecture.