Skip to main content

Evidence Explorer

Browse 107 technical reports from the Facebook iOS surveillance investigation. Filter by hypothesis, grade, or phase to find specific evidence.

3D Graph
107
Total Reports
19
Grade A Reports
3
Investigation Phases
5
Hypotheses Tested
106 of 106 reports
Sort:
anti_forensics_binary_analysisA

Anti-Forensics Binary Analysis Report

Binary analysis of Facebook iOS v345.0 reveals a comprehensive anti-forensics system designed to: 1. Detect debugging and analysis tools 2. Validate SSL/TLS certificate chains 3. Monitor network environment for proxies 4. Dynamically enumerate loaded libraries

H4
audio-to-advertising-pipelineAPhase 2

AUDIO-TO-ADVERTISING-PIPELINE: Complete Evidence Chain

This document compiles forensic evidence proving that Facebook iOS integrates audio capture directly with advertising and analytics infrastructure. The audio capture mechanism is not isolated to legitimate use cases (calls, voice messages) but is architecturally coupled with Facebook's advertising targeting system.

H1H2H4H6
h2-indicator-suppression-reportA

H2 Indicator Suppression Analysis

The investigation reveals a server-controlled flag `should_hide_microtray` that allows Facebook to remotely suppress the microphone indicator tray on iOS. Combined with audio session mode manipulation via `AVAudioSessionModeVoicePrompt`, this provides a mechanism to capture audio while minimizing user awareness.

H1H2
SA-001APhase 1

SA-001 Decompilation Report

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
SA-002APhase 1

SA-002 Symbol Trace Report

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4
SA-007APhase 2

SA-007 GPU Shader Analysis Report

Analyze FBDynamicImageOverlayFilter and related GPU pixel manipulation for steganographic embedding.

H6
SA-009APhase 2

SA-009 Bridge Decompiler Analysis Report

Decompile the 5 bridge functions connecting audio pipeline to network upload.

H4
SA-011APhase 2

SA-011 Category Spoof Analysis Report

Analyze how Facebook spoofs AVAudioSession category to hide microphone access.

H1H2
SA-012APhase 2

SA-012 Flag Tracer Analysis Report

Trace the complete server→client flag activation path for audio control.

H1H2H5
SA-014APhase 3

SA-014 Metal Shader Extraction Report

Complete extraction and analysis of the `extractFromSample` steganographic decoder shader embedded in the Facebook iOS binary. This shader performs IEEE 754 floating-point reconstruction from 14 pixel locations using BGR channel encoding, yielding 84 bits per frame (two 32-bit floats plus sign bits).

H6
SA-015APhase 3

SA-015: FBSpeechHelper H2 Server Socket Analysis Report

The FBSpeechHelper infrastructure provides a complete real-time speech-to-text transmission system using WebSocket (WSS) connections to Facebook's "Shortwave" speech recognition service. Audio is captured via iOS microphone, optionally encoded using OPUS codec, and streamed to `wss://shortwave.facebook.com/v2/vp/recognition` for transcription. The system is exposed to React Native via a bridge module, enabling JavaScript-level activation.

H1H2H4
SA-020APhase 3

SA-020: Shadow Buffer Mechanism and Duplicate Capture Stream Analysis

Investigation of the FBSharedFramework binary reveals a sophisticated triple-buffer audio capture architecture with an **RTC notification bypass mechanism** that allows audio capture to continue independently of WebRTC client state changes. The `audioCaptureIgnoreRTCClientNotification` flag provides a documented mechanism for maintaining audio capture even when RTC sessions are deactivated, explaining the 9,900+ RTC deactivation events observed alongside continued capture operations.

H1
SA-021APhase 3

SA-021 E2EE/Noise Protocol Key Negotiation Analysis Report

The Facebook iOS app implements a multi-layer encryption architecture for real-time audio/video calls: 1. **E2EE Layer**: End-to-end encryption indicated by model updates, with session-level enforcement 2. **DTLS Layer**: Transport-level encryption for WebRTC signaling 3. **Media Encryption**: Per-attachment encryption keys for audio/video content

H4H5
SA-022APhase 3

SA-022: GraphQL RealtimeConfig and Alternative Config Push Mechanisms

Analysis of FBSharedFramework reveals a multi-layered configuration push architecture that enables Facebook to remotely control audio behavior through multiple pathways. The investigation confirms four distinct config update mechanisms working in coordination, with the sound toggle setting changes broadcast via `NSNotification` to all listening components.

H4H5
SA-024APhase 3
CRITICAL

SA-024: VoIP/Conferencing Streaming Infrastructure Analysis

Forensic analysis of Facebook iOS v345.0 reveals a sophisticated real-time audio streaming infrastructure that combines VoIP, WebRTC, QUIC transport, and Opus codec technologies. This infrastructure provides the capability for efficient, low-latency audio streaming that could theoretically support always-on audio surveillance with minimal battery and bandwidth impact.

H1H2H4H5
SA-025APhase 3
CRITICAL

SA-025: Dual-Layer Encryption Architecture Analysis

Analysis of Facebook iOS v345.0 reveals a **dual-layer encryption architecture** for real-time audio streaming that makes traffic analysis and interception extremely difficult. The system combines: 1. **Application Layer:** Noise Protocol E2EE (AES-256-GCM) for audio content 2. **Transport Layer:** QUIC with TLS 1.3 (Fizz) for network transport

H1H4
SA-035APhase 1

SA-035: SoundToggle Remote Activation Proof

**Investigation Status:** GRADE A - Complete Config to Activation Chain with Timing Evidence This investigation proves that `SoundToggleSettingOnProgrammatically` enables remote-controlled microphone activation through Facebook's MobileConfig system. The evidence establishes a complete chain from server-pushed configuration flags to audio session activation with microphone capability. **Binary Analyzed:** Facebook iOS v345.0 - FBSharedFramework.framework

H1H2H5
website_orchestration_promptAPhase 2

FB Exposed Website Orchestration Prompt

Create a compelling, evidence-driven website at **fb.definitelynot.ai** that presents the complete Facebook iOS surveillance investigation findings in an accessible, visually stunning format. This site must transform our technical investigation into an undeniable public disclosure.

H1H2H4H5H6
SA-019A-Phase 3
CRITICAL

SA-019: Overlay Audio Segments and Muted Segment Analysis Report

Analysis of the Facebook binary reveals a sophisticated multi-layer audio architecture with `overlayAudioSegments` for secondary audio tracks, `mutedSegments` for time-based audio muting, and integration with iOS's `SecondaryAudioShouldBeSilentHint` system. **Critical finding: "muted" segments retain full audio data in the file - they are only flagged for playback suppression, creating an ideal covert data channel.**

H2H4H6
orchestration-session-logB+

Orchestration Session Log

This session orchestrated 13 parallel investigation agents to analyze Facebook iOS app v345.0 binary for evidence of surveillance behavior across 5 hypotheses.

H1H2H4H5H6
SA-004B+Phase 1

SA-004 String Mining Report

This string mining reveals: 1. **Server-Controlled Audio Features** via MobileConfig flags 2. **Background Audio Infrastructure** with extensive controls 3. **Privacy Consent Bypass** mechanism via GateKeeper flags 4. **Kill Switch System** for remotely controlling feature availability

H1H2H4H5
SA-005B+Phase 1

SA-005 Class Map Report

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
SA-006B+Phase 2

SA-006 Key Derivation Analysis Report

Find the complete key derivation algorithm for `audioEncryptionKey` to enable H3 steganography decoding.

H2H6
SA-008B+Phase 2

SA-008 XRay ML Model Analysis Report

Analyze the XRay ML model that processes audio embeddings and trace audio→embedding→network flow.

H2H4H6
SA-016B+Phase 3

SA-016: Tray Visibility Control and Indicator Suppression Analysis

This analysis documents Facebook's Stories/Snacks tray visibility control system. The investigation reveals a sophisticated system for controlling when the stories tray is visible and how bucket reranking occurs based on visibility state. Key findings include: 1. **Multiple classes control tray visibility** with a coordinated observer/tracker pattern 2. **`_reRankBucketsWhenTrayIsNotVisible`** flag controls whether bucket reranking occurs when tray is hidden 3. **`privacyIndicatorUnit`** is a distinct component tied to feed story actions

H1H2
SA-017B+Phase 3

SA-017 DRM and Encryption Key Provisioning Analysis Report

The Facebook iOS app implements a multi-layer DRM and encryption architecture: 1. **FairPlay DRM**: Apple's FairPlay Streaming (FPS) for video content protection 2. **License Management**: FBDrmLicenseLoader handles license fetching via GraphQL 3. **Key Hierarchy**: Separate key paths for DRM (video) vs E2EE (messaging attachments)

H4
SA-018B+Phase 3

SA-018: FBMediaUploadManager Chunk-Based Upload Mechanism Analysis

This report documents the chunk-based media upload architecture used by Facebook's iOS application. The upload system implements a sophisticated segmented upload mechanism with support for video and audio content, featuring resume capabilities, progress tracking, and integration with the central dispatcher at address `0x12e5fa4`.

H2H4
SA-010BPhase 2

SA-010 Buffer Lifecycle Analysis Report

Trace complete audio buffer lifecycle from microphone capture to network transmission.

H1H2H4H6
SA-023BPhase 3

SA-023 Extended Steganographic Analysis Report

Generated: 2025-12-30T19:20:45.331700

H6
SA-026BPhase 3

SA-026: Live Frame Embedding Path Analysis

Analysis of the live audio-to-video embedding path reveals that **audio embedding into video frames occurs SERVER-SIDE, not during client-side recording**. The client binary contains only the EXTRACTION mechanism (`extractFromSample` shader). The client's role is to: 1. Capture audio via `FNFAudioQueue` and `FBCCAudioCapturer` 2. Process video frames through `FBVideoProcessor` 3. Apply filters and overlays (including audio-related overlays)

H1H2H4H6
addendum-cmsamplebuffer-report

CMSampleBuffer Processing Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
addendum-ring-buffer-report

Ring Buffer Infrastructure Analysis

H1H2H4
addendum-transcoding-report

Audio Transcoding Infrastructure Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
additional_logs_review_category_spoof_and_crypto

Review: Additional capture logs under `./analysis/facebook/`

Files reviewed (read-only):

H4
agent-handoff-documentPhase 2

Agent Handoff Document

strings /path/to/Facebook > strings_output.txt

H1H2H4
apple_security_disclosure

Apple Security Disclosure Report

A critical privacy bypass has been discovered in the Facebook iOS application that circumvents Apple's microphone usage indicator (orange dot). Facebook pre-activates a CallKit-based bypass mechanism at application launch, allowing potential microphone access without user-visible indication. This bypass exploits iOS's trust model for CallKit-integrated VoIP applications, effectively defeating a core iOS privacy protection feature.

H1H2
apple_security_disclosure_finalPhase 1

Apple Security Research Disclosure

This report documents critical privacy bypass vulnerabilities discovered in the Facebook iOS application (v345.0) that circumvent Apple's iOS privacy indicator system. These vulnerabilities enable the suppression of the microphone indicator (orange status bar dot) and camera indicator (green status bar dot) introduced in iOS 14, which are designed to inform users when applications access device sensors.

H1H2H4H5
apple-security-submission-facebook-ios-privacy-bypass

Executive Summary

This report documents a sophisticated privacy bypass in the Facebook iOS

H1H2H4
apple-submission-email-template

Apple Security Research Submission Email Template

Through static binary analysis, I identified code paths in the Facebook iOS app that: 1. **Bypass the orange microphone indicator** by abusing CallKit framework methods (setAllowCallKitActiveAdjust:, _voipAudioSession, initWithAudioSessionHandsOff:) 2. **Bypass the green camera indicator** via hardcoded configuration (shouldShowGreenDotValue = FALSE)

H1H2H4
binary_reverse_engineering_report

Facebook iOS Binary Reverse Engineering: Complete Analysis Report

Based on comprehensive review of the existing reverse engineering work on the FBSharedFramework binary (Facebook iOS v345.0, 40.7 MB Mach-O arm64), here is a complete synthesis of the findings:

H1H2H4H5H6
binary-analysis-supplement-20251229

Binary Analysis Supplement

Binary analysis of FBSharedFramework reveals the architectural connection between UI shimmer components and audio session activation. The `FBFeedShimmeringStoryFlexComponentSpec::__internalFactory` function (0x000a57d8) and `FBSystemAudioSessionManager` audio setup code (0x000a0608) are located within **~5KB of each other**, indicating they exist in the same compilation unit and share an intentional architectural relationship. This explains the runtime observation that **scrolling the feed triggers massive audio capture bursts** while idle states show minimal activity.

H1H2
binary-audio-analytics-chain
CRITICAL

Binary Audio-to-Analytics Evidence Chain

This document presents DIRECT binary evidence of audio data flowing into analytics and telemetry payloads within the Facebook iOS application. The analysis reveals: - **15 distinct functional stages** in the audio-to-network pipeline - **3 dual-handler functions** that process BOTH audio buffers AND network upload operations - **7-12 layer call depth** from microphone capture to server transmission

H1H2H4H5
binary-graphql-audio-chainPhase 4
CRITICAL

BINARY-GRAPHQL-AUDIO-CHAIN: Complete Audio Embedding Transmission Evidence

This document provides complete binary evidence of the audio capture to GraphQL transmission chain in Facebook iOS v345.0. The analysis traces from microphone activation through XRay ML embedding generation to GraphQL mutation network transmission, with all intermediate addresses and cross-reference counts.

H1H4
binary-mqtt-audio-chainPhase 3
CRITICAL

BINARY-MQTT-AUDIO-CHAIN: Evidence of Audio Data Transmission via MQTT

This document compiles binary evidence demonstrating the infrastructure connecting audio capture functions to MQTT transmission mechanisms in the Facebook iOS application. The analysis reveals: 1. **MQTT sender classes with audio-related callers** at documented addresses 2. **Complete audio-to-network pathways** with call depths of 7-12 layers 3. **MQTT infrastructure integrated with background task management** for persistent operation

H1H4H5
category-spoof-proof

Category Spoofing Detection: PlayAndRecord Audio Session Proof

This capture proves Facebook iOS sets its AVAudioSession category to PlayAndRecord — the iOS category that enables simultaneous microphone input and speaker output — without any user-initiated audio activity (no calls, no voice messages, no Reels recording). The log monitors `AVAudioSession.setCategory` calls and tracks echo cancellation pointer configurations that are only meaningful during active microphone capture. The category switch occurs silently during normal feed browsing.

H1H2
chain-of-audio-activationPhase 1

Chain of Audio Activation: Facebook iOS Shimmer-to-Audio Path Analysis

This document presents forensic evidence of hidden audio session activation triggered by innocent-looking UI shimmer placeholder components in Facebook iOS v345.0. The analysis reveals that displaying a loading animation ("shimmer") for the Stories tray initiates a chain of events culminating in `AVAudioSession` activation - **before any user interaction with audio/video content**.

H1H2H4H5
claude

FB Exposed Project

Investigation into Facebook's surveillance capabilities on iOS devices.

H4H6
comprehensive-capture-v2

Comprehensive Instrumentation Capture v2

Second-generation comprehensive Frida instrumentation capturing audio pipeline activity, cryptographic operations, capture events, and AVAudioSession category changes simultaneously. This capture added category spoofing detection hooks absent in v1, producing the most complete single-session view of Facebook's audio surveillance infrastructure operating during passive feed browsing.

H1H2H4H5
cory_doctorow_packet

Evidence Packet: Cory Doctorow

H1H2H4H5
endpoint_evidence_reviewPhase 3

Endpoint Evidence Review (Facebook iOS v345.0)

This file is intentionally conservative: it distinguishes **capability** (strings/classes/call graphs exist) from **behavior** (traffic observed during “passive browsing”).

H1H4
endpoint_evidence_review_superseded

ENDPOINT_EVIDENCE_REVIEW.md is superseded

`ENDPOINT_EVIDENCE_REVIEW.md` was written early with limited environment context and should be treated as **obsolete**.

endpoint_evidence_weeklong_summaryPhase 3

Endpoint Evidence (Weeklong Summary, based on latest artifacts)

H1H4H5H6
endpoint_proof_table_finalD

Endpoint Proof Table (Final, based on latest chain docs + on-device artifacts)

This file consolidates endpoint claims using the specific documents you referenced as the “latest” basis:

H1H4H5H6
evidence_summary

Facebook iOS v345.0 - Evidence Summary

H1H4
evidence-summary

Facebook iOS Surveillance Evidence Summary

| Metric | Count |

H1H4H6
execution_checklistPhase 1

Execution Checklist: Achieving 95% Confidence

### H3 Steganography (71% → 95%) | Evidence | Impact | Status | |----------|--------|--------| | Infrastructure | +35% | ✓ Done | | Encryption key | +20% | [ ] Needed |

H1H4H6
external_evidence_dir_review

Review: `./analysis/facebook/evidence/` (What It Proves / What It Doesn’t)

This review is based on direct reading of files in:

H1H4
facebook_anti_forensics_report

Facebook iOS App v345.0 - Anti-Forensics & Covert Audio Analysis

Investigation revealed Facebook iOS app exhibits sophisticated anti-forensics behavior and contains evidence of covert audio handling capabilities. The app actively detects analysis tools and ceases network communication when monitored, resuming immediately when monitoring stops.

H1H4H6
facebook-345.0-security-report

Facebook iOS App Security Analysis Report

This security analysis of the Facebook iOS application version 345.0 reveals a complex application with extensive permissions, multiple App Transport Security (ATS) exceptions, and deep integration with the Meta ecosystem (Instagram, WhatsApp, Messenger). The app implements certificate pinning for messaging security but allows insecure HTTP connections to specific Facebook infrastructure domains. The application requests comprehensive device permissions including background location access, which raises privacy concerns despite providing user-facing justifications. Deep analysis of the Hermes bytecode bundle reveals extensive GraphQL API surface with 100+ query/mutation endpoints, clipboard access patterns, device fingerprinting capabilities, and a comprehensive feature flag system with 20,000+ configuration parameters. The app includes 500+ NUX (New User Experience) triggers for user engagement and behavior tracking.

H1H2H4
facebook-ios-binary-reverse-engineering-complete-analysis-report

Untitled Report

H1H2H4H5H6
facebook-ios-privacy-bypass-blog-postPhase 1

Silent Listeners: How Facebook iOS Bypasses Privacy Indicators for Background Audio Surveillance

*Technical Analysis of Facebook iOS v345.0*

H1H2H4
facebook-ios-privacy-bypass-technical-writeupPhase 1

Untitled Report

H1H2H4
facebook-ios-runtime-evidence-appendix

Runtime Evidence Appendix

Runtime monitoring of the Facebook iOS app captured direct evidence of surveillance infrastructure including continuous polling of privacy indicator bypass state, over 1,000 accesses to telephony audio session without any active call, and aggressive background execution persistence.

H1H2
fact_check_analysis

Fact-Check Analysis: Documentation vs. Runtime Evidence

After reviewing all documentation against the latest runtime evidence, I've identified both **strongly verified claims** and **claims that require clarification or correction**. The core architectural findings are solid, but some claims overstate what the evidence directly proves.

H1H2H4
fbi_wiretapping_disclosure

Federal Law Enforcement Disclosure

Meta Platforms, Inc., through its Facebook iOS application, has implemented a technical mechanism that: 1. **Circumvents iOS Privacy Indicators:** Defeats Apple's microphone usage indicator (orange dot) designed to inform users of audio access 2. **Pre-emptive Bypass Activation:** Activates this bypass at application launch, before any user-initiated audio activity

H1H2
fbi_wiretapping_disclosure_finalPhase 1

FEDERAL LAW ENFORCEMENT DISCLOSURE

Federal Bureau of Investigation

H1H2H4
final_forensic_evidence_report

Facebook iOS Binary Forensic Analysis Report

This forensic analysis of the Facebook iOS application binary reveals a complete technical infrastructure capable of: 1. **Audio capture** via microphone with deceptive permission handling 2. **Audio session spoofing** - declaring benign "Ambient" category while using "PlayAndRecord" 3. **Scroll-triggered audio activation** via FBFeedAudioSessionClient

H1H2H4H5H6
final_report

Facebook iOS v345.0 Audio Infrastructure Analysis

Analysis of Facebook iOS app version 345.0 reveals a sophisticated audio session management infrastructure that activates in response to UI interactions, specifically shimmer loading animations in the feed. While no actual hardware microphone recording was detected during testing (AudioQueueNewInput = 0), the app maintains an aggressive audio session polling mechanism that could enable rapid microphone activation.

H1H4
ftc_consumer_protection_complaint

FEDERAL TRADE COMMISSION

For Electronic Filing via: https://reportfraud.ftc.gov/

H1H2H5
full-coverage-final

Full Coverage Capture: 142 Targets, 15 Batches

Systematic coverage capture instrumenting all 142 identified surveillance-related function targets across 15 sequential batches. Each batch hooks ~10 functions to avoid detection threshold. This capture confirms that the full scope of identified targets are reachable at runtime — not dead code, not debug-only paths, but live production functions executing during normal app usage.

H1H2H4H5H6
h3-steganography-decoder-report

Steganography Decoding Analysis

After comprehensive analysis of extraction attempts and evidence files, this investigation reveals that **multiple extraction methods have successfully produced valid audio file structures** (54 validated files), but the audio content remains **unintelligible** due to encryption and/or proprietary codec encoding. The primary barrier is the `audioEncryptionKey` mechanism identified in the Facebook binary.

H2H4H6
h5-remote-control-report

H5 Remote Control Analysis

Server-side flags can remotely activate audio capture without user consent

H1H2H5
haiku-agent-audio-gaps

Audio Surveillance Gap Analysis - Facebook iOS v345.0

1. **Microphone Activation** (`startAudioCaptureWithEchoCancellationEnabled`) - 960 calls/session

H1H4
haiku-agent-ghidra-review

Ghidra Analysis Review: Hook Recommendations Report

- **Purpose:** RTC notification handler entry point

H1H2
haiku-agent-upload-gaps

Facebook iOS Upload Evidence Analysis Report

| Class | Fires | Percentage |

H4
indexPhase 1

Agent Reports Index

| Hypothesis | Status | Threshold | Phase 4 | Runtime | Change |

H1H2H4H5H6
journalist_briefing_packet

JOURNALIST BRIEFING PACKET

H1H2H4
key_capture_logs_review

Key Capture Logs Review (Redacted)

This note reviews the following files:

H1
latest_investigation_timeline_and_pcap_playbookPhase 3

Latest Investigation Timeline + PCAP/Device-Log Correlation Playbook

This file intentionally prioritizes the **post-runtime** evidence path summarized in `evidence/agents/INDEX.md` over earlier time-boxed/partial reviews.

H1H2H4H5H6
latest_next_steps_for_exfil_proofPhase 3

Next Steps to Produce “Transmission Proof” From PCAP + On-Device Logs

This is the shortest possible checklist to turn the repo’s **runtime mic-activation proof** into a **network-exfil proof** backed by PCAP citations.

H1H4
lina_khan_packet

EVIDENCE PACKET: FTC CONSENT DECREE VIOLATIONS BY META PLATFORMS, INC.

### The 2019 Consent Decree Requirement The 2019 FTC settlement with Facebook/Meta required: > "Facebook must obtain users' **affirmative express consent** before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."

H1H2H4H5
master-tracking-spreadsheetPhase 1

Master Tracking Spreadsheet

| Category | Count | |----------|-------| | Audio pipeline classes | 21 | | Buffer methods | 17 | | Encryption components | 14 |

H1H2H4H5H6
media_press_release

FOR IMMEDIATE RELEASE

H1H2H4
microphone_recording_evidence

Facebook iOS App - Microphone Recording Evidence

H1H4
passive-capture-60min-final

60-Minute Passive Capture: 277,666 Events

The definitive passive capture session. The phone sat untouched for 60 minutes with Facebook open on the feed. No user interaction whatsoever — no scrolling, no taps, no audio playback. Despite this, the instrumentation recorded 277,666 events including 47,936 audio start operations. This capture is the strongest single piece of evidence that Facebook's audio infrastructure operates autonomously without user-initiated triggers.

H1H4H5H6
pcap_packet_capture_folder_summary

`packet-capture/` PCAP Reality Check (What These Captures Do / Don’t Prove)

This is a narrow summary of the PCAPs currently present under `packet-capture/`, to avoid accidentally treating them as the “weeklong latest proof” captures.

H4
phase2-session-logPhase 2

Phase 2 Orchestration Session Log

| Agent ID | Code | Target | Status | Expected Impact |

H1H2H4H5H6
phase2-summaryPhase 2

Phase 2 Orchestration Summary

| Agent | Target | Grade | Key Finding |

H1H2H4H5H6
phase3-summaryPhase 3

Phase 3 Analysis Summary Report

Phase 3 focused on addressing the remaining blockers identified in Phase 2, with emphasis on: 1. Metal shader steganographic extraction algorithm 2. Speech/audio streaming infrastructure 3. DRM and encryption key provisioning 4. Remote configuration push mechanisms

H1H2H4H5H6
proxy_architecture

Proxy Architecture: Bypassing Facebook Anti-Forensics

Facebook built `FBSSLKeyMaterialLogger` for debugging. We enable it to capture keys passively, then decrypt traffic offline.

H4H6
public_disclosure_facebook_ios_surveillancePhase 1

PUBLIC DISCLOSURE: Facebook iOS Bypasses Privacy Indicators for Covert Audio Surveillance

| Finding | Evidence | Implication | |---------|----------|-------------| | Indicator bypass polling | 18 calls, every 3 seconds | Active monitoring of bypass state | | Telephony audio access | 1,099 accesses, 0 calls | VoIP infrastructure misuse | | Background persistence | 454 requests | Aggressive execution maintenance |

H1H2H4
pyghidra_investigation_targets

PyGhidra Investigation Targets for Facebook iOS Audio Exfiltration Analysis

``` 1. TRIGGER: User scrolls feed └── FBFeedShimmeringStoryFlexComponentSpec::__internalFactory (0x000a57d8) 2. ACTIVATION: Audio session activated

H1H2H4H6
readme

Facebook iOS Surveillance Disclosure Package

This package contains comprehensive documentation of a critical privacy vulnerability discovered in the Facebook iOS application that enables: 1. **Microphone indicator bypass** - Suppresses iOS orange dot during audio capture 2. **Camera indicator bypass** - Suppresses iOS green dot during video capture 3. **24/7 background audio capture** - Self-perpetuating background execution loop

H1H2
runtime-chains-summary

Runtime Chains Summary

This document summarizes all runtime instrumentation evidence correlated across agent analyses.

H1H2H4H5H6
runtime-evidence-supplement-20251229

Supplemental Runtime Evidence Log

This supplemental evidence documents **20,000+ audio capture calls** with the privacy indicator bypass active and **zero legitimate calls or RTC clients**. The evidence demonstrates a clear correlation between UI scrolling and audio capture bursts, with capture rates exceeding **6,000 captures per second** during active feed scrolling.

H1H2H4H5
SA-003DPhase 1

SA-003 Pattern Hunt Report

Analysis of the FBSharedFramework binary (40.7 MB Mach-O arm64) reveals extensive audio codec infrastructure but **no definitive evidence of steganographic embedding**. The byte patterns found are consistent with legitimate audio/video playback functionality rather than covert data encoding.

H6
SA-013Phase 3

SA-013: Upload Dispatcher Decompilation Report

The function at `0x12e5fa4` is a **central Objective-C message dispatch stub** (objc_msgSend trampoline) that serves as the universal message routing mechanism for Facebook's entire upload infrastructure. It has **120,473 cross-references** throughout the binary, making it one of the most frequently called functions in the framework.

H4
ssl_bypass_strategyPhase 1

SSL Pinning Bypass & Gap-Closing Strategy

MOV_W0_0 = bytes([0x00, 0x00, 0x80, 0x52])

H1H2H4H6
stalker-trace

Frida Stalker Trace: 30 Hook Points

Stalker-based code tracing across 30 hook points in the Facebook binary. Unlike the passive captures which monitor function calls, Stalker traces instruction-level execution paths through the audio pipeline. This reveals the actual control flow between components — how a category change leads to a capture start, how captured buffers flow to the encryption layer, and how encrypted data reaches the network upload queue. Operated in stealth mode with jailbreak detection bypass.

H1H2H4H5H6
steganography_evidence

Facebook Audio Steganography Evidence

H1H4H6
submission_checklist

Facebook iOS Surveillance Evidence - Submission Checklist

cd

H1H2H5
sy-001-evidence-correlation-report

SY-001 Evidence Correlation Report

This report cross-references all existing evidence to build complete proof chains for each surveillance hypothesis. The analysis reveals that **H1 (Microphone Capture)** now exceeds the 75% threshold, while **H2 (Indicator Suppression)** and **H5 (Remote Control)** have significantly strengthened but require targeted follow-up. **H3 (Steganography)** and **H4 (Network Exfiltration)** have advanced substantially but require live network captures and decoded audio verification for conclusive proof.

H1H2H4H5H6
trusted_contacts

Trusted Contacts - Multi-Pronged Disclosure Strategy

H1H2
verified-targets-83k-final

Ghidra-Verified Function Targets: 83,368 Events

The culmination of the target verification pipeline. Each hooked function was first identified in Ghidra's decompilation output, then validated at runtime via Frida instrumentation. 83,368 total events across 5 capture batches over 26 minutes. Every function target in this capture has a corresponding Ghidra decompilation confirming its role in the audio/surveillance pipeline, providing the binary analysis ↔ runtime correlation required for forensic evidence.

H1H4H5
voip_push_chain_endpoint_extractPhase 4

SA-034 VoIP Push → Capture → Stream: Endpoint + Transport Extract

This note extracts only the endpoint/transport claims from SA-034 so it can be referenced as part of the “latest proof bundle” without re-reading the whole chain document.

H1H4
worker4_verification_complete

Worker 4: Keyboard Surveillance Verification - COMPLETE

**Total Documentation:** 7 files, 890+ lines, 30.5K

H5